| < draft-ietf-pkix-dpv-dpd-req-04.txt | draft-ietf-pkix-dpv-dpd-req-05.txt > | |||
|---|---|---|---|---|
| Internet Draft Denis Pinkas, Bull | A new Request for Comments is now available in online RFC libraries. | |||
| draft-ietf-pkix-dpv-dpd-req-04.txt Russ Housley, RSA Laboratories | ||||
| Target Category: INFORMATIONAL April 2002 | ||||
| Expires in six months | ||||
| Delegated Path Validation and Delegated Path Discovery | ||||
| Protocol Requirements (DPV&DPD-REQ) | ||||
| <draft-ietf-pkix-dpv-dpd-req-04.txt> | ||||
| Status of this memo | ||||
| This document is an Internet-Draft and is in full conformance with all | ||||
| provisions of Section 10 of RFC 2026. | ||||
| Internet-Drafts are working documents of the Internet Engineering Task | ||||
| Force (IETF), its areas, and its working groups. Note that other | ||||
| groups may also distribute working documents as Internet-Drafts. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | RFC 3379 | |||
| and may be updated, replaced, or obsoleted by other documents at any | ||||
| time. It is inappropriate to use Internet-Drafts as reference material | ||||
| or to cite them other than as "work in progress." | ||||
| The list of current Internet-Drafts can be accessed at | Title: Delegated Path Validation and Delegated Path | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | Discovery Protocol Requirements | |||
| Author(s): D. Pinkas, R. Housley | ||||
| Status: Informational | ||||
| Date: September 2002 | ||||
| Mailbox: Denis.Pinkas@bull.net, rhousley@rsasecurity.com | ||||
| Pages: 15 | ||||
| Characters: 32455 | ||||
| Updates/Obsoletes/SeeAlso: None | ||||
| The list of Internet-Draft Shadow Directories can be accessed at | I-D Tag: draft-ietf-pkix-dpv-dpd-req-05.txt | |||
| http://www.ietf.org/shadow.html. | ||||
| Abstract | URL: ftp://ftp.rfc-editor.org/in-notes/rfc3379.txt | |||
| This document specifies the requirements for Delegated Path Validation | This document specifies the requirements for Delegated Path Validation | |||
| (DPV) and Delegated Path Discovery (DPD) for Public Key Certificates. | (DPV) and Delegated Path Discovery (DPD) for Public Key Certificates. | |||
| It also specifies the requirements for DPV and DPD policy management. | It also specifies the requirements for DPV and DPD policy management. | |||
| 1. Introduction | This document is a product of the Public-Key Infrastructure (X.509) | |||
| Working Group of the IETF. | ||||
| This document specifies the requirements for Delegated Path Validation | ||||
| (DPV) and Delegated Path Discovery (DPD) for Public Key Certificates, | ||||
| using two main request/response pairs. | ||||
| Delegated processing provides two primary services: DPV and DPD. | ||||
| Some clients require a server to perform certification path validation | ||||
| and have no need for data acquisition, while some other clients | ||||
| require only path discovery in support of local path validation. | ||||
| The DPV request/response pair, can be used to fully delegate path | ||||
| validation processing to an DPV server, according to a set of rules, | ||||
| called a validation policy. | ||||
| The DPD request/response pair can be used to obtain from a DPD server | ||||
| all the information needed (e.g., the end-entity certificate, the CA | ||||
| certificates, full CRLs, delta-CRLs, OCSP responses) to locally | ||||
| validate a certificate. The DPD server uses a set of rules, called | ||||
| a path discovery policy, to determine which information to return. | ||||
| A third request/response pair allows clients to obtain references for | ||||
| the policies supported by a DPV or DPD server. | ||||
| 1.1. Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in | ||||
| this document (in uppercase, as shown) are to be interpreted as | ||||
| described in [RFC2119]. | ||||
| 2. Rationale and benefits for DPV (Delegated Path Validation) | ||||
| DPV allows a server to perform a real time certificate validation for | ||||
| a validation time T, where T may be the current time or a time in the | ||||
| recent past. | ||||
| In order to validate a certificate, a chain of multiple certificates, | ||||
| called a certification path, may be needed, comprising a certificate | ||||
| of the public key owner (the end entity) signed by one CA, and zero or | ||||
| more additional certificates of CAs signed by other CAs. | ||||
| Offloading path validation to a server may be required by a client | ||||
| that lacks the processing, and/or communication capabilities to | ||||
| perform path construction and then local path validation. | ||||
| In constrained execution environments, such as telephones and PDAs, | ||||
| memory and processing limitations may preclude local implementation of | ||||
| complete, PKIX-compliant certification path validation [PKIX-1]. | ||||
| In applications where minimum latency is critical, delegating | ||||
