<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc5019bis-06" category="std" consensus="true" submissionType="IETF" obsoletes="5019" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Lightweight OCSP Profile Update">Updates to Lightweight OCSP Profile for High Volume Environments</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5019bis-06"/>
    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="Clint Wilson">
      <organization>Apple, Inc.</organization>
      <address>
        <email>clintw@apple.com</email>
      </address>
    </author>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2024" month="April" day="03"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>This specification defines a profile of the Online Certificate Status
Protocol (OCSP) that addresses the scalability issues inherent when
using OCSP in large scale (high volume) Public Key Infrastructure
(PKI) environments and/or in PKI environments that require a
lightweight solution to minimize communication bandwidth and client-
side processing.</t>
      <t>Since initial publication, this specification has been updated to allow
and recommend the use of SHA-256 over SHA-1.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/tadahik/RFC5019bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Online Certificate Status Protocol <xref target="RFC6960"/> specifies a mechanism
used to determine the status of digital certificates, in lieu of
using Certificate Revocation Lists (CRLs). Since its definition in
1999, it has been deployed in a variety of environments and has
proven to be a useful certificate status checking mechanism. (For
brevity we refer to OCSP as being used to verify certificate status,
but only the revocation status of a certificate is checked via this
protocol.)</t>
      <t>To date, many OCSP deployments have been used to ensure timely and
secure certificate status information for high-value electronic
transactions or highly sensitive information, such as in the banking
and financial environments. As such, the requirement for an OCSP
responder to respond in "real time" (i.e., generating a new OCSP
response for each OCSP request) has been important. In addition,
these deployments have operated in environments where bandwidth usage
is not an issue, and have run on client and server systems where
processing power is not constrained.</t>
      <t>As the use of PKI continues to grow and move into diverse
environments, so does the need for a scalable and cost-effective
certificate status mechanism. Although OCSP as currently defined and
deployed meets the need of small to medium-sized PKIs that operate on
powerful systems on wired networks, there is a limit as to how these
OCSP deployments scale from both an efficiency and cost perspective.
Mobile environments, where network bandwidth may be at a premium and
client-side devices are constrained from a processing point of view,
require the careful use of OCSP to minimize bandwidth usage and
client-side processing complexity. <xref target="OCSPMP"/></t>
      <t>PKI continues to be deployed into environments where millions if not
hundreds of millions of certificates have been issued. In many of
these environments, an even larger number of users (also known as
relying parties) have the need to ensure that the certificate they
are relying upon has not been revoked. As such, it is important that
OCSP is used in such a way that ensures the load on OCSP responders
and the network infrastructure required to host those responders are
kept to a minimum.</t>
      <t>This document addresses the scalability issues inherent when using
OCSP in PKI environments described above by defining a message
profile and clarifying OCSP client and responder behavior that will
permit:</t>
      <ol spacing="normal" type="1"><li>
          <t>OCSP response pre-production and distribution.</t>
        </li>
        <li>
          <t>Reduced OCSP message size to lower bandwidth usage.</t>
        </li>
        <li>
          <t>Response message caching both in the network and on the client.</t>
        </li>
      </ol>
      <t>It is intended that the normative requirements defined in this
profile will be adopted by OCSP clients and OCSP responders operating
in very large-scale (high-volume) PKI environments or PKI
environments that require a lightweight solution to minimize
bandwidth and client-side processing power (or both), as described
above.</t>
      <t>OCSP does not have the means to signal responder capabilities within the
protocol. Thus, clients will need to use out-of-band mechanisms to
determine whether a responder conforms to the profile defined in this
document. Regardless of the availability of such out-of-band mechanisms,
this profile ensures that interoperability will still occur between an
OCSP client that fully conforms with <xref target="RFC6960"/> and a responder that is
operating in a mode as described in this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="ocsp-message-profile">
      <name>OCSP Message Profile</name>
      <t>This section defines a subset of OCSPRequest and OCSPResponse
functionality as defined in <xref target="RFC6960"/>.</t>
      <section anchor="req-profile">
        <name>OCSP Request Profile</name>
        <section anchor="certid">
          <name>OCSPRequest Structure</name>
          <t>Provided for convenience here, but unchanged from <xref target="RFC6960"/>,
