| < draft-ietf-tls-multiple-cert-status-extension-01.txt | draft-ietf-tls-multiple-cert-status-extension-02.txt > | |||
|---|---|---|---|---|
| Network Working Group Y. Pettersen | Network Working Group Y. Pettersen | |||
| Internet-Draft Opera Software ASA | Internet-Draft Opera Software ASA | |||
| Intended status: Standards Track July 8, 2012 | Intended status: Standards Track October 19, 2012 | |||
| Expires: January 9, 2013 | Expires: April 22, 2013 | |||
| The TLS Multiple Certificate Status Request Extension | The TLS Multiple Certificate Status Request Extension | |||
| draft-ietf-tls-multiple-cert-status-extension-01 | draft-ietf-tls-multiple-cert-status-extension-02 | |||
| Abstract | Abstract | |||
| This document defines the Transport Layer Security (TLS) Certificate | This document defines the Transport Layer Security (TLS) Certificate | |||
| Status Version 2 Extension to allow clients to specify and support | Status Version 2 Extension to allow clients to specify and support | |||
| multiple certificate status methods. Also defined is a new method | multiple certificate status methods. Also defined is a new method | |||
| that a server can use to provide status information (i.e., based on | based on the Online Certificate Status Protocol (OCSP) that servers | |||
| the Online Certificate Status Protocol and Server-Based Certificate | can use to provide status information not just about the server's own | |||
| Validation Protocol) not just about the server's own certificate, but | certificate, but also the status of intermediate certificates in the | |||
| also the status of intermediate certificates in the chain. | chain. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on January 9, 2013. | This Internet-Draft will expire on April 22, 2013. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2012 IETF Trust and the persons identified as the | Copyright (c) 2012 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 38 ¶ | skipping to change at page 2, line 38 ¶ | |||
| problem that can become significant when the issued certificate is | problem that can become significant when the issued certificate is | |||
| presented by a frequently visited server. | presented by a frequently visited server. | |||
| There are two problems with the existing Certificate Status | There are two problems with the existing Certificate Status | |||
| extension. First, it does not provide functionality to request the | extension. First, it does not provide functionality to request the | |||
| status information about intermediate Certification Authority (CA) | status information about intermediate Certification Authority (CA) | |||
| certificates, which means the client has to request status | certificates, which means the client has to request status | |||
| information through other methods, such as Certificate Revocation | information through other methods, such as Certificate Revocation | |||
| Lists (CRLs), thus adding additional delay. Second, the current | Lists (CRLs), thus adding additional delay. Second, the current | |||
| format of the extension and requirements in the TLS protocol prevents | format of the extension and requirements in the TLS protocol prevents | |||
| a client from offering the server multiple status methods; there are | a client from offering the server multiple status methods. | |||
| two methods available, the Online Certificate Status Protocol (OCSP) | ||||
| [RFC2560] and the Server-Based Certificate Validation Protocol (SCVP) | ||||
| [RFC5055]. | ||||
| Many CAs now issue intermediate CA certificates that not only specify | Many CAs are now issuing intermediate CA certificates that not only | |||
| the publication point for their CRLs in CRL Distribution Point | specify the publication point for their CRLs in a CRL Distribution | |||
| [RFC5280], but also specify a URL for their OCSP [RFC2560] server in | Point [RFC5280], but also specify a URL for their OCSP [RFC2560] | |||
| Authority Information Access [RFC5280]. Given that client-cached | server in Authority Information Access [RFC5280]. Given that client- | |||
| CRLs are frequently out of date, clients would benefit from using | cached CRLs are frequently out of date, clients would benefit from | |||
