<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-05" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-05"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="14"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 <xref target="RFC3709"/> and RFC 6170 <xref target="RFC6170"/>.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709 and RFC 6170.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information and operational technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in B2B, B2C, and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are authorization
decisions.  Automatic processing will make some authorization decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
authorization decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).  Certificate issuers may include more than one community
logotype to indicate participation in more than one global community.</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>Image and audio data for logotypes can be provided by reference by including
a URI that identifies the location to the logotype data and a one-way hash
of the referenced data in the certificate.  The privacy-related properties
for remote logotype data depend on four parties: the certificate relying
parties that use the information in the certificate extension to fetch
the logotype data, the certificate issuers that populate the certificate
extension, certificate subscribers that request certificates that include
the certificate extension, and server operators that provides the logotype
data.</t>
      <t>Alternatively, embedding the logotype data  in the certificate with direct
addressing (as defined in <xref target="embedded-image"/>) provides improved privacy
properties and depends upon fewer parties.  However, this approach can
significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.
At least one of the image objects representing a logotype <bcp14>SHOULD</bcp14>
contain an image with a width between of 60 pixels and 200 pixels and a
height between 45 pixels and 150 pixels.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> provide text-based
audio data suitable for processing by text-to-speech software.</t>
      <t>A typical use of text based audio data is inclusion in web applications where the
audio text is placed as the "alt" atttribute value of an html image (img) element
and the language value obtained from LogotypeAudioInfo is included as the "lang"
attribute of that image.</t>
      <t>If a logotype of a certain type (as defined in <xref target="logotypes"/>) is
represented by more than one image object, then each image objects <bcp14>MUST</bcp14>
contain variants of roughly the same visual content.  Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  When more than one image object or more than
one audio object  for the same logotype type is included in the certificate,
the certificate issuer is responsible for ensuring that the objects contain
roughly the same content.  Compliant applications <bcp14>MUST NOT</bcp14> display more than
one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the audio object
for any logotype type (see <xref target="logotypes"/>) at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>SHOULD</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Direct
addressing supports cases where just one or a few alternative images and
audio objects are referenced.</t>
        <t>The indirect addressing includes one or more references to an external
hashed data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same logotype data.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use the HTTPS scheme (https://...)
or the HTTP scheme (http://...) or the DATA scheme (data://...) <xref target="RFC3986"/>.
However, the "data" URI scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.
Clients <bcp14>MUST</bcp14> support retrieval of referenced LogoTypeData with the
HTTP <xref target="I-D.ietf-httpbis-semantics"/> and the HTTP with TLS <xref target="RFC8446"/>, or
subsequent versions of these protocols.  Client applications <bcp14>SHOULD</bcp14> also
support the "data" URI scheme <xref target="RFC2397"/> for direct addressing with embedded
logotype data within the extension.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified,
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a resource that contains
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>SHOULD</bcp14> use the
one-way hash function that is associated with the certificate signature to
compute the hash value, and CAs <bcp14>MAY</bcp14> include other hash values.  Clients
<bcp14>MUST</bcp14> compute a one-way hash value using one of the identified functions,
and clients <bcp14>MUST</bcp14> discard the logotype data if the computed hash value does
not match the hash value in the certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC6838"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
          <t>If more than one loyalty logotype is present, they <bcp14>MUST</bcp14> be
placed in order of preferred appearance.  Some clients <bcp14>MAY</bcp14> choose
to display a subset of the present loyalty logotype data; therefore the
placement within the sequence aids the client selection.  The most
preferred loyalty logotype data <bcp14>MUST</bcp14> be first in the sequence, and the
least preferred loyalty logotype data <bcp14>MUST</bcp14> be last in the sequence.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-certImage object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate image logotype.</t>
          <t>Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image as the only visual
representation of a certificate; however, the certificate user <bcp14>SHOULD</bcp14>
be able to easily obtain the details of the certificate content.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however, the
relying party <bcp14>MUST NOT</bcp14> use the logotypes as part of certification path
validation or automated trust decision.  The sole purpose of logotypes is
to enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many commons image formats and their
corresponding MIME type.  The table also indicates the support
requirements these image formats.  The filename extensions commonly used
for each of these formats is also provided.  Implementations <bcp14>MAY</bcp14> support
other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">.ext</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml+gzip</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC8118"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the
client will receive response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>. Implementations <bcp14>SHOULD</bcp14> support
text-based audio data with a MIME type of "text/plain;charset=UTF-8".