the ASN.1 structure corresponding to the OCSPRequest with the relevant
CertID is:</t>
          <artwork><![CDATA[
OCSPRequest     ::=     SEQUENCE {
   tbsRequest                  TBSRequest,
   optionalSignature   [0]     EXPLICIT Signature OPTIONAL }

TBSRequest      ::=     SEQUENCE {
   version             [0]     EXPLICIT Version DEFAULT v1,
   requestorName       [1]     EXPLICIT GeneralName OPTIONAL,
   requestList                 SEQUENCE OF Request,
   requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }

Request         ::=     SEQUENCE {
   reqCert                     CertID,
   singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }

CertID          ::=     SEQUENCE {
   hashAlgorithm       AlgorithmIdentifier,
   issuerNameHash      OCTET STRING, -- Hash of issuer's DN
   issuerKeyHash       OCTET STRING, -- Hash of issuer's public key
   serialNumber        CertificateSerialNumber }
]]></artwork>
          <t>OCSPRequests that conform to this profile <bcp14>MUST</bcp14> include only one Request
in the OCSPRequest.RequestList structure.</t>
          <t>The CertID.issuerNameHash and CertID.issuerKeyHash fields contain hashes
of the issuer's DN and public key, respectively. OCSP clients that
conform with this profile <bcp14>MUST</bcp14> use SHA-256 as defined in <xref target="RFC6234"/> as
the hashing algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values.</t>
          <t>Older OCSP clients which provide backward compatibility with
<xref target="RFC5019"/> use SHA-1 as defined in <xref target="RFC3174"/> as the hashing
algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values. However, these OCSP clients should
transition from SHA-1 to SHA-256 as soon as practical.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> include the singleRequestExtensions structure.</t>
          <t>Clients <bcp14>SHOULD NOT</bcp14> include the requestExtensions structure. If a
requestExtensions structure is included, this profile RECOMMENDS that
it contain only the nonce extension (id-pkix-ocsp-nonce). See
<xref target="fresh"/> for issues concerning the use of a nonce in high-volume
OCSP environments.</t>
        </section>
        <section anchor="signed-ocsprequests">
          <name>Signed OCSPRequests</name>
          <t>Clients <bcp14>SHOULD NOT</bcp14> send signed OCSPRequests. Responders <bcp14>MAY</bcp14> ignore
the signature on OCSPRequests.</t>
          <t>If the OCSPRequest is signed, the client <bcp14>SHALL</bcp14> specify its name in
the OCSPRequest.requestorName field; otherwise, clients <bcp14>SHOULD NOT</bcp14>
include the requestorName field in the OCSPRequest. OCSP servers
<bcp14>MUST</bcp14> be prepared to receive unsigned OCSP requests that contain the
requestorName field, but <bcp14>MUST</bcp14> handle such requests as if the
requestorName field were absent.</t>
        </section>
      </section>
      <section anchor="ocsp-response-profile">
        <name>OCSP Response Profile</name>
        <section anchor="ocspresponse-structure">
          <name>OCSPResponse Structure</name>
          <t>The ASN.1 structure corresponding to the OCSPResponse
with the relevant CertID is:</t>
          <artwork><![CDATA[
OCSPResponse ::= SEQUENCE {
   responseStatus         OCSPResponseStatus,
   responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }

ResponseBytes ::=       SEQUENCE {
   responseType   OBJECT IDENTIFIER,
   response       OCTET STRING }

The value for response SHALL be the DER encoding of BasicOCSPResponse.

BasicOCSPResponse       ::= SEQUENCE {
   tbsResponseData      ResponseData,
   signatureAlgorithm   AlgorithmIdentifier,
   signature            BIT STRING,
   certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }

ResponseData ::= SEQUENCE {
   version              [0] EXPLICIT Version DEFAULT v1,
   responderID              ResponderID,
   producedAt               GeneralizedTime,
   responses                SEQUENCE OF SingleResponse,
   responseExtensions   [1] EXPLICIT Extensions OPTIONAL }

SingleResponse ::= SEQUENCE {
   certID                       CertID,
   certStatus                   CertStatus,
   thisUpdate                   GeneralizedTime,
   nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,
   singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }
]]></artwork>
          <t>Responders <bcp14>MUST</bcp14> generate a BasicOCSPResponse as identified by the
id-pkix-ocsp-basic OID. Clients <bcp14>MUST</bcp14> be able to parse and accept a
BasicOCSPResponse. OCSPResponses that conform to this profile <bcp14>SHOULD</bcp14>
include only one SingleResponse in the
ResponseData.responses structure, but <bcp14>MAY</bcp14> include
additional SingleResponse elements if necessary to improve response
pre-generation performance or cache efficiency, and
to ensure backward compatibility. For instance,
to provide support to OCSP clients which do not yet support the
use of SHA-256 for CertID hash calculation, the OCSP responder
<bcp14>MAY</bcp14> include two SingleResponses in a BasicOCSPResponse.
In that BasicOCSPResponse, the CertID of one of the SingleResponses
uses SHA-1 for the hash calculation, and the CertID in the other
SingleResponse uses SHA-256. OCSP responders <bcp14>SHOULD NOT</bcp14> distribute
OCSP responses that contain CertIDs that use SHA-1 if the OCSP
responder has no clients that require the use of SHA-1.