| validation to a trusted server can offer significant advantages. | ||||
| The time required to send the target certificate to the validation | ||||
| server, receive the response, and authenticate the response, | ||||
| can be considerably less than the time required for the client to | ||||
| perform certification path discovery and validation. Even if a | ||||
| certification path were readily available to the client, the | ||||
| processing time associated with signature verification for each | ||||
| certificate in the path might (especially when validating very long | ||||
| paths or using a limited processor) be greater than the delay | ||||
| associated with use of a validation server. | ||||
| Another motivation for offloading path validation is that it allows | ||||
| validation against validation policies defined by the management in a | ||||
| consistent fashion across an enterprise. Clients that are able to | ||||
| do their own path validation may rely on a trusted server to do path | ||||
| validation if centralized management of validation policies is needed, | ||||
| or the clients rely on a trusted server to maintain centralized records | ||||
| of such activities. | ||||
| When a client uses this service, it inherently trusts the server as | ||||
| much as it would its own path validation software (if it contained | ||||
| such software). Clients can direct the server to perform path | ||||
| validation in accordance with a particular validation policy. | ||||
| 3. Rationale and benefits for DPD (Delegated Path Discovery) | ||||
| DPD is valuable for clients that do much of the PKI processing | ||||
| themselves and simply want a server to collect information for them. | ||||
| The server is trusted to return the most current information that is | ||||
| available to it (which may not be the most current information that | ||||
| has been issued). The client will ultimately perform certification | ||||
| path validation. | ||||
| A client that performs path validation for itself may get benefit in | ||||
| several ways from using a server to acquire certificates, CRLs, and | ||||
| OCSP responses to aid in the validation process. In this context, the | ||||
| client is relying on the server to interact with repositories to | ||||
| acquire the data that the client would otherwise have to acquire using | ||||
| LDAP [LDAP], HTTP [HTTP], FTP [FTP] or another repository access | ||||
| protocol. Since these data items are digitally signed, the client need | ||||
| not trust the server any more than the client would trust the | ||||
| repositories. | ||||
| There are several benefits to this approach; for example, a single | ||||
| query to a server can replace multiple repository queries, and caching | ||||
| by the server can reduce latency. Another benefit to the client system | ||||
| is that it need not incorporate a diverse set of software to interact | ||||
| with various forms of repositories, perhaps via different protocols, | ||||
| nor to perform the graph processing necessary to discover certification | ||||
| paths, separate from making the queries to acquire path validation data. | ||||
| 4. Delegated Path Validation Protocol Requirements | ||||
| 4.1. Basic protocol | ||||
| The Delegated Path Validation (DPV) protocol allows a server to | ||||
| validate one or more public key certificates according to a validation | ||||
| policy. | ||||
| If the DPV server does not support the client requested validation | ||||
| policy, then the DPV server MUST return an error. | ||||
| If the DPV request does not specify a validation policy, the server | ||||
| response MUST indicate the one that was used. | ||||
| Policy definitions can be quite long and complex, and some policies | ||||
| may allow for the setting of a few parameters (e.g. root self-signed | ||||
| certificates). The protocol MUST allow the client to include these | ||||
| policy dependant parameters in the DPV request. It is expected that | ||||
| most clients will simply reference a validation policy for a given | ||||
| application or accept the DPV serverĘs default validation policy. | ||||
| The client can request that the server determine the certificate | ||||
| validity at a time other than the current time. The DPV server MUST | ||||
| obtain revocation status information for the validation time | ||||
| in the client request. | ||||
| In order to obtain the revocation status information of any | ||||
| certificate from the certification path, the DPV server might use, in | ||||
| accordance with the validation policy, different sources of revocation | ||||
| information, e.g. a combination of OCSP responses, CRLs, or delta-CRLs. | ||||
| If the revocation status information for the requested validation time | ||||
| is unavailable, then the DPV server MUST return a status indicating | ||||