| OCSP, or other protocols, to access up-to-date status information | using OCSP to access up-to-date status information about intermediate | |||
| about intermediate CA certificates. The benefit to the issuing CA is | CA certificates. The benefit to the issuing CA is less clear, as | |||
| less clear, as providing the bandwidth for the OCSP responder can be | providing the bandwidth for the OCSP responder can be costly, | |||
| costly, especially for CAs with many high-traffic subscriber sites, | especially for CAs with many high-traffic subscriber sites, and this | |||
| and this cost is a concern for many CAs. There are cases where OCSP | cost is a concern for many CAs. There are cases where OCSP requests | |||
| requests for a single high-traffic site caused significant network | for a single high-traffic site caused significant network problems | |||
| problems for the issuing CA. | for the issuing CA. | |||
| Clients will benefit from the TLS server providing certificate status | Clients will benefit from the TLS server providing certificate status | |||
| information regardless of type, not just for the server certificate, | information regardless of type, not just for the server certificate, | |||
| but also for the intermediate CA certificates. Combining the status | but also for the intermediate CA certificates. Combining the status | |||
| checks into one extension will reduce the roundtrips needed to | checks into one extension will reduce the roundtrips needed to | |||
| complete the handshake by the client to just those needed for | complete the handshake by the client to just those needed for | |||
| negotiating the TLS connection. Also, for the Certification | negotiating the TLS connection. Also, for the Certification | |||
| Authorities, the load on their servers will depend on the number of | Authorities, the load on their servers will depend on the number of | |||
| certificates they have issued, not on the number of visitors to those | certificates they have issued, not on the number of visitors to those | |||
| sites. | sites. | |||
| For such a new system to be introduced seamlessly, clients need to be | For such a new system to be introduced seamlessly, clients need to be | |||
| able to indicate support for the existing OCSP Certificate Status | able to indicate support for the existing OCSP Certificate Status | |||
| method and a new multiple-OCSP mode or the new SCVP mode. | method, and a new multiple-OCSP mode. | |||
| Unfortunately, the definition of the Certificate Status extension | Unfortunately, the definition of the Certificate Status extension | |||
| only allows a single Certificate Status extension to be defined in a | only allows a single Certificate Status extension to be defined in a | |||
| single extension record in the handshake, and the TLS Protocol | single extension record in the handshake, and the TLS Protocol | |||
| [RFC5246] only allows a single record in the extension list for any | [RFC5246] only allows a single record in the extension list for any | |||
| given extension. This means that it is not possible for clients to | given extension. This means that it is not possible for clients to | |||
| indicate support for new methods while still supporting older | indicate support for new methods while still supporting older | |||
| methods, which would cause problems for interoperability between | methods, which would cause problems for interoperability between | |||
| newer clients and older servers. This will not just be an issue for | newer clients and older servers. This will not just be an issue for | |||
| the multiple status request mode proposed above, but also for any | the multiple status request mode proposed above, but also for any | |||
| skipping to change at page 4, line 6 ¶ | skipping to change at page 4, line 4 ¶ | |||
| presented, no significant changes are needed in the server's | presented, no significant changes are needed in the server's | |||
| extension format. | extension format. | |||
| 1.1. Requirements Language | 1.1. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
| 2. Multiple Certificate Status Extension | 2. Multiple Certificate Status Extension | |||
| 2.1. New extension | 2.1. New extension | |||