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
      <t>Text-based audio data using the MIME type of "text/plain;charset=UTF-8" is
intended to be used by text-to-speech software. When this audio type is used,
the following requirements apply:</t>
      <ul spacing="normal">
        <li>LogotypeAudioInfo <bcp14>MUST</bcp14> be present and specify the language of the text.</li>
        <li>The fileSize, playTime, and channels elements of LogotypeAudioInfo <bcp14>MUST</bcp14> have the value of 0.</li>
        <li>The sampleRate element of LogotypeAudioInfo <bcp14>MUST</bcp14> be absent.</li>
      </ul>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format if the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.  Implementers should review the guidance
in <xref section="7" sectionFormat="of" target="RFC3986"/>.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks.  In such a case, the
accepted image may contain data that could help an attacker to obtain
colliding certificates with identical certificate signatures.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A parent CA can
constrain certification path validation such that subordinate CAs cannot
issue valid certificates to end-entities outside a limited name space or
outside specific certificate polices.  A malicious CA can comply with
these name and policy requirements and still include inappropriate
logotypes in the certificates that it issues.  These certificates will
pass the certification path validation algorithm, which means the client
will trust the logotypes in the certificates.  Since there is no
technical mechanism to prevent or control subordinate CAs from including
the logotype extension or its contents, where appropriate, a parent CA
could employ a legal agreement to impose a suitable restriction on the
subordinate CA.  This situation is not unique to the logotype extension.</t>
      <t>When a relying party fetches remote logotype data, a mismatch between the
media type provided in the mediaType field of the LogotypeDetails and the
Content-Type HTTP header of the retrieved object <bcp14>MUST</bcp14> be treated as a
failure and the fetched logotype data should not be presented to the
user.  However, if more than one location for the remote logotype data is
provided in the certificate extension, the relying party <bcp14>MAY</bcp14> try to fetch
the remote logotype data from an alternate location to resolve the failure.</t>
      <t>When a subscriber requests the inclusion of remote logotype data in a
certificate, the CA cannot be sure that any logotype data will be
available at the provided URI for the entire validity period of the
certificate.  To mitigate this concern, the CA may provide the logotype
data from a server under its control, rather than a subscriber-controlled
server.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and follow the behavior of
subordinate CAs, including Certificate Transparency <xref target="RFC9162"/>.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>Certificates are commonly public objects, so the inclusion of
privacy-sensitive information in certificates should be avoided.  The more
information that is included in a certificate, the greater the likelihood
that the certificate will reveal privacy-sensitive information.  The
inclusion of logotype data needs to be considered in this context.</t>
      <t>Logotype data might be fetched from a server when it is needed.  By
watching activity on the network, an observer can determine which clients
are making use of certificates that contain particular logotype data.
Since clients are expected to locally cache logotype data, network
traffic to the server containing the logotype data will not be generated
every time the certificate is used.  Further, when logotype data is not
cached, activity on the network would reveal certificate usage frequency.
Even when logotype data is cached, regardless of whether direct or
indirect addressing is employed, network traffic monitoring could reveal
when logotype data is fetched for the first time.  Implementations <bcp14>MAY</bcp14>
encrypt fetches of logotype data using HTTPS and pad them to a common size
to reduce visibility into the data that is being fetched.  Likewise, servers
<bcp14>MAY</bcp14> reduce visibility into the data that is being returned by encrypting with
HTTPS and padding to a few common sizes.</t>
      <t>Similarly, when fetching logotype data from a server, the server operator
can determine which clients are making use of certificates that contain
particular logotype data.  As above, locally caching logotype data will
eliminate the need to fetch the logotype data each time the certificate
is used, and lack of caching would reveal usage frequency.  Even when
implementations cache logotype data is cached, regardless of whether
direct or indirect addressing is employed, the server operator could
observe when logotype data is fetched for the first time.</t>
      <t>In addition, the use of an encrypted DNS mechanism, such as DoT <xref target="RFC7858"/>
or DoH <xref target="RFC9230"/>, hide the name resolution traffic associated fetching
remote logotype objects.</t>
      <t>When the "data" URI scheme is used with direct addressing, there is no
network traffic to fetch logotype data, which avoids the observations of
network traffic or server operations described above.  To obtain this
benefit, the certificate will be larger than one that contains a URL.