Operators of OCSP responders may consider logging the hash
algorithm used by OCSP clients to inform their determination of
when it is appropriate to obsolete the distribution of OCSP responses
that employ SHA-1 for CertID field hashes. See {#sha1-sec} for more
information on the security considerations for the continued use of
SHA-1.</t>
          <t>The responder <bcp14>SHOULD NOT</bcp14> include responseExtensions. As specified in
<xref target="RFC6960"/>, clients <bcp14>MUST</bcp14> ignore unrecognized non-critical
responseExtensions in the response.</t>
          <t>In the case where a responder does not have the ability to respond to
an OCSP request containing an option not supported by the server, it
<bcp14>SHOULD</bcp14> return the most complete response it can. For example, in the
case where a responder only supports pre-produced responses and does
not have the ability to respond to an OCSP request containing a
nonce, it <bcp14>SHOULD</bcp14> return a response that does not include a nonce.</t>
          <t>Clients <bcp14>SHOULD</bcp14> attempt to process a response even if the response
does not include a nonce. See <xref target="fresh"/> for details on validating
responses that do not contain a nonce. See also <xref target="sec-cons"/> for
relevant security considerations.</t>
          <t>Responders that do not have the ability to respond to OCSP requests
that contain an unsupported option such as a nonce <bcp14>MAY</bcp14> forward the
request to an OCSP responder capable of doing so.</t>
          <t>The responder <bcp14>MAY</bcp14> include the singleResponse.singleResponse
extensions structure.</t>
        </section>
        <section anchor="byKey">
          <name>Signed OCSPResponses</name>
          <t>Clients <bcp14>MUST</bcp14> validate the signature on the returned OCSPResponse.</t>
          <t>If the response is signed by a delegate of the issuing certification
authority (CA), a valid responder certificate <bcp14>MUST</bcp14> be referenced in
the BasicOCSPResponse.certs structure.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> that the OCSP responder's certificate contain the
id-pkix-ocsp-nocheck extension, as defined in <xref target="RFC6960"/>, to indicate
to the client that it need not check the certificate's status. In
addition, it is <bcp14>RECOMMENDED</bcp14> that neither an OCSP authorityInfoAccess
(AIA) extension nor cRLDistributionPoints (CRLDP) extension be
included in the OCSP responder's certificate. Accordingly, the
responder's signing certificate <bcp14>SHOULD</bcp14> be relatively short-lived and
renewed regularly.</t>
          <t>Clients <bcp14>MUST</bcp14> be able to identify OCSP responder certificates using
the byKey field and <bcp14>SHOULD</bcp14> be able to identify OCSP responder
certificates using the byName field of the ResponseData.ResponderID
choices.</t>
          <t>Older responders which provide backward compatibility with <xref target="RFC5019"/>
            <bcp14>MAY</bcp14> use the byName field to represent the ResponderID, but should
transition to using the byKey field as soon as practical.</t>
          <t>Newer responders that conform to this profile <bcp14>MUST</bcp14> use the byKey
field to represent the ResponderID to reduce the size of the response.</t>
        </section>
        <section anchor="ocspresponsestatus-values">
          <name>OCSPResponseStatus Values</name>
          <t>As long as the OCSP infrastructure has authoritative records for a
particular certificate, an OCSPResponseStatus of "successful" will be
returned. When access to authoritative records for a particular
certificate is not available, the responder <bcp14>MUST</bcp14> return an
OCSPResponseStatus of "unauthorized". As such, this profile extends
the <xref target="RFC6960"/> definition of "unauthorized" as follows:</t>
          <t>The response "unauthorized" is returned in cases where the client
is not authorized to make this query to this server or the server
is not capable of responding authoritatively.</t>
          <t>For example, OCSP responders that do not have access to authoritative
records for a requested certificate, such as those that generate and
distribute OCSP responses in advance and thus do not have the ability
to properly respond with a signed "successful" yet "unknown"
response, will respond with an OCSPResponseStatus of "unauthorized".