| The extension defined by this document is indicated by the | The extension defined by this document is indicated by the | |||
| "status_request_v2" in the ExtensionType enum, which uses the | "status_request_v2" in the ExtensionType enum, which uses the | |||
| following value: | following value: | |||
| enum { | enum { | |||
| status_request_v2(XX), (65535) | status_request_v2(XX), (65535) | |||
| } ExtensionType; | } ExtensionType; | |||
| [[ EDITOR: The value used for status_request_v2 has been left as | [[ EDITOR: The value used for status_request_v2 has been left as | |||
| "XX". This value will be assigned when this draft progresses to | "XX". This value will be assigned when this draft progresses to | |||
| RFC.]] | RFC.]] | |||
| 2.2. Multiple Certificate Status Request record | 2.2. Multiple Certificate Status Request record | |||
| Clients that support a certificate status protocol (i.e., OCSP and | Clients that support a certificate status protocol like OCSP may send | |||
| SCVP) may send the status_request_v2 extension to the server in order | the status_request_v2 extension to the server in order to use the TLS | |||
| to use the TLS handshake to transfer such data instead of downloading | handshake to transfer such data instead of downloading it through | |||
| it through separate connections. When using this extension, the | separate connections. When using this extension, the | |||
| "extension_data" field of the extension SHALL contain a | "extension_data" field of the extension SHALL contain a | |||
| CertificateStatusRequestList where: | CertificateStatusRequestList where: | |||
| struct { | struct { | |||
| CertificateStatusType status_type; | CertificateStatusType status_type; | |||
| uint16 request_length; /* Length of request field in bytes */ | uint16 request_length; /* Length of request field in bytes */ | |||
| select (status_type) { | select (status_type) { | |||
| case ocsp: OCSPStatusRequest; | case ocsp: OCSPStatusRequest; | |||
| case ocsp_multi: OCSPStatusRequest; | case ocsp_multi: OCSPStatusRequest; | |||
| case scvp: SCVPStatusRequest; | } request; | |||
| } request; | } CertificateStatusRequestItem; | |||
| } CertificateStatusRequestItem; | ||||
| enum { | ||||
| ocsp(1), ocsp_multi(YY), scvp (AA),(255) | ||||
| } CertificateStatusType; | ||||
| struct { | enum { ocsp(1), ocsp_multi(YY), (255) } CertificateStatusType; | |||
| ResponderID responder_id_list<0..2^16-1>; | ||||
| Extensions request_extensions; | ||||
| } OCSPStatusRequest; | ||||
| struct { | struct { | |||
| ResponderID responder_id_list<0..2^16-1>; | ResponderID responder_id_list<0..2^16-1>; | |||
| Extensions request_extensions; | Extensions request_extensions; | |||
| } SCVPStatusRequest; | } OCSPStatusRequest; | |||
| opaque ResponderID<1..2^16-1>; | opaque ResponderID<1..2^16-1>; | |||
| opaque Extensions<0..2^16-1>; | opaque Extensions<0..2^16-1>; | |||
| struct { | struct { | |||
| CertificateStatusRequestItem certificate_status_req_list<1..2^16-1> | CertificateStatusRequestItem certificate_status_req_list<1..2^16-1>; | |||
| } CertificateStatusRequestList | } CertificateStatusRequestList; | |||
| [[ EDITOR: The values used for ocsp_multi and scvp have been left as | [[ EDITOR: The value used for ocsp_multi has been left as YY. This | |||
| "YY" and "AA", respectively. These values will be assigned when this | value will be assigned when this draft progresses to RFC.]] | |||
| draft progresses to RFC.]] | ||||
| In the OCSPStatusRequest and SCVPStatusRequest structures, the | In the OCSPStatusRequest, the "ResponderIDs" provides a list of OCSP | |||
| "ResponderIDs" provide a list of OCSP and SCVP responders | responders that the client trusts. A zero-length "responder_id_list" | |||
| (respectively) that the client trusts. A zero-length | sequence has the special meaning that the responders are implicitly | |||
| "responder_id_list" sequence has the special meaning that the | known to the server, e.g., by prior arrangement, or are identfied by | |||
| responders are implicitly known to the server, e.g., by prior | the certificates used by the server. "Extensions" is a DER encoding | |||
| arrangement, or are identfied by the certificates used by the server. | [CCITT.X690.2002] of the OCSP request extensions. | |||