| that the certificate is invalid. | ||||
| The certificate to be validated MUST either be directly provided in | ||||
| the request or unambiguously referenced, such as the CA distinguished | ||||
| name, certificate serial number, and the hash of the certificate, | ||||
| like ESSCertID as defined in [ESS] or OtherSigningCertificate as | ||||
| defined in [ES-F]. | ||||
| The DPV client MUST be able to provide to the validation server, | ||||
| associated with each certificate to be validated, "useful | ||||
| certificates", as well as "useful revocation information". Revocation | ||||
| information includes OCSP responses, CRLs, and delta-CRLs. As an | ||||
| example, an S/MIME message might include such information, and the | ||||
| client can simply copy that information into the DPV request. | ||||
| The DPV server MUST have the full certificate to be validated. When | ||||
| the certificate is not provided in the request, the server MUST verify | ||||
| that the certificate is indeed the one being unambiguous referenced by | ||||
| the client. The DPV server MUST include either the full certificate or | ||||
| an unambiguous reference to the certificate (in case of a CA key | ||||
| compromise) in the DPV response. | ||||
| Unless an error is reported, the DPV response MUST indicate one of the | ||||
| following two status alternatives: | ||||
| 1) the certificate is valid according to the validation policy. | ||||
| 2) the certificate is not valid according to the validation policy. | ||||
| 3) the validity of the certificate is unknown according to the | ||||
| validation policy. | ||||
| When the certificate is not valid according to the validation policy, | ||||
| then the reason MUST also be indicated. Invalidity reasons include: | ||||
| a) the DPV server cannot determine the validity of the certificate | ||||
| because a certification path cannot be constructed. | ||||
| b) the DPV server successfully constructed a certification path, but | ||||
| it was not valid according to the validation algorithm in | ||||
| [PKIX-1]. | ||||
| c) the certificate is not yet valid at this time. If another | ||||
| request could be made later on, the certificate could possibly | ||||
| be determined as valid. This condition may occur before a | ||||
| certificate validity period has begun or while a certificate is | ||||
| suspended. | ||||
| The protocol MUST prevent replay attacks, and the replay prevention | ||||
| mechanism employed by the protocol MUST NOT rely on clocks being | ||||
| synchronized with UTC. | ||||
| The DPV request MUST allow the client to request the server to include | ||||
| in its response additional information which will allow relying parties | ||||
| not trusting the requested DPV server to be confident that the | ||||
| certificate validation has correctly been performed. Such information | ||||
| may (not necessarily exclusively) consist of a certification path, | ||||
| revocation status information from authorised CRL issuers or | ||||
| authorised OCSP responders, revocation status information from CRL | ||||
| issuers or OCSP responders trusted under the validation policy, | ||||
| time-stamp tokens from TSAs responders trusted under the validation | ||||
| policy, or a DPV response from a DPV server that is trusted under the | ||||
| validation policy. When the certificate is valid according to the | ||||
| validation policy, the server MUST, upon request, include that | ||||
| information in the response. However, the server MAY omit that | ||||
| information when the certificate is invalid or when it cannot | ||||
| determine the validity. | ||||
| The DPV response MUST be bound to the DPV request. This can be | ||||
| accomplished by repeating the important components from the request in | ||||
| the response or by including a one-way hash of the request in the | ||||
| response. | ||||
| For the client to be confident that the certificate validation was | ||||
| handled by the expected DPV server, the DPV response MUST be | ||||
| authenticated, unless an error is reported (e.g. a badly formatted | ||||
| request, etc.). | ||||
| For the client to be able prove to a third party that trusts the | ||||
| same DPV server that the certificate validation was handled correctly, | ||||
| the DPV response MUST be digitally signed, unless an error is reported | ||||
| (e.g. a badly formatted request, etc.). The certificate from the DPV | ||||
| server SHALL be used to identify the DPV server. | ||||
| The DPV server MAY require client authentication, therefore, the DPV | ||||
| request MUST be able to be authenticated. | ||||
| There are no specific confidentiality requirement within this | ||||
| application layer protocol. However, when confidentiality is needed, | ||||
| it can be achieved with a lower-layer security protocol. | ||||
| 4.2. Relaying, re-direction and multicasting. | ||||