Also, in order to ensure the database of revocation information does
not grow unbounded over time, the responder <bcp14>MAY</bcp14> remove the status
records of expired certificates. Requests from clients for
certificates whose record has been removed will result in an
OCSPResponseStatus of "unauthorized".</t>
          <t>Security considerations regarding the use of unsigned responses are
discussed in <xref target="RFC6960"/>.</t>
        </section>
        <section anchor="times">
          <name>thisUpdate, nextUpdate, and producedAt</name>
          <t>When pre-producing OCSPResponse messages, the responder <bcp14>MUST</bcp14> set the
thisUpdate, nextUpdate, and producedAt times as follows:</t>
          <dl>
            <dt>thisUpdate:</dt>
            <dd>
              <t>The time at which the status being indicated is known to be correct.</t>
            </dd>
            <dt>nextUpdate:</dt>
            <dd>
              <t>The time at or before which newer information will be available
about the status of the certificate. Responders <bcp14>MUST</bcp14> always include
this value to aid in response caching. See <xref target="cache-recs"/> for additional
information on caching.</t>
            </dd>
            <dt>producedAt:</dt>
            <dd>
              <t>The time at which the OCSP response was signed.</t>
            </dd>
          </dl>
          <aside>
            <t>Note: In many cases the value of thisUpdate and producedAt will be
  the same.</t>
          </aside>
          <t>For the purposes of this profile, ASN.1-encoded GeneralizedTime
values such as thisUpdate, nextUpdate, and producedAt <bcp14>MUST</bcp14> be
expressed Greenwich Mean Time (Zulu) and <bcp14>MUST</bcp14> include seconds (i.e.,
times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values <bcp14>MUST NOT</bcp14> include fractional seconds.</t>
        </section>
      </section>
    </section>
    <section anchor="client-behavior">
      <name>Client Behavior</name>
      <section anchor="ocsp-responder-discovery">
        <name>OCSP Responder Discovery</name>
        <t>Clients <bcp14>MUST</bcp14> support the authorityInfoAccess extension as defined in
<xref target="RFC5280"/> and <bcp14>MUST</bcp14> recognize the id-ad-ocsp access method. This
enables CAs to inform clients how they can contact the OCSP service.</t>
        <t>In the case where a client is checking the status of a certificate
that contains both an authorityInformationAccess (AIA) extension
pointing to an OCSP responder and a cRLDistributionPoints extension
pointing to a CRL, the client <bcp14>SHOULD</bcp14> attempt to contact the OCSP
responder first. Clients <bcp14>MAY</bcp14> attempt to retrieve the CRL if no
OCSPResponse is received from the responder after a locally
configured timeout and number of retries.</t>
      </section>
      <section anchor="sending-an-ocsp-request">
        <name>Sending an OCSP Request</name>
        <t>To avoid needless network traffic, applications <bcp14>MUST</bcp14> verify the
signature of signed data before asking an OCSP client to check the
status of certificates used to verify the data. If the signature is
invalid or the application is not able to verify it, an OCSP check
<bcp14>MUST NOT</bcp14> be requested.</t>
        <t>Similarly, an application <bcp14>MUST</bcp14> validate the signature on certificates
in a chain, before asking an OCSP client to check the status of the
certificate. If the certificate signature is invalid or the
application is not able to verify it, an OCSP check <bcp14>MUST NOT</bcp14> be
requested. Clients <bcp14>SHOULD NOT</bcp14> make a request to check the status of
expired certificates.</t>
      </section>
    </section>
    <section anchor="fresh">
      <name>Ensuring an OCSPResponse Is Fresh</name>
      <t>In order to ensure that a client does not accept an out-of-date
response that indicates a 'good' status when in fact there is a more
up-to-date response that specifies the status of 'revoked', a client
must ensure the responses they receive are fresh.</t>
      <t>In general, two mechanisms are available to clients to ensure a
response is fresh. The first uses nonces, and the second is based on
time. In order for time-based mechanisms to work, both clients and
responders <bcp14>MUST</bcp14> have access to an accurate source of time.</t>
      <t>Because this profile specifies that clients <bcp14>SHOULD NOT</bcp14> include a
requestExtensions structure in OCSPRequests (see <xref target="req-profile"/>),
clients <bcp14>MUST</bcp14> be able to determine OCSPResponse freshness based on an
accurate source of time. Clients that opt to include a nonce in the
request <bcp14>SHOULD NOT</bcp14> reject a corresponding OCSPResponse solely on the
basis of the nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to
validating the OCSPResponse based on time.</t>
      <t>Clients that do not include a nonce in the request <bcp14>MUST</bcp14> ignore any
nonce that may be present in the response.</t>
      <t>Clients <bcp14>MUST</bcp14> check for the existence of the nextUpdate field and <bcp14>MUST</bcp14>
ensure the current time, expressed in GMT time as described in
<xref target="times"/>, falls between the thisUpdate and nextUpdate times. If
the nextUpdate field is absent, the client <bcp14>MUST</bcp14> reject the response.</t>
      <t>If the nextUpdate field is present, the client <bcp14>MUST</bcp14> ensure that it is
not earlier than the current time. If the current time on the client
is later than the time specified in the nextUpdate field, the client
<bcp14>MUST</bcp14> reject the response as stale. Clients <bcp14>MAY</bcp14> allow configuration
of a small tolerance period for acceptance of responses after
nextUpdate to handle minor clock differences relative to responders
and caches. This tolerance period should be chosen based on the
accuracy and precision of time synchronization technology available
to the calling application environment. For example, Internet peers
with low latency connections typically expect NTP time
synchronization to keep them accurate within parts of a second;
higher latency environments or where an NTP analogue is not available
may have to be more liberal in their tolerance
(e.g. allow one day difference).</t>
      <t>See the security considerations in <xref target="sec-cons"/> for additional details
on replay and man-in-the-middle attacks.</t>
    </section>
    <section anchor="transport">
      <name>Transport Profile</name>
      <t>OCSP clients can send HTTP-based OCSP requests using either the GET
or POST method.
