<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="yes"?>
<rfc category="std" docName="draft-ietf-sidr-res-certs-11.txt" ipr="full3978">
  <front>
    <title abbrev="Resource Certificate Profile">A Profile for X.509 PKIX
    Resource Certificates</title>

   <author fullname="Geoff Huston" initials="G." surname="Huston">
      <organization abbrev="APNIC">Asia Pacific Network Information
      Centre</organization>
      <address>
        <postal>
        <street>33 Park Rd.</street>
        <city>Milton</city>
        <region>QLD</region>
        <code>4064</code>
        <country>Australia</country>
        </postal>

        <email>gih@apnic.net</email>

        <uri>http://www.apnic.net</uri>
      </address>
    </author>

   <author fullname="George Michaelson" initials="G." surname="Michaelson">
      <organization abbrev="APNIC">Asia Pacific Network Information
      Centre</organization>
      <address>
        <postal>
        <street>33 Park Rd.</street>
        <city>Milton</city>
        <region>QLD</region>
        <code>4064</code>
        <country>Australia</country>
        </postal>

        <email>ggm@apnic.net</email>

        <uri>http://www.apnic.net</uri>
      </address>
    </author>

    <author fullname="Robert Loomans" initials="R." surname="Loomans">
      <organization abbrev="APNIC">Asia Pacific Network Information
      Centre</organization>
      <address>
        <postal>
        <street>33 Park Rd.</street>
        <city>Milton</city>
        <region>QLD</region>
        <code>4064</code>
        <country>Australia</country>
        </postal>

        <email>robertl@apnic.net</email>

        <uri>http://www.apnic.net</uri>
      </address>
    </author>


    <date year="2008" />

    <area>Routing Area</area>

    <workgroup>SIDR</workgroup>

    <abstract>

      <t>This document defines a standard profile for X.509
      certificates for the purposes of supporting validation of
      assertions of "right-to-use" of an Internet Number Resource (IP
      Addresses and Autonomous System Numbers). This profile is used
      to convey the issuer's authorization of the subject to be
      regarded as the current holder of a "right-of-use" of the IP
      addresses and AS numbers that are described in the issued
      certificate.</t>

    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">

      <t>This document defines a standard profile for X.509
      certificates for use in the context of certification of IP
      Addresses and AS Numbers. Such certificates are termed here
      "Resource Certificates." Resource Certificates are X.509
      certificates that conform to the PKIX profile <xref
      target="RFC5280"></xref>, and also conform to the constraints
      specified in this profile. Resource Certificates attest that the
      issuer has granted the subject a "right-to-use" for a listed set
      of IP addresses and Autonomous System numbers.</t>

      <t>A Resource Certificate describes an action by a certificate
      issuer that binds a list of IP Address blocks and AS Numbers to
      the subject of the issued certificate. The binding is identified
      by the association of the subject's private key with the
      subject's public key contained in the Resource Certificate, as
      signed by the private key of the certificate's issuer.</t>

      <t>In the context of the public Internet, and the use of public
      number resources within this context, it is intended that
      Resource Certificates are used in a manner that is explicitly
      aligned to the public number resource distribution
      function. Specifically, when a number resource is allocated or
      assigned by a number registry to an entity, this allocation is
      described by an associated Resource Certificate. This
      certificate is issued by the number registry, and the subject's
      public key that is being certified by the issuer corresponds to
      the public key part of a public / private key pair that was
      generated by the same entity who is the recipient of the number
      assignment or allocation. A critical extension to the
      certificate enumerates the IP Resources that were allocated or
      assigned by the issuer to the entity. In the context of the
      public number distribution function, this corresponds to a
      hierarchical PKI structure, where Resource Certificates are only
      issued in one 'direction' and there is a single unique path of
      certificates from a certificate authority operating at the apex
      of a resource distribution hierarchy to a valid certificate.</t>

      <t>Validation of a Resource Certificate in such a hierarchical
      PKI can be undertaken by establishing a valid issuer-subject
      certificate chain from a certificate issued by a trust anchor
      certificate authority to the certificate <xref
      target="RFC4158"></xref>, with the additional constraint of
      ensuring that each subject's listed resources are fully
      encompassed by those of the issuer at each step in the
      issuer-subject certificate chain.</t>

      <t>Resource Certificates may be used in the context of the
      operation of secure inter-domain routing protocols to convey a
      right-to-use of an IP number resource that is being passed
      within the routing protocol, allowing relying parties to verify
      legitimacy and correctness of routing information. Related use
      contexts include validation of Internet Routing Registry
      objects, validation of routing requests, and detection of
      potential unauthorised use of IP addresses.</t>

      <t>This profile defines those fields that are used in a Resource
      Certificate that MUST be present for the certificate to be
      valid.  Relying Parties SHOULD check that a Resource Certificate
      conforms to this profile as a requisite for validation of a
      Resource Certificate.</t>

      <section title="Terminology">

        <t>It is assumed that the reader is familiar with the terms
        and concepts described in "Internet X.509 Public Key
        Infrastructure Certificate and Certificate Revocation List
        (CRL) Profile" <xref target="RFC5280"></xref>, "X.509
        Extensions for IP Addresses and AS Identifiers" <xref
        target="RFC3779"></xref>, "Internet Protocol" <xref
        target="RFC0791"></xref>, "Internet Protocol Version 6 (IPv6)
        Addressing Architecture" <xref target="RFC4291"></xref>,
        "Internet Registry IP Allocation Guidelines" <xref
        target="RFC2050"></xref>, and related regional Internet
        registry address management policy documents.</t>

        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
        "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described
        in RFC 2119.</t>

      </section>
    </section>

    <section title="Describing Resources in Certificates">

      <t>The framework for describing an association between the
      subject of a certificate and the resources currently under the
      subject's control is described in <xref
      target="RFC3779"></xref>.</t>

      <t>There are three aspects of this resource extension that are
      noted in this profile: <vspace blankLines="1" /> <list
      style="numbers">

          <t>RFC 3779 notes that a resource extension SHOULD be a
          CRITICAL extension to the X.509 Certificate. This Resource
          Certificate profile further specifies that the use of this
          certificate extension MUST be used in all Resource
          Certificates and MUST be marked as CRITICAL. <vspace
          blankLines="1" /></t>

          <t>RFC 3779 defines a sorted canonical form of describing a
          resource set, with maximal spanning ranges and maximal
          spanning prefix masks as appropriate. All valid certificates
          in this profile MUST use this sorted canonical form of
          resource description in the resource extension
          field. <vspace blankLines="1" /></t>

          <t>A test of the resource extension in the context of
          certificate validity includes the condition that the
          resources described in the immediate superior certificate in
          the PKI hierarchy (the certificate where this certificate's
          issuer is the subject) has a resource set (called here the
          "issuer's resource set") that must encompass the resource
          set of the issued certificate. In this context "encompass"
          allows for the issuer's resource set to be the same as, or a
          strict superset of, any subject's resource set. </t>

        </list></t>

      <t>A test of certificate validity entails the identification of
      a sequence of valid certificates in an issuer-subject chain
      (where the subject field of one certificate appears as the
      issuer in the next certificate in the sequence) from a trust
      anchor certificate authority to the certificate being validated,
      and that the resource extensions in this certificate sequence
      from the trust anchor's issued certificate to the certificate
      being validated form a sequence of encompassing relationships in
      terms of the resources described in the resource extension.</t>