| In some network environments, especially ones that include firewalls, | ||||
| a DPV server might not be able to obtain all of the information that | ||||
| it needs to process a request. However, the DPV server might be | ||||
| configured to use the services of one or more other DPV servers to | ||||
| fulfill all requests. In such cases, the client is unaware that the | ||||
| queried DPV server is using the services of other DPV servers. In such | ||||
| environments, the client-queried DPV server acts as a DPV client to | ||||
| another DPV server. Unlike the original client, the DPV server is | ||||
| expected to have moderate computing and memory resources, enabling the | ||||
| use of relay, re-direct or multicasting mechanisms. The requirements | ||||
| in this section support such mechanisms for DPV server-to-DPV server | ||||
| exchanges without imposing them on DPV client-to-DPV client exchanges. | ||||
| Protocols designed to satisfy these requirements MAY include optional | ||||
| fields and/or extensions to support relaying, re-direction or | ||||
| multicasting. However, DPV clients are not expected to support relay, | ||||
| re-direct or multicast. If the protocol supports such features, the | ||||
| protocol MUST include provisions for DPV clients and DPV servers that | ||||
| do not support such features, allowing them to conform to the basic | ||||
| set of requirements. | ||||
| 1. When a server supports a relay mechanism, a mechanism to detect | ||||
| loops or repetition MUST be provided. | ||||
| 2. When a protocol provides the capability for a DPV server to | ||||
| re-direct a request to another DPV server (i.e. the protocol | ||||
| chooses to provide a referral mechanism), a mechanism to provide | ||||
| information to be used for the re-direction SHOULD be supported. | ||||
| If such re-direction information is sent back to clients, then | ||||
| the protocol MUST allow conforming clients to ignore it. | ||||
| 3. Optional parameters in the protocol request and/or response MAY | ||||
| be provide support for relaying, re-direction or multicasting. | ||||
| DPV clients that ignore any such optional parameters MUST still | ||||
| be able to use the DPV service. DPV servers that ignore any such | ||||
| optional parameters MUST still be able to offer the DPV service, | ||||
| although they might not be able to overcome the limitations | ||||
| imposed by the network topology. In this way, protocol | ||||
| implementors need not understand the syntax or semantics of any | ||||
| such optional parameters. | ||||
| 5. Delegated Path Discovery Protocol Requirements | ||||
| The Delegated Path Discovery (DPD) protocol allows the client to use | ||||
| a single request to collect at one time from a single server the data | ||||
| elements available at the current time that might be collected using | ||||
| different protocols (e.g. LDAP, HTTP, FTP, OCSP) or by querying | ||||
| multiple servers, to locally validate a public key certificate | ||||
| according to a single path discovery policy. The returned information | ||||
| can be used to locally validate one or more certificates for the | ||||
| current time. | ||||
| Clients MUST be able to specify whether they want, in addition to the | ||||
| certification path, the revocation information associated with the | ||||
| path, for the end-entity certificate, for the CA certificates, or for | ||||
| both. | ||||
| If the DPD server does not support the client requested path | ||||
| discovery policy, the DPD server MUST return an error. Some forms | ||||
| of path discovery policy can be simple. In that case it is acceptable | ||||
| to pass the parameters from the path discovery policy with each | ||||
| individual request. For example, the client might provide a set of | ||||
| trust anchors and separate revocation status conditions for the | ||||
| end-entity certificate and for the other certificates. The DPD request | ||||
| MUST allow more elaborated path discovery policies to be referenced. | ||||
| It is expected that most of the time clients will only be aware of | ||||
| the referenced path discovery policy for a given application. | ||||
| The DPD server response includes zero, one, or several certification | ||||
| paths. Each path consists of a sequence of certificates, starting with | ||||
| the certificate to be validated and ending with a trust anchor. If the | ||||
| trust anchor is a self-signed certificate, that self-signed certificate | ||||
| is not included. In addition, if requested, the revocation information | ||||
| associated with each certificate in the path MUST also be returned. | ||||
| The DPD client needs to be able to limit the number of paths returned. | ||||
| Therefore the client MUST be able to indicate the maximum number of | ||||
| certification paths to be returned (provided that they can be found). | ||||