Due to the improved privacy posture, the "data" URI scheme with direct
addressing will be the only one that is supported by some CAs.
Privacy-aware certificate subscribers <bcp14>MAY</bcp14> wish to insist on their
logotype data being embedded in the certificate with the "data" URI
scheme with direct addressing.</t>
      <t>In cases where logotype data is cached by the relying party, the cache
index should include the hash values of the associated logotype data with the
goal of fetching the logotype data only once, even when it is referenced by
multiple URIs.  The index should include hash values for all supported
hash algorithms.  The cached data should include the media type as well as
the logotype data.  Implementations should give preference to logotype data
that is already in the cache when multiple alternatives are offered in the
LogotypeExtn certificate extension.</t>
      <t>When the "data" URI scheme is used, the relying party <bcp14>MAY</bcp14> add the embedded
logotype data to the local cache, which could avoid the need to fetch the
logotype data if it is referenced by a URL in another certificate.</t>
      <t>When fetching remote logotype data, relying parties should use the most
privacy-preserving options that are available to minimize the opportunities
for servers to "fingerprint" clients. For example, avoid cookies, e-tags, and
client certificates.</t>
      <t>When a relying party encounters a new certificate, the lack of network traffic
to fetch logotype data might indicate that a certificate with references to the
same logotype data has been previously processed and cached.</t>
      <t>TLS 1.3 <xref target="RFC8446"/> includes the ability to encrypt the server's certificate
in the TLS handshake, which helps hide the server's identity from anyone that
is watching activity on the network.  If the server's certificate includes
remote logotype data, the client fetching that data might disclose the
otherwise protected server identity.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Alexey Melnikov for his guidance on media types.  We extend a special
thanks to Tim Geiser for his careful checking of the new examples in
Appendix B.4 and B.5.  We extend a special thanks to Corey Bonnell,
Daniel Kahn Gillmor, and Roman Danyliw for their careful review and
comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-semantics" target="https://www.ietf.org/archive/id/draft-ietf-httpbis-semantics-19.txt">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding" initials="R. T." surname="Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham" initials="M." surname="Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke" initials="J." surname="Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.

 This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8118" target="https://www.rfc-editor.org/info/rfc8118">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="M. Hardy" initials="M." surname="Hardy">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="D. Markovic" initials="D." surname="Markovic">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="M. Bailey" initials="M." surname="Bailey">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>The Portable Document Format (PDF) is an ISO standard (ISO 32000-1:2008) defining a final-form document representation language in use for document exchange, including on the Internet, since 1993. This document provides an overview of the PDF format and updates the media type registration of "application/pdf".  It obsoletes RFC 3778.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8118"/>
          <seriesInfo name="DOI" value="10.17487/RFC8118"/>
        </reference>
        <reference anchor="RFC3709" target="https://www.rfc-editor.org/info/rfc3709">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Freeman" initials="T." surname="Freeman">
              <organization/>
            </author>
            <date month="February" year="2004"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3709"/>
          <seriesInfo name="DOI" value="10.17487/RFC3709"/>
        </reference>
        <reference anchor="RFC6170" target="https://www.rfc-editor.org/info/rfc6170">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Image</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Bajaj" initials="S." surname="Bajaj">
              <organization/>
            </author>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6170"/>
          <seriesInfo name="DOI" value="10.17487/RFC6170"/>
        </reference>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9216" target="https://www.rfc-editor.org/info/rfc9216">
          <front>
            <title>S/MIME Example Keys and Certificates</title>
            <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9216"/>
          <seriesInfo name="DOI" value="10.17487/RFC9216"/>
        </reference>
        <reference anchor="RFC9230" target="https://www.rfc-editor.org/info/rfc9230">
          <front>
            <title>Oblivious DNS over HTTPS</title>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="T. Pauly" initials="T." surname="Pauly">
              <organization/>
            </author>
            <author fullname="T. Verma" initials="T." surname="Verma">
              <organization/>
            </author>
            <author fullname="C.A. Wood" initials="C.A." surname="Wood">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
              <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9230"/>
          <seriesInfo name="DOI" value="10.17487/RFC9230"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified, 
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 2002 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <t>Note that <xref target="NEW-ASN1"/> was published in 2021, and all of the features
used in this module are backward compatible with the specification
that was published in 2002.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one image component MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2914: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2900:  OCTET STRING, encapsulates {
30 2896:   SEQUENCE {
A3 2892:    [3] {
30 2888:     SEQUENCE {
30 2884:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2870:       [0] {
30 2866:        SEQUENCE {
30 2862:         SEQUENCE {
30 2858:          SEQUENCE {
16   24:           IA5String 'image/svg+xml-compressed'
30   49:           SEQUENCE {
30   47:            SEQUENCE {
30   11:             SEQUENCE {
06    9:              OBJECT IDENTIFIER
       :               sha-256 (2 16 840 1 101 3 4 2 1)
       :               }
04   32:             OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :              }
       :             }
30 2777:           SEQUENCE {
16 2773:            IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :             }
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-full-cert">
        <name>Full Certificate Example</name>
        <t>The following example contains a certificate for Alice; it is
essentially a renewal of the certificate that appears in <xref target="RFC9216"/>.