| "Extensions" is a DER encoding [CCITT.X690.2002] of the OCSP and SCVP | ||||
| request extensions (respectively). | ||||
| Both "ResponderID" and "Extensions" are DER-encoded ASN.1 types as | Both "ResponderID" and "Extensions" are DER-encoded ASN.1 types as | |||
| defined in [RFC2560] (for OCSP) and [RFC5055] (for SCVP). | defined in [RFC2560]. "Extensions" is imported from [RFC5280]. A | |||
| "Extensions" is imported from [RFC5280]. A zero-length | zero-length "request_extensions" value means that there are no | |||
| "request_extensions" value means that there are no extensions (as | extensions (as opposed to a zero-length ASN.1 SEQUENCE, which is not | |||
| opposed to a zero-length ASN.1 SEQUENCE, which is not valid for the | valid for the "Extensions" type). | |||
| "Extensions" type). | ||||
| In the case of the "id-pkix-ocsp-nonce" OCSP extension, [RFC2560] is | In the case of the "id-pkix-ocsp-nonce" OCSP extension, [RFC2560] is | |||
| unclear about its encoding; for clarification, the nonce MUST be a | unclear about its encoding; for clarification, the nonce MUST be a | |||
| DER-encoded OCTET STRING, which is encapsulated as another OCTET | DER-encoded OCTET STRING, which is encapsulated as another OCTET | |||
| STRING (note that implementations based on an existing OCSP client | STRING (note that implementations based on an existing OCSP client | |||
| will need to be checked for conformance to this requirement). | will need to be checked for conformance to this requirement). | |||
| The list of CertificateStatusRequestItem entries MUST be in order of | The list of CertificateStatusRequestItem entries MUST be in order of | |||
| preference. | preference. | |||
| skipping to change at page 6, line 40 ¶ | skipping to change at page 6, line 10 ¶ | |||
| "status_request_v2" with empty "extension_data" in the extended | "status_request_v2" with empty "extension_data" in the extended | |||
| server hello. The "CertificateStatus" message is conveyed using the | server hello. The "CertificateStatus" message is conveyed using the | |||
| handshake message type "certificate_status" as follows (see also | handshake message type "certificate_status" as follows (see also | |||
| [RFC6066]): | [RFC6066]): | |||
| struct { | struct { | |||
| CertificateStatusType status_type; | CertificateStatusType status_type; | |||
| select (status_type) { | select (status_type) { | |||
| case ocsp: OCSPResponse; | case ocsp: OCSPResponse; | |||
| case ocsp_multi: OCSPResponseList; | case ocsp_multi: OCSPResponseList; | |||
| case scvp: SCVPResponse; | ||||
| } response; | } response; | |||
| } CertificateStatus; | } CertificateStatus; | |||
| opaque OCSPResponse<0..2^24-1>; | opaque OCSPResponse<0..2^24-1>; | |||
| opaque SCVPResponse<0..2^24-1>; | ||||
| struct { | struct { | |||
| OCSPResponse ocsp_response_list<1..2^24-1> | OCSPResponse ocsp_response_list<1..2^24-1>; | |||
| } OCSPResponseList | } OCSPResponseList; | |||
| An "OCSPResponse" element contains a complete, DER-encoded OCSP | An "OCSPResponse" element contains a complete, DER-encoded OCSP | |||
| response (using the ASN.1 syntax [CCITT.X680.2002] of type | response (using the ASN.1 [CCITT.X680.2002] type OCSPResponse defined | |||
| OCSPResponse as defined in [RFC2560]). Only one OCSP response, with | in [RFC2560]). Only one OCSP response, with a length of at least one | |||
| a length of at least one byte, may be sent for status_type "ocsp". | byte, may be sent for status_type "ocsp". | |||
| An "SCVPResponse" element contains a complete, DER-encoded SCVP | ||||
| response (using the ASN.1 syntax [CCITT.X680.2002] of type CVResponse | ||||
| as defined in [RFC5055]). Only one SCVP response, with a length of | ||||
| at least one byte, may be sent for status_type "scvp". An SCVP | ||||
| response can include the status of intermediate certificates. | ||||
| An "ocsp_response_list" contains a list of "OCSPResponse" elements, | An "ocsp_response_list" contains a list of "OCSPResponse" elements, | |||
| as specified above, each containing the OCSP response for the | as specified above, each containing the OCSP response for the | |||
| matching corresponding certificate in the server's Certificate TLS | matching corresponding certificate in the server's Certificate TLS | |||