    </section>

    <section title="Resource Certificate Fields">

      <t>A Resource Certificate is a valid X.509 v3 public key
      certificate, consistent with the PKIX profile <xref
      target="RFC5280"></xref>, containing the fields listed in this
      section. Unless specifically noted as being OPTIONAL, all the
      fields listed here MUST be present, and any other field MUST NOT
      appear in a conforming Resource Certificate. Where a field value
      is specified here this value MUST be used in conforming Resource
      Certificates.</t>

      <section title="Version">

        <t>Resource Certificates are X.509 Version 3 certificates.
        This field MUST be present, and the Version MUST be 3
        (i.e. the value of this field is 2).</t>

      </section>

      <section title="Serial number">

        <t>The serial number value is a positive integer that is
        unique per Issuer.</t>

      </section>

      <section title="Signature Algorithm">

        <t>This field describes the algorithm used to compute the
        signature on this certificate. This profile specifies a
        minimum of SHA-256 with RSA (sha256WithRSAEncryption), and
        allows for the use of SHA-384 or SHA-512. Accordingly, the
        value for this field MUST be one of the OID values { pkcs-1 11
        }, { pkcs-1 12 } or { pkcs-1 13 } <xref target="RFC4055"
        />.</t>

        <t>It is noted that larger key sizes are computationally
        expensive for both the Certificate Authority and relying
        parties, indicating that care should be taken when deciding to
        use larger than the minimum key size.</t>

      </section>

      <section title="Issuer">

        <t>This field identifies the entity that has signed and issued
        the certificate. The value of this field is a valid X.501
        name.</t>

        <t>If the certificate is a subordinate certificate issued by
        virtue of the "cA" bit set in the immediate superior
        certificate, then the issuer name MUST correspond to the
        subject name as contained in the immediate superior
        certificate.</t>

        <t>This field MUST be non-empty.</t>

      </section>

      <section title="Subject">

        <t>This field identifies the entity to whom the resource has
        been allocated / assigned. The value of this field is a valid
        X.501 name.</t>

        <t>In this profile the subject name is determined by the
        issuer, and each distinct entity certified by the issuer MUST
        be identified using a subject name that is unique per
        issuer.</t>

        <t>This field MUST be non-empty.</t>

      </section>

      <section title="Valid From">

        <t>The starting time at which point the certificate is
        valid. In this profile the "Valid From" time SHOULD be no
        earlier than the time of certificate generation. As per
        Section 4.1.2.5 of <xref target="RFC5280"></xref>,
        Certification Authorities (CAs) conforming to this profile
        MUST always encode the certificate's "Valid From" date through
        the year 2049 as UTCTime, and dates in 2050 or later MUST be
        encoded as GeneralizedTime. These two time formats are defined
        in <xref target="RFC5280"></xref>.</t>

        <t>In this profile, it is valid for a certificate to have a
        value for this field that pre-dates the same field value in
        any superior certificate. However, it is not valid to infer
        from this information that a certificate was, or will be,
        valid at any particular time other than the current time.</t>

      </section>

      <section title="Valid To">

        <t>The Valid To time is the date and time at which point in
        time the certificate's validity ends. It represents the
        anticipated lifetime of the resource allocation / assignment
        arrangement between the issuer and the subject. As per Section
        4.1.2.5 of <xref target="RFC5280"></xref>, CAs conforming to
        this profile MUST always encode the certificate's "Valid To"
        date through the year 2049 as UTCTime, and dates in 2050 or
        later MUST be encoded as GeneralizedTime. These two time
        formats are defined in <xref target="RFC5280"></xref>.</t>

        <t>In this profile, it is valid for a certificate to have a
        value for this field that post-dates the same field value in
        any superior certificate. However, it is not valid to infer
        from this information that a certificate was, or will be,
        valid at any particular time other than the current time.</t>

        <t>CAs are typically advised against issuing a certificate
        with a validity interval that exceeds the validity interval of
        the CA's certificate that will be used to validate the issued
        certificate. However, in the context of this profile, it is
        anticipated that a CA may have valid grounds to issue a
        certificate with a validity interval that exceeds the validity
        interval of the CA's certificate.</t>

      </section>

      <section title="Subject Public Key Info">

        <t>This field specifies the subject's public key and the
        algorithm with which the key is used. The public key algorithm
        MUST be RSA, and, accordingly, the OID for the public key
        algorithm is 1.2.840.113549.1.1.1. The key size MUST be a
        minimum size of 1024 bits. In the context of certifying
        resources it is recommended that the key size of keys that are
        intended to be used at the apex of a certificate issuance
        hierarchy, and their immediate subordinates, SHOULD use a
        minimum key size of 2048 bits.  Immediate subordinates of
        these certificates, when used in the context of continued
        levels of high trust, SHOULD use a minimum key size of 2048
        bits.</t>

        <t>In the application of this profile to certification of
        public number resources, it would be consistent with this
        recommendation that the Regional Internet Registries use a key
        size of 2048 bits in their issued certificates, and that their
        immediate subordinate certificate authorities also use a key
        size of 2048 bits. All other subordinate certificates MAY use
        a key size of 1024 bits.</t>

        <t>It is noted that larger key sizes are computationally
        expensive for both the CA and relying parties, indicating that
        care should be taken when deciding to use larger than the
        minimum key size.</t>

      </section>

      <section title="Resource Certificate Version 3 Extension Fields">

        <t>As noted in Section 4.2 of <xref target="RFC5280"></xref>,
        each extension in a certificate is designated as either
        critical or non-critical. A certificate-using system MUST
        reject the certificate if it encounters a critical extension
        it does not recognise; however, a non-critical extension MAY
        be ignored if it is not recognised <xref
        target="RFC5280"></xref>.</t>

        <t>The following X.509 V3 extensions MUST be present in a
        conforming Resource Certificate, except where explicitly noted
        otherwise.</t>

        <section title="Basic Constraints">

          <t>The basic constraints extension identifies whether the
          subject of the certificate is a CA and the maximum depth of
          valid certification paths that include this certificate.</t>

          <t>The issuer determines whether the "cA" boolean is set. If
          this bit is set, then it indicates that the subject is
          allowed to issue resources certificates within this overall
          framework (i.e. the subject is permitted be a CA).</t>

          <t>The Path Length Constraint is not specified in this
          profile and MUST NOT be present.</t>

          <t>The Basic Constraints extension field is a critical
          extension in the Resource Certificate profile, and MUST be
          present when the subject is a CA, and MUST NOT be present
          otherwise.</t>

        </section>

        <section title="Subject Key Identifier">

          <t>The subject key identifier extension provides a means of
          identifying certificates that contain a particular public
          key. To facilitate certification path construction, this
          extension MUST appear in all Resource Certificates. This
          extension is non-critical.</t>

          <t>The value of the subject key identifier MUST be the value
          placed in the key identifier field of the Authority Key
          Identifier extension of immediate subordinate certificates
          (all certificates issued by the subject of this
          certificate).</t>

          <t>The Key Identifier used here is the 160-bit SHA-1 hash of
          the value of the DER-encoded ASN.1 bit string of the subject
          public key, as described in Section 4.2.1.2 of <xref
          target="RFC5280"> </xref>.</t>