The OCSP responder <bcp14>MUST</bcp14> support requests and responses over HTTP.
When sending requests that are less than or equal to 255 bytes in
total (after encoding) including the scheme and delimiters (http://),
server name and base64-encoded OCSPRequest structure, clients <bcp14>MUST</bcp14>
use the GET method (to enable OCSP response caching). OCSP requests
larger than 255 bytes <bcp14>SHOULD</bcp14> be submitted using the POST method. In
all cases, clients <bcp14>MUST</bcp14> follow the descriptions in A.1 of <xref target="RFC6960"/>
when constructing these messages.</t>
      <t>When constructing a GET message, OCSP clients <bcp14>MUST</bcp14> base64-encode the
OCSPRequest structure according to <xref target="RFC4648"/>, section 4. Clients
<bcp14>MUST NOT</bcp14> include whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string. Clients
<bcp14>MUST</bcp14> properly URL-encode the base64-encoded OCSPRequest according to
<xref target="RFC3986"/>. OCSP clients <bcp14>MUST</bcp14> append the base64-encoded OCSPRequest
to the URI specified in the AIA extension <xref target="RFC5280"/>. For example:</t>
      <artwork><![CDATA[
   http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dA
   deGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D
]]></artwork>
      <t>In response to properly formatted OCSPRequests that are cachable
(i.e., responses that contain a nextUpdate value), the responder will
include the binary value of the DER encoding of the OCSPResponse
preceded by the following HTTP <xref target="RFC9110"/> and <xref target="RFC9111"/> headers.</t>
      <artwork><![CDATA[
   Content-type: application/ocsp-response
   Content-length: < OCSP response length >
   Last-modified: < producedAt HTTP-date >
   ETag: "< strong validator >"
   Expires: < nextUpdate HTTP-date >
   Cache-control: max-age=< n >, public, no-transform, must-revalidate
   Date: < current HTTP-date >
]]></artwork>
      <t>See <xref target="http-proxies"/> for details on the use of these headers.</t>
    </section>
    <section anchor="cache-recs">
      <name>Caching Recommendations</name>
      <t>The ability to cache OCSP responses throughout the network is an
important factor in high volume OCSP deployments. This section
discusses the recommended caching behavior of OCSP clients and HTTP
proxies and the steps that should be taken to minimize the number of
times that OCSP clients "hit the wire". In addition, the concept of
including OCSP responses in protocol exchanges (aka stapling or
piggybacking), such as has been defined in TLS, is also discussed.</t>
      <section anchor="caching-at-the-client">
        <name>Caching at the Client</name>
        <t>To minimize bandwidth usage, clients <bcp14>MUST</bcp14> locally cache authoritative
OCSP responses (i.e., a response with a signature that has been
successfully validated and that indicate an OCSPResponseStatus of
'successful').</t>
        <t>Most OCSP clients will send OCSPRequests at or near the nextUpdate
time (when a cached response expires). To avoid large spikes in
responder load that might occur when many clients refresh cached
responses for a popular certificate, responders <bcp14>MAY</bcp14> indicate when the
client should fetch an updated OCSP response by using the cache-
control:max-age directive. Clients <bcp14>SHOULD</bcp14> fetch the updated OCSP
Response on or after the max-age time. To ensure that clients
receive an updated OCSP response, OCSP responders <bcp14>MUST</bcp14> refresh the
OCSP response before the max-age time.</t>
      </section>
      <section anchor="http-proxies">
        <name>HTTP Proxies</name>
        <t>The responder <bcp14>SHOULD</bcp14> set the HTTP headers of the OCSP response in
such a way as to allow for the intelligent use of intermediate HTTP
proxy servers. See <xref target="RFC9110"/> and <xref target="RFC9111"/> for the full definition
of these headers and the proper format of any date and time values.</t>
        <table anchor="http-headers">
          <name>HTTP Headers</name>
          <thead>
            <tr>
              <th align="left">HTTP Header</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Date</td>
              <td align="left">The date and time at which the OCSP server generated the HTTP response.</td>
            </tr>
            <tr>
              <td align="left">Last-Modified</td>
              <td align="left">This value specifies the date and time at which the OCSP responder last modified the response. This date and time will be the same as the thisUpdate timestamp in the request itself.</td>
            </tr>
            <tr>
              <td align="left">Expires</td>
              <td align="left">Specifies how long the response is considered fresh. This date and time will be the same as the nextUpdate timestamp in the OCSP response itself.</td>
            </tr>
            <tr>
              <td align="left">ETag</td>
              <td align="left">A string that identifies a particular version of the associated data. This profile RECOMMENDS that the ETag value be the ASCII HEX representation of the SHA-256 hash of the OCSPResponse structure.</td>