| If the client does not specify a maximum number, then the DPD server | ||||
| MUST return a single certification path. | ||||
| The paths that are returned may need to match some additional local | ||||
| criteria known only to the client. For example, the client might | ||||
| require the presence of a particular certificate extension. | ||||
| If that number cannot be reached by the server, an indication SHOULD | ||||
| be returned by the DPD server showing that an additional query will not | ||||
| return more paths. | ||||
| If the paths that are returned do not match the clientĘs local | ||||
| criteria, then the number of number of certification paths to be | ||||
| returned can be extended by increasing this value. Previously found | ||||
| paths will likely be returned, but the client can easily discard them. | ||||
| This avoids requirements for state information at the server, but does | ||||
| not prevent a server from maintaining a cache of previous responses. | ||||
| Avoiding the maintenance of state information for previous requests | ||||
| minimizes potential denial of service attacks or other problems | ||||
| associated with server crashes. | ||||
| Path discovery MUST be performed according to the path discovery policy. | ||||
| The DPD response MUST indicate one of four status alternatives: | ||||
| 1) one or more certification paths was found according to the | ||||
| path discovery policy, with all of the requested revocation | ||||
| information present. | ||||
| 2) one or more certification paths was found according to the | ||||
| path discovery policy, with a subset of the requested revocation | ||||
| information present. | ||||
| 3) one or more certification paths was found according to the | ||||
| path discovery policy, with none of the requested revocation | ||||
| information present. | ||||
| 4) no certification path was found according to the path | ||||
| discovery policy. | ||||
| The information that is returned consists of one or more certification | ||||
| paths and, if requested, its associated revocation status information | ||||
| for each element from the path. | ||||
| For the client to be confident that the response originates from the | ||||
| expected DPD server, the server MAY provide an authenticated response. | ||||
| For example, the server might sign the response. | ||||
| The DPD server MAY require client authentication, therefore, the DPD | ||||
| request MUST be able to be authenticated. | ||||
| There are no specific confidentiality requirement within the | ||||
| application layer protocol. However, when confidentiality is needed, | ||||
| it can be achieved with a lower-layer security protocol. | ||||
| 6. Requirements common both to DPV and DPD | ||||
| The client MUST be able to obtain references for the default policy | ||||
| or for all of the policies supported by the server by using an | ||||
| additional request/response pair. The response can include references | ||||
| to previously defined policies or to a priori known policies. | ||||
| 7. Validation Policy | ||||
| A validation policy is a set of rules against which the validation of | ||||
| the certificate is performed. | ||||
| A validation policy MAY include several trust anchors. A trust anchor | ||||
| is defined as one public key, a CA name, and a validity time interval; | ||||
| a trust anchor optionally includes additional constraints. The use of a | ||||
| self-signed certificate is one way to specify the public key to be | ||||
| used, the CA name, and the validity period of the public key. | ||||
| Additional constraints for each trust anchor MAY be defined. These | ||||
| constraints might include a set of certification policy constraints or | ||||
| a set of naming constraints. These constraints MAY also be included in | ||||
| self-signed certificates. | ||||
| Additional conditions that apply to the certificates in the path MAY | ||||
| also be specified in the validation policy. For example, specific | ||||
| values could be provided for the inputs to the certification path | ||||
| validation algorithm in [PKIX-1], such as user-initial-policy-set, | ||||
| initial-policy-mapping-inhibit, initial-explicit-policy, or | ||||
| initial-any-policy-inhibit. | ||||
| Additional conditions that apply to the end-entity certificate MAY | ||||
| also be specified in the validation policy. For example, a specific | ||||
| name form, like an e-mail address either in the rfc822 subject | ||||
| alternative name or in the emailAddress naming attribute in the | ||||
| subject name, might be required. | ||||
| In order to succeed, one valid certification path (none of the | ||||
| certificates in the path are expired or revoked) MUST be found between | ||||
| an end-entity certificate and a trust anchor and all constraints that | ||||