        </section>

        <section title="Authority Key Identifier">

          <t>The authority key identifier extension provides a means of
          identifying certificates that are signed by the issuer's
          private key, by providing a hash value of the issuer's
          public key. To facilitate path construction, this extension
          MUST appear in all Resource Certificates. The keyIdentifier
          sub field MUST be present in all Resource Certificates, with
          the exception of a CA who issues a "self-signed"
          certificate. The authorityCertIssuer and
          authorityCertSerialNumber sub fields MUST NOT be
          present. This extension is non-critical.</t>

          <t>The Key Identifier used here is the 160-bit SHA-1 hash of
          the value of the DER-encoded ASN.1 bit string of the
          issuer's public key, as described in Section 4.2.1.1 of
          <xref target="RFC5280"></xref>.</t>

        </section>

        <section title="Key Usage">

          <t>This describes the purpose of the certificate. This is a
          critical extension, and it MUST be present.</t>

          <t>In certificates issued to Certificate Authorities only the
          keyCertSign and CRLSign bits are set to TRUE and MUST be the
          only bits set to TRUE. </t>

          <t>In end-entity certificates the digitalSignature bit MUST
          be set and MUST be the only bit set to TRUE.</t>

        </section>

        <section title="CRL Distribution Points">

          <t>This field (CRLDP) identifies the location(s) of the
          CRL(s) associated with certificates issued by this
          Issuer. This profile uses the URI form of object
          identification. The preferred URI access mechanism is a
          single RSYNC URI ("rsync://") <xref target="rsync"></xref>
          that references a single inclusive CRL for each issuer.</t>

          <t>In this profile the certificate issuer is also the CRL
          issuer, implying at the CRLIssuer sub field MUST be omitted,
          and the distributionPoint sub-field MUST be present. The
          Reasons sub-field MUST be omitted.</t>

          <t>The distributionPoint MUST contain general names, and
          MUST NOT contain a nameRelativeToCRLIssuer. The type of the
          general name MUST be of type URI.</t>

          <t>In this profile, the scope of the CRL is specified to be
          all certificates issued by this CA issuer using a given key
          pair.</t>

          <t>The sequence of distributionPoint values MUST contain
          only a single DistributionPointName set. The
          DistributionPointName set MAY contain more than one URI
          value. An RSYNC URI MUST be present in the
          DistributionPointName set, and reference the most recent
          instance of this issuer's certificate revocation list. Other
          access form URIs MAY be used in addition to the RSYNC
          URI.</t>

          <t>This extension MUST be present and it is
          non-critical. There is one exception; where a CA distributes
          its public key in the form of a "self-signed" certificate,
          the CRLDP MUST be omitted.  </t>


        </section>

        <section title="Authority Information Access">

          <t>This field (AIA) identifies the point of publication of
          the certificate that is issued by the issuer's immediate
          superior CA, where this certificate's issuer is the
          subject. In this profile a single reference object to
          publication location of the immediate superior certificate
          MUST be used, except in the case where a CA distributes its
          public key in the form of a "self-signed" certificate, the
          AIA field SHOULD be omitted.</t>

          <t>This profile uses a URI form of object
          identification. The preferred URI access mechanisms is
          "rsync", and an RSYNC URI MUST be specified with an
          accessMethod value of id-ad-caIssuers. The URI MUST
          reference the point of publication of the certificate where
          this issuer is the subject (the issuer's immediate superior
          certificate). Other access method URIs referencing the same
          object MAY also be included in the value sequence of this
          extension.</t>

          <t>When an Issuer re-issues a CA certificate, the
          subordinate certificates need to reference this new
          certificate via the AIA field. In order to avoid the
          situation where a certificate re-issuance necessarily
          implies a requirement to re-issue all subordinate
          certificates, CA Certificate issuers SHOULD use a persistent
          URL name scheme for issued certificates. This implies that
          re-issued certificates overwrite previously issued
          certificates to the same subject in the publication
          repository, and use the same publication name as previously
          issued certificates. In this way subordinate certificates
          can maintain a constant AIA field value and need not be
          re-issued due solely to a re-issue of the superior
          certificate. The issuers' policy with respect to the
          persistence of name objects of issued certificates MUST be
          specified in the Issuer's Certificate Practice
          Statement.</t>

          <t>This extension is non-critical.</t>

        </section>

        <section title="Subject Information Access">

          <t>This field (SIA) identifies the location of information
          and services relating to the subject of the certificate in
          which the SIA extension appears. Where the Subject is a CA
          in this profile, this information and service collection
          will include all current valid certificates that have been
          issued by this subject that are signed with the subject's
          corresponding private key.</t>

          <t>This profile uses a URI form of location identification. The
          preferred URI access mechanism is "rsync", and an RSYNC URI MUST be
          specified, with an access method value of id-ad-caRepository when
          the subject of the certificate is a CA. The RSYNC URI must reference
          an object collection rather than an individual object and MUST use a
          trailing '/' in the URI.</t>

          <t>Other access method URIs that reference the same location
          MAY also be included in the value sequence of this
          extension. The ordering of URIs in this sequence reflect the
          subject's relative preferences for access methods, with the
          first method in the sequence being the most preferred.</t>

          <t>This field MUST be present when the subject is a CA, and
          is non-critical.</t>

          <t>For End Entity (EE) certificates, where the subject is
          not a CA, this field MAY be present, and is non-critical.
          If present, it either references the location where objects
          signed by the key pair associated with the EE certificate
          can be accessed, or, in the case of single-use EE
          certificates it references the location of the single object
          that has been signed by the corresponding key pair.</t>

          <t>When the subject is an End Entity, and it publishes
          objects signed with the matching private key in a
          repository, the directory where these signed objects is
          published is referenced the id-ad-signedObjectRepository
          OID.</t>

        <figure>
          <artwork>
       id-ad OBJECT IDENTIFIER ::= { id-pkix 48 }

       id-ad-signedObjectRepository OBJECT IDENTIFIER ::= { id-ad 9 }
</artwork>
</figure>

         <t>When the subject is an End Entity, and it publishes a
         single object signed with the matching private key, the
         location where this signed object is published is referenced
         the id-ad-signedObject OID.</t>

        <figure>
          <artwork>
       id-ad-signedObject OBJECT IDENTIFIER ::= { id-ad 11 }
</artwork>
</figure>

         <t>This profile requires the use of repository publication
         manifests <xref target="ID.SIDR-MANIFESTS" /> to list all
         signed objects that are deposited in the repository
         publication point associated with a CA or an EE.  The
         publication point of the manifest for a CA or EE is placed in
         the SIA extension of the CA or EE certificate. This profile
         uses a URI form of manifest identification for the
         accessLocation.  The preferred URI access mechanisms is
         "rsync", and an RSYNC URI MUST be specified. Other
         accessDescription fields may exist with this id-ad-Manifest
         accessMethod, where the accessLocation value indicates
         alternate URI access mechanisms for the same manifest object.
         </t>

<figure>
<artwork>
       id-ad-rpkiManifest  OBJECT IDENTIFIER ::= { id-ad 10 }
</artwork>
</figure>

         <t>CA certificates MUST include in the SIA an accessMethod
         OID of id-ad-rpkiManifest, where the associated
         accessLocation refers to the subject's published manifest
         object as an object URL.</t>

         <t>When an EE certificate is intended for use in verifying
         multiple objects, EE certificate MUST include in the SIA an
         access method OID of id-ad-rpkiManifest, where the associated
         access location refers to the publication point of the
         objects that are verified using this EE certificate.</t>