Of course, the serial number and issue dates are different.  In
addition, Alice's certificate now has a logotype extension.  The
extension contains URLs for two community logotype images, both at
fictional URLs.  The extension also contains URLs for two subject
logotype images, both at fictional URLs.  An implementation would
display at most three of these images, both of the community logotype
images and one of the subject logotype images.  Direct addressing is
used for all of the images, and the images are hashed by SHA-256.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The following  displays the logotype extension from Alice's
certificate.  The values on the left are the ASN.1 tag (in hexadecimal)
and the length (in decimal).</t>
        <artwork><![CDATA[
30 464: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 450:  OCTET STRING, encapsulates {
30 446:   SEQUENCE {
A0 227:    [0] {
30 224:     SEQUENCE {
A0 111:      [0] {
30 109:       SEQUENCE {
30 107:        SEQUENCE {
30 105:         SEQUENCE {
16  10:          IA5String 'image/jpeg'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            AF FC 10 16 46 CB 56 25 B4 99 7D E5 89 3E AE 3A
      :            84 6F 5A 02 D3 82 D6 DA 8E D4 EE F8 7C BD 1D ED
      :             }
      :            }
30  40:          SEQUENCE {
16  38:           IA5String 'http://www.example.net/images/logo.jpg'
      :            }
      :           }
      :          }
      :         }
      :        }
A0 109:      [0] {
30 107:       SEQUENCE {
30 105:        SEQUENCE {
30 103:         SEQUENCE {
16   9:          IA5String 'image/gif'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            88 90 81 81 AD FB 66 AE 2F 66 D0 49 A0 4D 8E A0
      :            EC 4E A8 64 42 38 5B 36 4A BF 2C 8B D2 E9 E9 66
      :             }
      :            }
30  39:          SEQUENCE {
16  37:           IA5String 'http://www.example.org/logo-image.gif'
      :            }
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
A2 213:    [2] {
A0 210:     [0] {
30 207:      SEQUENCE {
30 101:       SEQUENCE {
30  99:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            6A 58 50 2E 59 67 F9 DD D1 8A FE BD 0D B1 FE 60
      :            A5 13 1B DF 0F B2 BE F0 B5 73 45 50 BA 1B BF 19
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.gif'
      :           }
      :          }
      :         }
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            BD CB 7B 75 72 6D 8C 1B 33 A4 2C DE AC 79 72 DA
      :            4A D9 F2 79 84 0A 58 58 6A CE 2F 02 80 EA D7 A5
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.jpg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709 and RFC 6170</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>RFC 3709 required client applications to support both direct and indirect
addressing.  This requirement is changed to <bcp14>SHOULD</bcp14> support both direct and
indirect addressing to allow implementations to be more privacy preserving.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>Update the reference for the URI Generic Syntax to be RFC 3986 instead
of the now obsolete RFC 2396.</li>
        <li>Update the reference for the application/pdf media type to be RFC 8118
instead of the now obsolete RFC 3778.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml+gzip media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC6838"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Encourage, instead of requiring, each logotype to be represented by
at least one image.</li>
        <li>Encourage the inclusion of text-based audio data suitable for
processing by a text-to-speech software using the MIME type of
"text/plain;charset=UTF-8".</li>
        <li>Require that the logotype extension not contain more than one certificate
image logotype.</li>
        <li>Privacy-related topics that were previously discussed in the Security
Considerations section are now covered in a separate Privacy Considerations
section.  Additional topics are covered in both sections.</li>
        <li>Provide ASN.1 modules for both the older syntax <xref target="OLD-ASN1"/> and the most
recent ASN.1 syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
        <li>Several editorial changes to improve clarity.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