| apply to the certification path MUST be verified. | ||||
| 7.1. Components for a validation policy | ||||
| A validation policy is built from three components: | ||||
| 1. Certification path requirements, | ||||
| 2. Revocation requirements, | ||||
| 3. End-entity certificate specific requirements. | ||||
| Note: [ES-P] defines ASN.1 data elements that may be useful while | ||||
| defining the components of a validation policy. | ||||
| 7.2. Certificate path requirements | ||||
| The path requirements identify a sequence of trust anchors used to | ||||
| start certification path processing and initial conditions for | ||||
| certification path validation as defined in [PKIX-1]. | ||||
| 7.3. Revocation Requirements | ||||
| Revocation information might be obtained through CRLs, delta-CRLs or | ||||
| OCSP responses. Certificate revocation requirements are specified in | ||||
| terms of checks required on the end-entity certificate and CA | ||||
| certificates. | ||||
| Revocation requirements for the end-entity certificate may not be the | ||||
| same as the requirements for the CA certificates. For example, an OCSP | ||||
| response may be needed for the end-entity certificate while CRLs may | ||||
| be sufficient for the CA certificates. | ||||
| The validation policy MUST specify the source of revocation | ||||
| information: | ||||
| - full CRLs (or full Authority Revocation Lists) have to be | ||||
| collected, | ||||
| - OCSP responses, using [OCSP], have to be collected, | ||||
| - delta-CRLs and the relevant associated full CRLs (or full | ||||
| Authority Revocation Lists) are to be collected. | ||||
| - any available revocation information has to be collected. | ||||
| - no revocation information has to be collected. | ||||
| 7.4. End-entity certificate specific requirements | ||||
| The validation policy might require the end-entity certificate to contain | ||||
| specific extensions with specific types or values (it does not matter | ||||
| whether they are critical or non-critical). For example, the | ||||
| validation policy might require an end-entity certificate that | ||||
| contains an electronic mail address (either in the rfc822 subject alt | ||||
| name or in the emailAddress naming attribute in the subject name). | ||||
| 8. Path Discovery Policy | ||||
| A path discovery policy is a set of rules against which the discovery | ||||
| of a certification path is performed. A path discovery policy is a | ||||
| subset of a validation policy. A path discovery policy MAY either be | ||||
| a reference to a validation policy or contain only some major elements | ||||
| from a validation policy, such as the trust anchors. | ||||
| Since the DPD client is "PKI aware", it can locally apply additional | ||||
| selection criteria to the certification paths returned by the server. | ||||
| Thus, a simpler policy can be defined and used for path discovery. | ||||
| 8.1. Components for a Path Discovery Policy | ||||
| The path discovery policy includes certification path requirements, | ||||
| revocation requirements, and end-entity certificate specific | ||||
| requirements. These requirements are specified in sections 7.2, 7.3, | ||||
| and 7.4, respectively. | ||||
| 9. Security considerations | ||||
| A DPV client must trust a DPV server to provide the correct answer. | ||||
| However, this does not mean that all DPV clients will trust the same | ||||
| DPV servers. While a positive answer might be sufficient for one DPV | ||||
| client, that same positive answer will not necessarily convince | ||||
| another DPV client. | ||||
| Other clients may trust their own DPV servers, or they might perform | ||||
| certification path validation themselves. DPV clients operating under | ||||
| an organizational policy must ensure that each of the DPV servers they | ||||
| trust is operating under that organizational policy. | ||||
| When no policy reference is present in the DPV request, the DPV client | ||||
| should verify that the policy selected by the DPV server is appropriate. | ||||
| The revocation status information is obtained for the validation time. | ||||
| In case of a digital signature, it is not necessarily identical to the | ||||
| time when the private key was used. The validation time should be | ||||
| adjusted by the DPV client to compensate for: | ||||
| 1) time for the end-entity to realize that its private key has | ||||
| been or could possibly be compromised, and/or | ||||
| 2) time for the end-entity to report the key compromise, and/or | ||||
| 3) time for the revocation authority to process the revocation | ||||
| request from the end-entity, and/or | ||||
| 4) time for the revocation authority to update and distribute the | ||||
| revocation status information. | ||||
| 10. Acknowledgments | ||||
| These requirements have been refined after some valuable inputs from | ||||