         <t>When an EE certificate is used to sign a single object,
         the EE certificate MUST include in the SIA an access method
         OID of id-ad-signedObject, where the associated access
         location refers to the publication point of the single object
         that is verified using this EE certificate. In this case, the
         SIA MUST NOT include the access method OID of
         id-ad-rpkiManifest.</t>


        </section>

        <section title="Certificate Policies">

          <t>This extension MUST reference the Resource Certificate
          Policy, using the OID Policy Identifier value of
          "1.3.6.1.5.5.7.14.2". This field MUST be present and MUST
          contain only this value for Resource Certificates.</t>

          <t>PolicyQualifiers MUST NOT be used in this profile.</t>

          <t>This extension MUST be present and it is critical.</t>

        </section>

        <section title="IP Resources">

          <t>This field contains the list of IP address resources as
          per <xref target="RFC3779"></xref>. The value may specify
          the "inherit" element for a particular AFI value. In the
          context of resource certificates describing public number
          resources for use in the public Internet, the SAFI value
          MUST NOT be used. All Resource Certificates MUST include an
          IP Resources extension, an AS Resources extension, or both
          extensions.</t>

          <t>This extension, if present, MUST be marked critical.</t>

        </section>

        <section title="AS Resources">

          <t>This field contains the list of AS number resources as
          per <xref target="RFC3779"></xref>, or may specify the
          "inherit" element. RDI values are NOT supported in this
          profile and MUST NOT be used. All Resource Certificates MUST
          include an IP Resources extension, an AS Resources
          extension, or both extensions.</t>

          <t>This extension, if present, MUST be marked critical.</t>

        </section>
      </section>
    </section>

    <section title="Resource Certificate Revocation List Profile">

      <t>Each CA MUST issue a version 2 Certificate Revocation List
      (CRL), consistent with <xref target="RFC5280"></xref>. The CRL
      issuer is the CA, and no indirect CRLs are supported in this
      profile.</t>

      <t>An entry MUST NOT be removed from the CRL until it appears on
      one regularly scheduled CRL issued beyond the revoked
      certificate's validity period.</t>

      <t>This profile does not allow issuance of Delta CRLs.</t>

      <t>The scope of the CRL MUST be "all certificates issued
      by this CA using a given key pair". The contents of the CRL are
      a list of all non-expired certificates issued by the CA using a
      given key pair that have been revoked by the CA.</t>

      <t>The profile allows the issuance of multiple current CRLs with
      different scope by a single CA, with the scope being defined by
      the key pair used by the CA.</t>

      <t>No CRL fields other than those listed here are permitted in
      CRLs issued under this profile. Unless otherwise indicated,
      these fields MUST be present in the CRL. Where two or more CRLs
      issued by a single CA with the same scope, the CRL with the
      highest value of the "CRL Number" field supersedes all other
      CRLs issued by this CA.</t>

      <section title="Version">

        <t>Resource Certificate Revocation Lists are Version 2
        certificates (the integer value of this field is 1).</t>

      </section>

      <section title="Issuer Name">

        <t>The value of this field is the X.501 name of the issuing CA
        who is also the signer of the CRL, and is identical to the
        Issuer name in the Resource Certificates that are issued by
        this issuer.</t>

      </section>

      <section title="This Update">

        <t>This field contains the date and time that this CRL was
        issued. The value of this field MUST be encoded as UTCTime for
        dates through the year 2049, and MUST be encoded as
        GeneralizedTime for dates in the year 2050 or later.</t>

      </section>

      <section title="Next Update">

        <t>This is the date and time by which the next CRL SHOULD be
        issued.  The value of this field MUST be encoded as UTCTime
        for dates through the year 2049, and MUST be encoded as
        GeneralizedTime for dates in the year 2050 or later.</t>

      </section>

      <section title="Signature">

        <t>This field contains the algorithm used to sign this
        CRL. This profile specifies a minimum of SHA-256 with RSA
        (sha256WithRSAEncryption), and allows for the use of SHA-384
        or SHA-512. This field MUST be present.</t>

        <t>It is noted that larger key sizes are computationally
        expensive for both the CRL Issuer and relying parties,
        indicating that care should be taken when deciding to use
        larger than the minimum key size.</t>

      </section>

      <section title="Revoked Certificate List">

        <t>When there are no revoked certificates, then the revoked
        certificate list MUST be absent.</t>

        <t>For each revoked resource certificate only the following
        fields MUST be present. No CRL entry extensions are supported
        in this profile, and CRL entry extensions MUST NOT be present
        in a CRL.</t>

        <section title="Serial Number">

          <t>The issuer's serial number of the revoked certificate.</t>

        </section>

        <section title="Revocation Date">

          <t>The time the certificate was revoked. This time SHOULD
          NOT be a future date. The value of this field MUST be
          encoded as UTCTime for dates through the year 2049, and MUST
          be encoded as GeneralizedTime for dates in the year 2050 or
          later.</t>

        </section>
      </section>

      <section title="CRL Extensions">

        <t>The X.509 v2 CRL format allows extensions to be placed in a
        CRL.  The following extensions are supported in this profile,
        and MUST be present in a CRL.</t>

        <section title="Authority Key Identifier">

          <t>The authority key identifier extension provides a means
          of identifying the public key corresponding to the private
          key used to sign a CRL. Conforming CRL issuers MUST use the
          key identifier method. The syntax for this CRL extension is
          defined in section 4.2.1.1 of <xref
          target="RFC5280"></xref>.</t>

          <t>This extension is non-critical.</t>

        </section>

        <section title="CRL Number">

          <t>The CRL Number extension conveys a monotonically
          increasing sequence number of positive integers for a given
          CA and scope. This extension allows users to easily
          determine when a particular CRL supersedes another CRL. The
          highest CRL Number value supersedes all other CRLs issued by
          the CA with the same scope.</t>

          <t>This extension is non-critical.</t>

        </section>
      </section>
    </section>

    <section title="Resource Certificate Request Profile">

    <t>A resource certificate request MAY use either of PKCS#10 or
    Certificate Request Message Format (CRMF).  A CA Issuer MUST
    support PKCS#10 and a CA Issuer may, with mutual consent of the
    subject, support CRMF.</t>

      <section title="PCKS#10 Profile">

        <t>This profile refines the specification in <xref
        target="RFC2986"></xref>, as it relates to Resource
        Certificates. A Certificate Request Message object, formatted
        according to PKCS#10, is passed to a CA as the initial step in
        issuing a certificate.</t>

        <t>This request may be conveyed to the CA via a Registration
        Authority (RA), acting under the direction of a Subject.</t>

        <t>With the exception of the public key related fields, the CA
        is permitted to alter any requested field when issuing a
        corresponding certificate.</t>

        <section title="PKCS#10 Resource Certificate Request Template Fields">

          <t>This profile applies the following additional constraints
          to fields that may appear in a CertificationRequestInfo:
          <vspace blankLines="1" /> <list style="hanging">

              <t hangText="Version"><vspace blankLines="0" />This
              field is mandatory and MUST have the value 0.<vspace
              blankLines="1" /></t>