            </tr>
            <tr>
              <td align="left">Cache-Control</td>
              <td align="left">Contains a number of caching directives. <br/> * max-age = &lt; n &gt; -where n is a time value later than thisUpdate but earlier than nextUpdate. <br/> * public -makes normally uncachable response cachable by both shared and nonshared caches. <br/> * no-transform -specifies that a proxy cache cannot change the type, length, or encoding of the object content. <br/> * must-revalidate -prevents caches from intentionally returning stale responses.</td>
            </tr>
          </tbody>
        </table>
        <t>OCSP responders <bcp14>MUST NOT</bcp14> include a "Pragma: no-cache", "Cache-
Control: no-cache", or "Cache-Control: no-store" header in
authoritative OCSP responses.</t>
        <t>OCSP responders <bcp14>SHOULD</bcp14> include one or more of these headers in non-
authoritative OCSP responses.</t>
        <t>For example, assume that an OCSP response has the following timestamp
values:</t>
        <artwork><![CDATA[
   thisUpdate = March 19, 2023 01:00:00 GMT
   nextUpdate = March 21, 2023 01:00:00 GMT
   productedAt = March 19, 2023 01:00:00 GMT
]]></artwork>
        <t>and that an OCSP client requests the response on March 20, 2023 01:00:00
GMT. In this scenario, the HTTP response may look like this:</t>
        <artwork><![CDATA[
   Content-Type: application/ocsp-response
   Content-Length: 1000
   Date: Mon, 20 Mar 2023 01:00:00 GMT
   Last-Modified: Sun, 19 Mar 2023 01:00:00 GMT
   ETag: "97df3588b5a3f24babc3851b372f0ba7
         1a9dcdded43b14b9d06961bfc1707d9d"
   Expires: Tue, 21 Mar 2023 01:00:00 GMT
   Cache-Control: max-age=86000,public,no-transform,must-revalidate
   <...>
]]></artwork>
        <t>OCSP clients <bcp14>MUST NOT</bcp14> include a no-cache header in OCSP request
messages, unless the client encounters an expired response which may
be a result of an intermediate proxy caching stale data. In this
situation, clients <bcp14>SHOULD</bcp14> resend the request specifying that proxies
should be bypassed by including an appropriate HTTP header in the
request (i.e., Pragma: no-cache or Cache-Control: no-cache).</t>
      </section>
      <section anchor="caching-at-servers">
        <name>Caching at Servers</name>
        <t>In some scenarios, it is advantageous to include OCSP response
information within the protocol being utilized between the client and
server. Including OCSP responses in this manner has a few attractive
effects.</t>
        <t>First, it allows for the caching of OCSP responses on the server,
thus lowering the number of hits to the OCSP responder.</t>
        <t>Second, it enables certificate validation in the event the client is
not connected to a network and thus eliminates the need for clients
to establish a new HTTP session with the responder.</t>
        <t>Third, it reduces the number of round trips the client needs to make
in order to complete a handshake.</t>
        <t>Fourth, it simplifies the client-side OCSP implementation by enabling
a situation where the client need only the ability to parse and
recognize OCSP responses.</t>
        <t>This functionality has been specified as an extension to the TLS
<xref target="I-D.ietf-tls-rfc8446bis"/> protocol in
<xref section="4.4.2" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>,
but can be applied to any client-server protocol.</t>
        <t>This profile RECOMMENDS that both TLS clients and servers implement
the certificate status request extension mechanism for TLS.</t>
        <t>Further information regarding caching issues can be obtained
from <xref target="RFC3143"/>.</t>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The following considerations apply in addition to the security
considerations addressed in <xref section="5" sectionFormat="of" target="RFC6960"/>.</t>
      <section anchor="replay-attacks">
        <name>Replay Attacks</name>
        <t>Because the use of nonces in this profile is optional, there is a
possibility that an out of date OCSP response could be replayed, thus
causing a client to accept a good response when in fact there is a
more up-to-date response that specifies the status of revoked. In
order to mitigate this attack, clients <bcp14>MUST</bcp14> have access to an
accurate source of time and ensure that the OCSP responses they
receive are sufficiently fresh.</t>
        <t>Clients that do not have an accurate source of date and time are
vulnerable to service disruption. For example, a client with a
sufficiently fast clock may reject a fresh OCSP response. Similarly
a client with a sufficiently slow clock may incorrectly accept
expired valid responses for certificates that may in fact be revoked.</t>
        <t>Future versions of the OCSP protocol may provide a way for the client
to know whether the server supports nonces or does not support
nonces. If a client can determine that the server supports nonces,
it <bcp14>MUST</bcp14> reject a reply that does not contain an expected nonce.