| Ambarish Malpani, Tim Polk, and Paul Hoffman. | ||||
| 11. References | ||||
| [PKIX-1] | ||||
| Internet X.509 Public Key Infrastructure. | ||||
| Certificate and CRL Profile. RFC 2459 | ||||
| R. Housley, W. Ford, W. Polk, D. Solo. | ||||
| or its successor as soon as it can be referenced. | ||||
| [OCSP] | ||||
| X.509 Internet Public Key Infrastructure. | ||||
| Online Certificate Status Protocol - OCSP. RFC 2560 | ||||
| M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams. | ||||
| [ES-F] | ||||
| Electronic Signature Formats for long term electronic signatures | ||||
| RFC 3126. D. Pinkas, J. Ross, N. Pope. September 2001. | ||||
| [ES-P] | ||||
| Electronic Signature Policies. RFC 3125. | ||||
| D. Pinkas, J. Ross, N. Pope. September 2001. | ||||
| [CMS] | ||||
| Cryptographic Message Syntax. RFC 2630. R. Housley June 1999. | ||||
| or its successor as soon as it can be referenced. | ||||
| [ESS] | ||||
| Enhanced Security Services for S/MIME. RFC 2634. P. Hoffman. | ||||
| RFC 2634, June 1999. | ||||
| [ISO-X509] | ||||
| ISO/IEC 9594-8/ITU-T Recommendation X.509, "Information | ||||
| Technology - Open Systems Interconnection: The Directory: | ||||
| Authentication Framework," 1997 edition. | ||||
| [FTP] | ||||
| Internet X.509 Public Key Infrastructure. Operational Protocols: | ||||
| FTP and HTTP. RFC 2585. R. Housley, P. Hoffman. May 1999. | ||||
| [HTTP] | ||||
| Internet X.509 Public Key Infrastructure. Operational Protocols: | ||||
| FTP and HTTP. RFC 2585. R. Housley, P. Hoffman. May 1999. | ||||
| [LDAP] | ||||
| Internet X.509 Public Key Infrastructure Operational Protocols | ||||
| LDAPv2. RFC 2559. S. Boeyen, T. Howes, P. Richard. April 1999. | ||||
| 12. Authors' addresses | ||||
| Denis Pinkas | ||||
| Bull. | ||||
| 68, Route de Versailles | ||||
| 78434 Louveciennes CEDEX | ||||
| FRANCE | ||||
| Denis.Pinkas@bull.net | ||||
| Russell Housley | This memo provides information for the Internet community. It does | |||
| RSA Laboratories | not specify an Internet standard of any kind. Distribution of this | |||
| 918 Spring Knoll Drive | memo is unlimited. | |||
| Herndon, VA 20170 | ||||
| USA | ||||
| rhousley@rsasecurity.com | ||||
| Full Copyright Statement | This announcement is sent to the IETF list and the RFC-DIST list. | |||
| Requests to be added to or deleted from the IETF distribution list | ||||
| should be sent to IETF-REQUEST@IETF.ORG. Requests to be | ||||
| added to or deleted from the RFC-DIST distribution list should | ||||
| be sent to RFC-DIST-REQUEST@RFC-EDITOR.ORG. | ||||
| Copyright (C) The Internet Society (2002). All Rights Reserved. | Details on obtaining RFCs via FTP or EMAIL may be obtained by sending | |||
| an EMAIL message to rfc-info@RFC-EDITOR.ORG with the message body | ||||
| help: ways_to_get_rfcs. For example: | ||||
| This document and translations of it may be copied and furnished to | To: rfc-info@RFC-EDITOR.ORG | |||
| others, and derivative works that comment on or otherwise explain it | Subject: getting rfcs | |||
| or assist in its implementation may be prepared, copied, published | ||||
| and distributed, in whole or in part, without restriction of any | ||||
| kind, provided that the above copyright notice and this paragraph | ||||
| are included on all such copies and derivative works. However, this | ||||
| document itself may not be modified in any way, such as by removing | ||||
| the copyright notice or references to the Internet Society or other | ||||
| Internet organizations, except as needed for the purpose of | ||||
| developing Internet standards in which case the procedures for | ||||
| copyrights defined in the Internet Standards process must be | ||||
| followed, or as required to translate it into languages other than | ||||
| English. | ||||
| The limited permissions granted above are perpetual and will not be | help: ways_to_get_rfcs | |||
| revoked by the Internet Society or its successors or assigns. | ||||
| This document and the information contained herein is provided on an | Requests for special distribution should be addressed to either the | |||
| "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING | author of the RFC in question, or to RFC-Manager@RFC-EDITOR.ORG. Unless | |||
| TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING | specifically noted otherwise on the RFC itself, all RFCs are for | |||
| BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION | unlimited distribution.echo | |||
| HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF | Submissions for Requests for Comments should be sent to | |||
| MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | RFC-EDITOR@RFC-EDITOR.ORG. Please consult RFC 2223, Instructions to RFC | |||
| Authors, for further information. | ||||
| End of changes. 12 change blocks. | ||||
| 625 lines changed or deleted | 29 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||