              <t hangText="Subject"><vspace blankLines="0" />This
              field is optional. If present, the value of this field
              SHOULD be empty, in which case the issuer MUST generate
              a subject name that is unique in the context of
              certificates issued by this issuer. If the value of this
              field is non-empty, then the CA MAY consider the value
              of this field as the subject's suggested subject name,
              but the CA is NOT bound to honour this suggestion, as
              the subject name MUST be unique per issuer in
              certificates issued by this issuer. <vspace
              blankLines="1" /></t>

              <t hangText="SubjectPublicKeyInfo"><vspace
              blankLines="0" />This field specifies the subject's
              public key and the algorithm with which the key is
              used. The public key algorithm MUST be RSA, and the OID
              for the algorithm is 1.2.840.113549.1.1.1. This field
              also includes a bit-string representation of the
              entity's public key. For the RSA public-key algorithm
              the bit string contains the DER encoding of a value of
              PKCS #1 type RSAPublicKey.<vspace blankLines="1" /></t>

              <t hangText="Attributes"><vspace blankLines="0" /><xref
              target="RFC2986"></xref> defines the attributes field as
              key-value pairs where the key is an OID and the value's
              structure depends on the key.<vspace blankLines="1"
              /></t>

              <t>The only attribute used in this profile is the
              ExtensionRequest attribute as defined in <xref
              target="RFC2985"></xref>. This attribute contains X509v3
              Certificate Extensions. The profile for extensions in
              certificate requests is specified in <xref
              target="exts"></xref>.</t> </list></t>

          <t>This profile applies the following additional constraints
          to fields that MAY appear in a CertificationRequest Object:
          <vspace blankLines="1" /> <list style="hanging">

              <t hangText="signatureAlgorithm"><vspace blankLines="0"
              /> This profile specifies a minimum of SHA-256 with RSA
              (sha256WithRSAEncryption), and allows for the use of
              SHA-384 or SHA-512. Accordingly, the value for this
              field MUST be one of the OID values { pkcs-1 11 }, {
              pkcs-1 12 } or { pkcs-1 13 }
              <xref target="RFC4055"/>.</t>

              <t>It is noted that larger key sizes are computationally
              expensive for both the CA and relying parties,
              indicating that care should be taken when deciding to
              use larger than the minimum key size.</t>


            </list></t>
        </section>
      </section>

      <section title="CRMF Profile">

        <t>This profile refines the Certificate Request Message Format
        (CRMF) specification in <xref target="RFC4211"></xref>, as it
        relates to Resource Certificates. A Certificate Request
        Message object, formatted according to the CRMF, is passed to
        a CA as the initial step in issuing a certificate.</t>

        <t>This request MAY be conveyed to the CA via a Registration
        Authority (RA), acting under the direction of a subject.</t>

        <t>With the exception of the public key related fields, the CA
        is permitted to alter any requested field when issuing a
        corresponding certificate.</t>

        <section title="CRMF Resource Certificate Request Template Fields">

          <t>This profile applies the following additional constraints
          to fields that may appear in a Certificate Request Template:
          <vspace blankLines="1" /> <list style="hanging">

              <t hangText="Version"><vspace blankLines="0" />This
              field MAY be absent, or MAY specify the request of a
              Version 3 Certificate.  It SHOULD be omitted.<vspace
              blankLines="1" /></t>

              <t hangText="SerialNumber"><vspace blankLines="0" /> As
              per <xref target="RFC4211"></xref>, this field is
              assigned by the CA and MUST be omitted in this
              profile. <vspace blankLines="1" /></t>

              <t hangText="SigningAlgorithm"><vspace blankLines="0" />
              As per <xref target="RFC4211"></xref>, this field is
              assigned by the CA and MUST be omitted in this
              profile. <vspace blankLines="1" /></t>

              <t hangText="Issuer"><vspace blankLines="0" /> This
              field is assigned by the CA and MUST be omitted in this
              profile. <vspace blankLines="1" /></t>

              <t hangText="Validity"><vspace blankLines="0" /> This
              field MAY be omitted. If omitted, the CA will issue a
              Certificate with Validity dates as determined by the
              CA. If specified, then the CA MAY override the requested
              values with dates as determined by the CA. <vspace
              blankLines="1" /></t>

              <t hangText="Subject"><vspace blankLines="0" />This
              field is optional. If present, the value of this field
              SHOULD be empty, in which case the issuer MUST generate
              a subject name that is unique in the context of
              certificates issued by this issuer. If the value of this
              field is non-empty, then the CA MAY consider the value
              of this field as the subject's suggested subject name,
              but the CA is NOT bound to honour this suggestion, as
              the subject name MUST be unique per issuer in
              certificates issued by this issuer. <vspace
              blankLines="1" /></t>

              <t hangText="PublicKey"><vspace blankLines="0" /> This
              field MUST be present.<vspace blankLines="1" /></t>

              <t hangText="extensions"><vspace blankLines="0" />This
              attribute contains X509v3 Certificate Extensions. The
              profile for extensions in certificate requests is
              specified in <xref target="exts"></xref>.</t>

            </list></t>
        </section>

        <section title="Resource Certificate Request Control Fields">

          <t>The following control fields are supported in this
          profile: <vspace blankLines="1" /> <list style="hanging">

              <t hangText="Authenticator Control"><vspace
              blankLines="0" /> It is noted that the intended model of
              authentication of the subject is a long term one, and
              the advice as offered in <xref target="RFC4211"></xref>
              is that the Authenticator Control field be used. <vspace
              blankLines="1" /></t>


            </list></t>
        </section>
      </section>

      <section anchor="exts"
               title="Certificate Extension Attributes in Certificate Requests">

        <t>The following extensions MAY appear in a PKCS#10 or CRMF
        Certificate Request. Any other extensions MUST NOT appear in a
        Certificate Request. This profile places the following
        additional constraints on these extensions.: <vspace
        blankLines="1" /> <list style="hanging">

            <t hangText="BasicConstraints"><vspace blankLines="0" />If
            this is omitted then the CA will issue an end entity
            certificate with the BasicConstraints extension not
            present in the issued certificate.<vspace blankLines="1"
            /></t>

            <t>The Path Length Constraint is not supported in this
            Resource Certificate Profile, and this field MUST be
            omitted in this profile.<vspace blankLines="1" /></t>

            <t>The CA MAY honour the SubjectType CA bit set to on. If
            this bit is set, then it indicates that the Subject is
            allowed to issue resource certificates within this overall
            framework.<vspace blankLines="1" /></t>

            <t>The CA MAY honour the SubjectType CA bit set to off
            (End Entity certificate request), in which case the
            corresponding end entity certificate will not contain a
            BasicConstraints extension.  <vspace blankLines="1" /></t>

            <t hangText="SubjectKeyIdentifier"><vspace blankLines="0"
            /> This field is assigned by the CA and MUST be omitted in
            this profile.  <vspace blankLines="1" /></t>

            <t hangText="AuthorityKeyIdentifier"><vspace
            blankLines="0" /> This field is assigned by the CA and
            MUST be omitted in this profile. <vspace blankLines="1"
            /></t>

            <t hangText="KeyUsage"><vspace blankLines="0" />The CA MAY
            honor KeyUsage extensions of keyCertSign and
            cRLSign if present, as long as this is consistent with
            the BasicConstraints SubjectType sub field, when
            specified.<vspace blankLines="1" /></t>

            <t hangText=" SubjectInformationAccess"><vspace
            blankLines="0" /> This field MUST be present when the
            subject is a CA, and the field value SHOULD be honoured by
            the CA. If the CA is not able to honor the requested field
            value, then the CA MUST reject the Certificate
            Request. <vspace blankLines="1" /></t>