| handshake message. That is, the first entry is the OCSP response for | handshake message. That is, the first entry is the OCSP response for | |||
| the first certificate in the Certificate list, the second entry is | the first certificate in the Certificate list, the second entry is | |||
| the response for the second certificate, and so on. The list MAY | the response for the second certificate, and so on. The list MAY | |||
| contain fewer OCSP responses than there were certificates in the | contain fewer OCSP responses than there were certificates in the | |||
| Certificate handshake message, but there MUST NOT be more responses | Certificate handshake message, but there MUST NOT be more responses | |||
| than there were certificates in the list. Individual elements of the | than there were certificates in the list. Individual elements of the | |||
| skipping to change at page 7, line 45 ¶ | skipping to change at page 7, line 5 ¶ | |||
| Note that a server MAY also choose not to send a "CertificateStatus" | Note that a server MAY also choose not to send a "CertificateStatus" | |||
| message, even if it has received a "status_request_v2" extension in | message, even if it has received a "status_request_v2" extension in | |||
| the client hello message and has sent a "status_request_v2" extension | the client hello message and has sent a "status_request_v2" extension | |||
| in the server hello message. Additionally, note that that a server | in the server hello message. Additionally, note that that a server | |||
| MUST NOT send the "CertificateStatus" message unless it received | MUST NOT send the "CertificateStatus" message unless it received | |||
| either a "status_request" or "status_request_v2" extension in the | either a "status_request" or "status_request_v2" extension in the | |||
| client hello message and sent a corresponding "status_request" or | client hello message and sent a corresponding "status_request" or | |||
| "status_request_v2" extension in the server hello message. | "status_request_v2" extension in the server hello message. | |||
| Clients requesting a certificate response and receiving either one or | Clients requesting an OCSP response and receiving one or more OCSP | |||
| more OCSP responses or a SCVP response in a "CertificateStatus" | responses in a "CertificateStatus" message MUST check the OCSP | |||
| message MUST check the response(s) and abort the handshake, if the | response(s) and abort the handshake, if the response is a revoked | |||
| response is a revoked status or is otherwise not satisfactory with a | status or is otherwise not satisfactory with a | |||
| bad_certificate_status_response(113) alert. This alert is always | bad_certificate_status_response(113) alert. This alert is always | |||
| fatal. | fatal. | |||
| [[Open issue: At least one reviewer has suggested that the client | [[Open issue: At least one reviewer has suggested that the client | |||
| should treat an unsatisfactory (non-revoked) response as an empty | should treat an unsatisfactory (non-revoked) response as an empty | |||
| response for that particular response and fall back to the | response for that particular response and fall back to the | |||
| alternative method described above]] | alternative method described above]] | |||
| 3. IANA Considerations | 3. IANA Considerations | |||
| skipping to change at page 8, line 30 ¶ | skipping to change at page 7, line 39 ¶ | |||
| 4. Security Considerations | 4. Security Considerations | |||
| General Security Considerations for TLS Extensions are covered in | General Security Considerations for TLS Extensions are covered in | |||
| [RFC5246]. Security Considerations for the particular extension | [RFC5246]. Security Considerations for the particular extension | |||
| specified in this document are given below. In general, implementers | specified in this document are given below. In general, implementers | |||
| should continue to monitor the state of the art and address any | should continue to monitor the state of the art and address any | |||
| weaknesses identified. | weaknesses identified. | |||
| 4.1. Security Considerations for status_request_v2 | 4.1. Security Considerations for status_request_v2 | |||