Otherwise, clients that opt to include a nonce in the request <bcp14>SHOULD
NOT</bcp14> reject a corresponding OCSPResponse solely on the basis of the
nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to validating the
OCSPResponse based on time.</t>
      </section>
      <section anchor="man-in-the-middle-attacks">
        <name>Man-in-the-Middle Attacks</name>
        <t>To mitigate risk associated with this class of attack, the client
must properly validate the signature on the response.</t>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of the OCSP responder and to verify that it is authorized to
sign responses on the CA's behalf.</t>
        <t>Clients <bcp14>MUST</bcp14> ensure that they are communicating with an authorized
responder by the rules described in <xref section="4.2.2.2" sectionFormat="of" target="RFC6960"/>.</t>
      </section>
      <section anchor="impersonation-attacks">
        <name>Impersonation Attacks</name>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of OCSP responder.</t>
        <t>As detailed in <xref target="RFC6960"/>, clients must properly validate the signature
of the OCSP response and the signature on the OCSP response signer
certificate to ensure an authorized responder created it.</t>
      </section>
      <section anchor="denial-of-service-attacks">
        <name>Denial-of-Service Attacks</name>
        <t>OCSP responders should take measures to prevent or mitigate denial-
of-service attacks. As this profile specifies the use of unsigned
OCSPRequests, access to the responder may be implicitly given to
everyone who can send a request to a responder, and thus the ability
to mount a denial-of-service attack via a flood of requests may be
greater. For example, a responder could limit the rate of incoming
requests from a particular IP address if questionable behavior is
detected.</t>
      </section>
      <section anchor="modification-of-http-headers">
        <name>Modification of HTTP Headers</name>
        <t>Values included in HTTP headers, as described in <xref target="transport"/>
and <xref target="cache-recs"/>,
are not cryptographically protected; they may be manipulated by an
attacker. Clients <bcp14>SHOULD</bcp14> use these values for caching guidance only
and ultimately <bcp14>SHOULD</bcp14> rely only on the values present in the signed
OCSPResponse. Clients <bcp14>SHOULD NOT</bcp14> rely on cached responses beyond the
nextUpdate time.</t>
      </section>
      <section anchor="request-authentication-and-authorization">
        <name>Request Authentication and Authorization</name>
        <t>The suggested use of unsigned requests in this environment removes an
option that allows the responder to determine the authenticity of
incoming request. Thus, access to the responder may be implicitly
given to everyone who can send a request to a responder.
Environments where explicit authorization to access the OCSP
responder is necessary can utilize other mechanisms to authenticate
requestors or restrict or meter service.</t>
      </section>
      <section anchor="sha1-sec">
        <name>Use of SHA-1 for the calculation of CertID field values</name>
        <t>Although the use of SHA-1 for the calculation of CertID field values is
not of concern from a cryptographic security standpoint, the continued
use of SHA-1 in an ecosystem requires that software that interoperates
with the ecosystem maintain support for SHA-1. This increases
implementation complexity and potential attack surface for the software
in question. Thus, the continued use of SHA-1 in an ecosystem to
maintain interoperability with legacy software must be weighed against
the increased implementation complexity and potential attack surface.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC5019">
          <front>
            <title>The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments</title>
            <author fullname="A. Deacon" initials="A." surname="Deacon"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This specification defines a profile of the Online Certificate Status Protocol (OCSP) that addresses the scalability issues inherent when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) environments and/or in PKI environments that require a lightweight solution to minimize communication bandwidth and client-side processing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5019"/>
          <seriesInfo name="DOI" value="10.17487/RFC5019"/>
        </reference>
        <reference anchor="RFC3174">
          <front>
            <title>US Secure Hash Algorithm 1 (SHA1)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="P. Jones" initials="P." surname="Jones"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3174"/>
          <seriesInfo name="DOI" value="10.17487/RFC3174"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
        </reference>
        <reference anchor="RFC9500">
          <front>