            <t>This field (SIA) identifies the location of information
            and services relating to the subject of the certificate in
            which the SIA extension appears. <vspace blankLines="1" /></t>

            <t>Where the subject is a CA
            in this profile, this information and service collection
            will include all current valid certificates that have been
            issued by this subject that are signed with the subject's
            corresponding private key.<vspace blankLines="1" /></t>

            <t>This profile uses a URI form of location
            identification. An RSYNC URI MUST be specified, with an
            access method value of id-ad-caRepository when the subject
            of the certificate is a CA. The RSYNC URI MUST reference
            an object collection rather than an individual object and
            MUST use a trailing '/' in the URI. Other access method
            URIs that reference the same location MAY also be included
            in the value sequence of this extension. The ordering of
            URIs in this sequence reflect the subject's relative
            preferences for access methods, with the first method in
            the sequence being the most preferred by the
            Subject.<vspace blankLines="1" /></t>

            <t>A request for a CA certificate MUST include in the SIA
            of the request the id-ad-caRepository access method, and
            also MUST include in the SIA of the request the
            accessMethod OID of id-ad-rpkiManifest, where the
            associated accessLocation refers to the subject's
            published manifest object as an object URL.</t>

            <t>When an EE certificate is intended for use in verifying
            multiple objects, the certificate request for the EE
            certificate MUST include in the SIA of the request an
            access method OID of id-ad-signedObjectRepository, and
            also MUST include in the SIA of the request an access
            method OID of id-ad-rpkiManifest, where the associated
            access location refers to the publication point of the
            objects that are verified using this EE certificate.</t>

            <t>When an EE certificate is used to sign a single object,
            the certificate request for the EE certificate MUST
            include in the SIA of the request an access method OID of
            id-ad-signedObject, where the associated access location
            refers to the publication point of the single object that
            is verified using this EE certificate, and MUST NOT
            include an id-ad-rpkiManifest access method OID in the SIA
            of the request.<vspace blankLines="1" /></t>

            <t hangText="CRLDistributionPoints"><vspace blankLines="0"
            /> This field is assigned by the CA and MUST be omitted in
            this profile.<vspace blankLines="1" /></t>

            <t hangText="AuthorityInformationAccess"><vspace
            blankLines="0" />This field is assigned by the CA and MUST
            be omitted in this profile.<vspace blankLines="1" /></t>

            <t hangText="CertificatePolicies"><vspace blankLines="0"
            /> This field is assigned by the CA and MUST be omitted in
            this profile.  <vspace blankLines="1" /></t>


          </list></t>

        <t>With the exceptions of the publicKey field and the
        SubjectInformationAccess field, the CA is permitted to alter
        any requested field.</t>

      </section>
    </section>

    <section title="Resource Certificate Validation">

      <t>This section describes the Resource Certificate validation
      procedure.  This refines the generic procedure described in
      section 6 of <xref target="RFC5280"></xref>:</t>

      <t>To meet this goal, the path validation process verifies,
      among other things, that a prospective certification path (a
      sequence of n certificates) satisfies the following conditions:
      <vspace blankLines="1" /> <list style="numbers">

          <t>for all x in {1, ..., n-1}, the subject of certificate x
          is the issuer of certificate x+1; <vspace blankLines="1"
          /></t>

          <t>certificate 1 is issued by a trust anchor; <vspace
          blankLines="1" /></t>

          <t>certificate n is the certificate to be validated; and
          <vspace blankLines="1" /></t>

          <t>for all x in {1, ..., n}, the certificate is valid.</t>
          </list></t>

      <section title="Trust Anchors for Resource Certificates">

        <t>The trust model that may be used in the resource
        certificate framework in the context of validation of
        assertions of public number resources in public-use contexts
        is one that readily maps to a top-down delegated CA model that
        mirrors the delegation of resources from a registry
        distribution point to the entities that are the direct
        recipients of these resources. Within this trust model these
        recipient entities may, in turn, operate a registry and
        perform further allocations or assignments. This is a strict
        hierarchy, in that any number resource and a corresponding
        recipient entity has only one 'parent' issuing registry for
        that number resource (i.e. there is always a unique parent
        entity for any resource and corresponding entity), and that
        the issuing registry is not a direct or indirect subordinate
        recipient entity of the recipient entity in question (i.e.  no
        loops in the model).</t>

        <t>The more general consideration is that selection of a trust
        anchor CA is a task undertaken by relying parties. The
        structure of the resource certificate profile admits
        potentially the same variety of trust models as the PKIX
        profile. There is only one additional caveat on the general
        applicability of trust models and PKIX frameworks, namely that
        in forming a validation path to a trust anchor CA, the
        sequence of certificates MUST preserve the resource extension
        validation property, as described in <xref
        target="resvalid"></xref>, and the validation of the first
        certificate in the validation path not only involves the
        verification that the certificate was issued by a trust anchor
        CA, but also that the resource set described in the
        certificate MUST be encompassed by the trust anchor CA's
        resource set, as described in <xref
        target="resvalid"></xref>.</t>

     <t>

     The trust anchor information, describing a CA that serves as a
     trust anchor, includes the following:
     <list style="numbers">

       <t>the trusted issuer name,</t>

       <t>the trusted public key algorithm,</t>

       <t>the trusted public key,</t>

       <t>optionally, the trusted public key parameters associated
       with the public key, and</t>

       <t>a resource set, consisting of a set of IPv4 resources, IPv6
       resources and AS number resources.</t>

     </list></t>

     <t>The trust anchor information may be provided to the path
     processing procedure in the form of a self-signed
     certificate.</t>

      </section>

      <section anchor="resvalid" title="Resource Extension Validation">

        <t>The IP resource extension definition <xref
        target="RFC3779"></xref> defines a critical extensions for
        Internet number resources. These are ASN.1 encoded
        representations of the IPv4 and IPv6 address range (either as
        a prefix/length, or start-end pair) and the AS number set.</t>

        <t>Valid Resource Certificates MUST have a valid IP address
        and/or AS number resource extension. In order to validate a
        Resource Certificate the resource extension must also be
        validated. This validation process relies on definitions of
        comparison of resource sets: <vspace blankLines="1" /> <list
        style="hanging">

            <t hangText="more specific:">Given two IP address or AS
            number contiguous ranges, A and B, A is "more specific"
            than B if range B includes all IP addresses or AS numbers
            described by range A, and if range B is larger than range
            A. <vspace blankLines="1" /></t>

            <t hangText="equal:">Given two IP address or AS number
            contiguous ranges, A and B, A is "equal" to B if range A
            describes precisely the same collection of IP addresses or
            AS numbers as described by range B. The definition of
            "inheritance" in <xref target="RFC3779"></xref> is
            equivalent to this "equality" comparison.</t>

            <t hangText="encompass:">Given two IP address and AS
            number sets X and Y, X "encompasses" Y if, for every
            contiguous range of IP addresses or AS numbers elements in
            set Y, the range element is either more specific than or
            equal to a contiguous range element within the set X.</t>
            </list></t>