| If a client requests an OCSP or SCVP response, it must take into | If a client requests an OCSP response, it must take into account that | |||
| account that an attacker's server using a compromised key could (and | an attacker's server using a compromised key could (and probably | |||
| probably would) pretend not to support the extension. In this case, | would) pretend not to support the extension. In this case, a client | |||
| a client that requires OCSP or SCVP validation of certificates SHOULD | that requires OCSP validation of certificates SHOULD either contact | |||
| either contact the OCSP or SCVP server directly or abort the | the OCSP server directly or abort the handshake. | |||
| handshake. | ||||
| Use of the OCSP (id-pkix-ocsp-nonce) or SCVP nonce request extension | Use of the OCSP nonce request extension (id-pkix-ocsp-nonce) may | |||
| may improve security against attacks that attempt to replay OCSP or | improve security against attacks that attempt to replay OCSP | |||
| SCVP responses; see Section 4.4.1 of [RFC2560] and Section 9 of | responses; see Section 4.4.1 of [RFC2560] for further details. | |||
| [RFC5055] for further details. | ||||
| The security considerations of [RFC2560] apply to OCSP requests and | The security considerations of [RFC2560] apply to OCSP requests and | |||
| responses, and the security considerations of [RFC5055] apply to SCVP | responses. | |||
| erquests and responses. | ||||
| 5. Acknowledgements | 5. Acknowledgements | |||
| This document is based on [RFC6066] authored by Donald Eastlake 3rd. | This document is based on [RFC6066] authored by Donald Eastlake 3rd. | |||
| The SCVP status type description is based on text provided by Sean | ||||
| Turner. | ||||
| 6. Normative References | 6. Normative References | |||
| [CCITT.X680.2002] | [CCITT.X680.2002] | |||
| International International Telephone and Telegraph | International International Telephone and Telegraph | |||
| Consultative Committee, "Abstract Syntax Notation One | Consultative Committee, "Abstract Syntax Notation One | |||
| (ASN.1): Specification of basic notation", | (ASN.1): Specification of basic notation", | |||
| CCITT Recommendation X.680, July 2002. | CCITT Recommendation X.680, July 2002. | |||
| [CCITT.X690.2002] | [CCITT.X690.2002] | |||
| International International Telephone and Telegraph | International International Telephone and Telegraph | |||
| skipping to change at page 9, line 30 ¶ | skipping to change at page 8, line 31 ¶ | |||
| encoding rules (CER) and Distinguished encoding rules | encoding rules (CER) and Distinguished encoding rules | |||
| (DER)", CCITT Recommendation X.690, July 2002. | (DER)", CCITT Recommendation X.690, July 2002. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC2560] Myers, M., Ankney, R., Malpani, A., Galperin, S., and C. | [RFC2560] Myers, M., Ankney, R., Malpani, A., Galperin, S., and C. | |||
| Adams, "X.509 Internet Public Key Infrastructure Online | Adams, "X.509 Internet Public Key Infrastructure Online | |||
| Certificate Status Protocol - OCSP", RFC 2560, June 1999. | Certificate Status Protocol - OCSP", RFC 2560, June 1999. | |||
| [RFC5055] Freeman, T., Housley, R., Malpani, A., Cooper, D., and W. | ||||
| Polk, "Server-Based Certificate Validation Protocol | ||||
| (SCVP)", RFC 5055, December 2007. | ||||
| [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an | [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an | |||
| IANA Considerations Section in RFCs", BCP 26, RFC 5226, | IANA Considerations Section in RFCs", BCP 26, RFC 5226, | |||
| May 2008. | May 2008. | |||
| [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security | [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security | |||
| (TLS) Protocol Version 1.2", RFC 5246, August 2008. | (TLS) Protocol Version 1.2", RFC 5246, August 2008. | |||
| [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | |||
| Housley, R., and W. Polk, "Internet X.509 Public Key | Housley, R., and W. Polk, "Internet X.509 Public Key | |||
| Infrastructure Certificate and Certificate Revocation List | Infrastructure Certificate and Certificate Revocation List | |||
| End of changes. 27 change blocks. | ||||
| 109 lines changed or deleted | 74 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||