        <t>Validation of a certificate's resource extension in the
        context of an ordered certificate sequence of {1,2, ... , n}
        where '1'is issued by a trust anchor and 'n' is the target
        certificate, and where the subject of certificate 'x' is the
        issuer of certificate 'x' + 1, implies that the resources
        described in certificate 'x' "encompass" the resources
        described in certificate 'x' + 1, and the resources described
        in the trust anchor information "encompass" the resources
        described in certificate 1.
        </t>
      </section>

      <section title="Resource Certificate Path Validation">

        <t>Validation of signed resource data using a target resource
        certificate consists of assembling an ordered sequence (or
        'Certificate Path') of certificates ({1,2,...n} where '1' is a
        certificate that has been issued by a trust anchor, and 'n' is
        the target certificate) verifying that all of the following
        conditions hold: <vspace blankLines="1" /> <list
        style="numbers"> <t>The certificate can be verified using the
        Issuer's public key and the signature algorithm <vspace
        blankLines="1" /></t>

            <t>The current time lies within the certificate's Validity
            From and To values. <vspace blankLines="1" /></t>

            <t>The certificate contains all fields that MUST be
            present and contains field values as specified in this
            profile for all field values that MUST be present. <vspace
            blankLines="1" /></t>

            <t>No field value that MUST NOT be present in this profile
            is present in the certificate. <vspace blankLines="1"
            /></t>

            <t>The Issuer has not revoked the certificate by placing
            the certificate's serial number on the Issuer's current
            Certificate Revocation List, and the Certificate
            Revocation List is itself valid. <vspace blankLines="1"
            /></t>

            <t>That the resource extension data is "encompassed" by
            the resource extension data contained in a valid
            certificate where this Issuer is the Subject (the previous
            certificate in the ordered sequence) <vspace
            blankLines="1" /></t>

            <t>The Certificate Path originates with a certificate
            issued by a trust anchor, and there exists a signing chain
            across the Certificate Path where the Subject of
            Certificate x in the Certificate Path matches the Issuer
            in Certificate x+1 in the Certificate Path.</t>

          </list></t>

        <t>A certificate validation algorithm may perform these tests
        in any chosen order.</t>

        <t>Certificates and CRLs used in this process may be found in
        a locally maintained cache, maintained by a regular top-down
        synchronization pass, seeded with the CAs who operate at the
        apex of the resource distribution hierarchy, via reference to
        Issued certificates and their SIA fields as forward pointers,
        plus the CRLDP. Alternatively, validation may be performed
        using a bottom-up process with on-line certificate access
        using the AIA and CRLDP pointers to guide the certificate
        retrieval process.</t>

        <t>There exists the possibility of encountering certificate
        paths that are arbitrarily long, or attempting to generate
        paths with loops as means of creating a potential DOS attack
        on a certificate validator.  Some further heuristics may be
        required to halt the certificate path validation process in
        order to avoid some of the issues associated with attempts to
        validate such structures. It is suggested that implementations
        of Resource Certificate validation MAY halt with a validation
        failure if the certificate path length exceeds a
        pre-determined configuration parameter.</t>

      </section>
    </section>

    <section title="Security Considerations">

      <t>The Security Considerations of <xref target="RFC5280"></xref>
      and <xref target="RFC3779"></xref>apply to Resource Certificates
      as defined by this profile, and their use.</t>

      <t>A Resource Certificate PKI cannot in and of itself resolve
      any forms of ambiguity relating to uniqueness of assertions of
      rights of use in the event that two or more valid certificates
      encompass the same resource.  If the issuance of resource
      certificates is aligned to the status of resource allocations
      and assignments then the information conveyed in a certificate
      is no better than the information in the allocation and
      assignment databases. </t>

    </section>

    <section title="IANA Considerations">

      <t>[Note to IANA, to be removed prior to publication: there are
      no IANA considerations stated in this version of the
      document.]</t>
    </section>

    <section title="Acknowledgements">

      <t>The authors would like to acknowledge the valued
      contributions from Stephen Kent, Robert Kisteleki, Randy Bush,
      Russ Housley, Ricardo Patara and Rob Austein in the preparation
      and subsequent review of this document. The document also reflects
      review comments received from Sean Turner.</t>

    </section>
  </middle>

  <back>

    <references title="Normative References">
      <?rfc include='./rfcs/bibxml/reference.RFC.0791.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.2050.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.3779.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.4055.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.4211.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.4291.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.5280.xml'?>

    </references>
 
    <references title="Informative References">

      <?rfc include='./rfcs/bibxml/reference.RFC.2985.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.2986.xml'?>

      <?rfc include='./rfcs/bibxml/reference.RFC.4158.xml'?>

      <reference anchor="ID.SIDR-MANIFESTS">
        <front>
          <title>Manifests for the Resource Public Key Infrastructure</title>
          <author fullname="Rob Austein"  initials="R." surname="Austein">
            <organization>ISC</organization></author>
          <author fullname="Geoff Huston" initials="G." surname="Huston">
            <organization>APNIC</organization></author>
          <author fullname="S. Kent"      initials="S" surname="Kent">
            <organization>BBN</organization></author>
          <author fullname="M. Lepinski"  initials="M" surname="Lepinski">
            <organization>BBN</organization></author>
          <date month="January" year="2008" />
        </front>
        <seriesInfo name="Work in progress: Internet Drafts" value="draft-ietf-sidr-rpki-manifests-00.txt" />
      </reference>

      <reference anchor="rsync" target="http://samba.anu.edu.au/rsync/">
        <front>
          <title>rsync</title>
          <author fullname="A. Tridgell" initials="A" surname="Tridgell">
            <organization>SAMBA</organization></author>
          <date month="April" year="2006" />
        </front>
      </reference>
    </references>

    <section title="Example Resource Certificate">
      <t>The following is an example Resource Certificate.</t>

      <figure>
        <artwork><![CDATA[
Certificate Name: hu9fdDBq60mrk7cPRuX2DYuXSRQ-3.cer

Data:
  Version: 3
  Serial: 3
  Signature Algorithm: Hash: SHA256, Encryption: RSA
  Issuer: CN=Demo Production APNIC CA - Not for real use,
    E=ca@apnic.net
  Validity:
    Not Before: Thu Jul 27 06:34:04 2006 GMT
    Not After: Fri Jul 27 06:34:04 2007 GMT
  Subject: CN=APNIC own-use network resources
  Subject Key Identifier:
    86:ef:5f:74:30:6a:eb:49:ab:93:b7:0f:46:e5:f6:0d:
    8b:97:49:14
  Subject Key Identifier g(SKI):
    hu9fdDBq60mrk7cPRuX2DYuXSRQ
  Subject Public Key Info:
    Public Key Algorithm: rsaEncryption
      RSA Public Key: Modulus:
        c1:25:a1:b0:db:89:83:a0:fc:f1:c0:e4:7b:93:76:c1:
        59:b7:0d:ac:25:25:ed:88:ce:00:03:ea:99:1a:9a:2a:
        0e:10:2e:5f:c0:45:87:47:81:7b:1d:4d:44:aa:65:a3:
        f8:07:84:32:ea:04:70:27:05:2b:79:26:e6:e6:3a:cb:
        b2:9a:65:6c:c1:4e:d7:35:fb:f6:41:1e:8b:1c:b8:e4:
        5a:3a:d6:d0:7b:82:9a:23:03:f8:05:4c:68:42:67:fe:
        e7:45:d9:2c:a6:d1:b3:da:cf:ad:77:c5:80:d2:e3:1e:
        4d:e8:bf:a2:f2:44:10:b2:2f:61:bc:f4:89:31:54:7c:
        56:47:d5:b1:c3:48:26:95:93:c9:6f:70:14:4d:ac:a5:
        c2:8e:3d:1f:6d:f8:d4:93:9d:14:c7:15:c7:34:8e:ba:
        dd:70:b3:c2:2b:08:78:59:97:dd:e4:34:c7:d8:de:5c:
        f7:94:6f:95:59:ba:29:65:f5:98:15:8f:8e:57:59:5d:
        92:1f:64:2f:b5:3d:69:2e:69:83:c2:10:c6:aa:8e:03:
        d5:69:11:bd:0d:b5:d8:27:6c:74:2f:60:47:dd:2e:87:
        24:c2:36:68:2b:3c:fd:bd:22:57:a9:4d:e8:86:3c:27:
        03:ce:f0:03:2e:59:ce:05:a7:41:3f:2f:64:50:dd:e7
      RSA Public Key: Exponent: 65537
  Basic Constraints: CA: TRUE
  Subject Info Access:
    caRepository - rsync://repository.apnic.net/APNIC/
                          pvpjvwUeQix2e54X8fGbhmdYMo0/
                          q66IrWSGuBE7jqx8PAUHAlHCqRw/
                          hu9fdDBq60mrk7cPRuX2DYuXSRQ/
  Key Usage: keyCertSign, cRLSign
  CRL Distribution Points:
    rsync://repository.apnic.net/APNIC/
           pvpjvwUeQix2e54X8fGbhmdYMo0/
           q66IrWSGuBE7jqx8PAUHAlHCqRw/
           q66IrWSGuBE7jqx8PAUHAlHCqRw.crl
  Authority Info Access: caIssuers -
    rsync://repository.apnic.net/APNIC/
           pvpjvwUeQix2e54X8fGbhmdYMo0/
           q66IrWSGuBE7jqx8PAUHAlHCqRw.cer
  Authority Key Identifier: Key Identifier:
    ab:ae:88:ad:64:86:b8:11:3b:8e:ac:7c:3c:05:07:02:
    51:c2:a9:1c
  Authority Key Identifier: Key Identifier g(AKI):
    q66IrWSGuBE7jqx8PAUHAlHCqRw
  Certificate Policies: 1.3.6.1.5.5.7.14.2
  IPv4: 192.0.2.0/24,
  IPv6: 2001:DB8::/32
  ASNum: 4608, 4777, 9545, 18366-18370
  Signature:
    c5:e7:b2:f3:62:cb:e3:bc:50:1e:6b:90:13:19:f4:5b:
    4a:1c:1c:ab:b5:de:b1:a4:22:e0:28:f5:3b:d0:8c:59:
    0f:85:f2:06:a6:ae:22:e6:d0:99:fe:cb:eb:1d:6a:e2:
    a3:f1:a2:25:95:ec:a7:7d:96:35:dc:16:a7:2f:f5:b7:
    11:ba:97:05:57:5f:5d:07:5a:c8:19:c8:27:d3:f7:a3:
    92:66:cb:98:2d:e1:7f:a8:25:96:ab:af:ed:87:02:28:
    f5:ae:b6:e3:0c:f7:18:82:70:82:f4:76:54:06:b9:9f:
    e1:a5:f7:ae:72:dd:ee:f0:d4:d2:78:bb:61:73:cf:51:
    26:9f:ea:e8:20:49:06:ba:0c:ac:1d:f6:07:b8:63:a0:
    4d:3d:8e:12:84:3a:d0:ec:94:7e:02:db:d4:85:cf:12:
    5c:7b:12:1a:52:ab:3c:ba:00:f2:71:e7:f0:fd:b3:f4:
    81:e8:a7:cb:07:ca:3a:a4:24:fe:dc:bb:51:16:6a:28:
    33:40:a4:64:60:75:0e:c8:06:c8:5f:e5:98:be:16:a3:
    bc:19:e7:b3:4f:00:0a:8e:81:33:dd:4c:a0:fb:f5:1c:
    1f:1d:3f:b5:90:8b:ec:98:67:76:95:56:8a:94:45:54:
    52:3d:1c:69:4c:6f:8a:9f:09:ec:ef:b0:a9:bc:cf:9d
    ]]></artwork>
      </figure>
    </section>

    <section title="Example Certificate Revocation List">
      <t>The following is an example Certificate Revocation List.</t>

      <figure>
        <artwork><![CDATA[CRL Name: q66IrWSGuBE7jqx8PAUHAlHCqRw.crl

Data:
  Version: 2
  Signature Algorithm:
    Hash: SHA256, Encryption: RSA
  Issuer: CN=Demo Production APNIC CA - Not for real use,
    E=ca@apnic.net
  This Update: Thu Jul 27 06:30:34 2006 GMT
  Next Update: Fri Jul 28 06:30:34 2006 GMT
  Authority Key Identifier: Key Identifier:
    ab:ae:88:ad:64:86:b8:11:3b:8e:ac:7c:3c:05:
    07:02:51:c2:a9:1c
  Authority Key Identifier: Key Identifier g(AKI):
    q66IrWSGuBE7jqx8PAUHAlHCqRw
  CRLNumber: 4
  Revoked Certificates: 1
    Serial Number: 1
    Revocation Date: Mon Jul 17 05:10:19 2006 GMT
    Serial Number: 2
    Revocation Date: Mon Jul 17 05:12:25 2006 GMT
    Serial Number: 4
    Revocation Date: Mon Jul 17 05:40:39 2006 GMT
  Signature:
    b2:5a:e8:7c:bd:a8:00:0f:03:1a:17:fd:40:2c:46:
    0e:d5:64:87:e7:e7:bc:10:7d:b6:3e:39:21:a9:12:
    f4:5a:d8:b8:d4:bd:57:1a:7d:2f:7c:0d:c6:4f:27:
    17:c8:0e:ae:8c:89:ff:00:f7:81:97:c3:a1:6a:0a:
    f7:d2:46:06:9a:d1:d5:4d:78:e1:b7:b0:58:4d:09:
    d6:7c:1e:a0:40:af:86:5d:8c:c9:48:f6:e6:20:2e:
    b9:b6:81:03:0b:51:ac:23:db:9f:c1:8e:d6:94:54:
    66:a5:68:52:ee:dd:0f:10:5d:21:b8:b8:19:ff:29:
    6f:51:2e:c8:74:5c:2a:d2:c5:fa:99:eb:c5:c2:a2:
    d0:96:fc:54:b3:ba:80:4b:92:7f:85:54:76:c9:12:
    cb:32:ea:1d:12:7b:f8:f9:a2:5c:a1:b1:06:8e:d8:
    c5:42:61:00:8c:f6:33:11:29:df:6e:b2:cc:c3:7c:
    d3:f3:0c:8d:5c:49:a5:fb:49:fd:e7:c4:73:68:0a:
    09:0e:6d:68:a9:06:52:3a:36:4f:19:47:83:59:da:
    02:5b:2a:d0:8a:7a:33:0a:d5:ce:be:b5:a2:7d:8d:
    59:a1:9d:ee:60:ce:77:3d:e1:86:9a:84:93:90:9f:
    34:a7:02:40:59:3a:a5:d1:18:fb:6f:fc:af:d4:02:
    d9

    ]]></artwork>
      </figure>
    </section>
  </back>
</rfc>