            <title>Standard Public Key Cryptography (PKC) Test Keys</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
            <author fullname="C. Bonnell" initials="C." surname="Bonnell"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>This document provides a set of standard Public Key Cryptography (PKC) test keys that may be used wherever pre-generated keys and associated operations like digital signatures are required. Like the European Institute for Computer Antivirus Research (EICAR) virus test and the Generic Test for Unsolicited Bulk Email (GTUBE) spam test files, these publicly known test keys can be detected and recognised by applications consuming them as being purely for testing purposes without assigning any security properties to them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9500"/>
          <seriesInfo name="DOI" value="10.17487/RFC9500"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="OCSPMP">
          <front>
            <title>OCSP Mobile Profile V1.0</title>
            <author>
              <organization>Open Mobile Alliance</organization>
            </author>
            <date/>
          </front>
          <seriesInfo name="www.openmobilealliance.org" value=""/>
        </reference>
        <reference anchor="RFC3143">
          <front>
            <title>Known HTTP Proxy/Caching Problems</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="J. Dilley" initials="J." surname="Dilley"/>
            <date month="June" year="2001"/>
            <abstract>
              <t>This document catalogs a number of known problems with World Wide Web (WWW) (caching) proxies and cache servers. The goal of the document is to provide a discussion of the problems and proposed workarounds, and ultimately to improve conditions by illustrating problems. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3143"/>
          <seriesInfo name="DOI" value="10.17487/RFC3143"/>
        </reference>
      </references>
    </references>
    <?line 719?>

<section anchor="differences-from-rfc-5019">
      <name>Differences from RFC 5019</name>
      <t>This document obsoletes <xref target="RFC5019"/>. <xref target="RFC5019"/> defines a lightweight
profile for OCSP that makes the protocol more suitable for use in
high-volume environments. The lightweight profile specifies the
mandatory use of SHA-1 when calculating the values of several fields in
OCSP requests and responses. In recent years, weaknesses have been
demonstrated with the SHA-1 algorithm. As a result, SHA-1 is
increasingly falling out of use even for non-security relevant
use cases. This document obsoletes the lightweight profile as specified
in RFC 5019 to instead recommend the use of SHA-256 where SHA-1 was
previously required. An <xref target="RFC5019"/>-compliant OCSP client is still able
to use SHA-1, but the use of SHA-1 may become obsolete in the future.</t>
      <t>Substantive changes to RFC 5019:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="certid"/> requires new OCSP clients to use SHA-256 to
support migration for OCSP clients.</t>
        </li>
        <li>
          <t><xref target="byKey"/> requires new OCSP responders to use the byKey field,
and support migration from byName fields.</t>
        </li>
        <li>
          <t><xref target="transport"/> clarifies that OCSP clients <bcp14>MUST NOT</bcp14> include
whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string.</t>
        </li>
      </ul>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="root-certification-authority-certificate">
        <name>Root Certification Authority Certificate</name>
        <t>This is a self-signed certificate for the certification authority that
issued the end-entity certificate and OCSP delegated responder
example certificates below.</t>
        <t>The the key pair for the certification authority is the "testECCP521"
key from <xref target="RFC9500"/>, section 2.3.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIICKDCCAYqgAwIBAgIBATAKBggqhkjOPQQDBDA4MQswCQYDVQQGEwJYWDEUMBIG
A1UECgwLQ2VydHMgJ3IgVXMxEzARBgNVBAMMCklzc3VpbmcgQ0EwHhcNMjQwNDAy
MTIzNzQ3WhcNMjUwNDAyMTIzNzQ3WjA4MQswCQYDVQQGEwJYWDEUMBIGA1UECgwL
Q2VydHMgJ3IgVXMxEzARBgNVBAMMCklzc3VpbmcgQ0EwgZswEAYHKoZIzj0CAQYF
K4EEACMDgYYABAHQ/XJXqEx0f1YldcBzhdvr8vUr6lgIPbgv3RUx2KrjzIdf8C/3
+i2iYNjrYtbS9dZJJ44yFzagYoy7swMItuYY2wD2KtIExkYDWbyBiriWG/Dw/A7F
quikKBc85W8A3psVfB5cgsZPVi/K3vxKTCj200LPPvYW/ILTO3KFySHyvzb92KNC
MEAwHQYDVR0OBBYEFI7CFAlgduqQOOk5rhttUsQXfZ++MA8GA1UdEwEB/wQFMAMB
Af8wDgYDVR0PAQH/BAQDAgIEMAoGCCqGSM49BAMEA4GLADCBhwJBbr/1SJiHCgXG
EJ7R+3er1LdWqrdZHgtCwyT7+wFBIJmVswEiom2LGh/oMuu5mD+u/+o1m07vmmZj
/+ipGp8TIwkCQgCoZ4bHte6XkFm7hUXascLN7vkv7qKwXyTsCvIDpEDTRCX8dUFe
73jGebitkumRHjVhlBJLo7n3FMJrFHNoeblMbw==
-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 552: SEQUENCE {
  4 394:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 1
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 28  56:     SEQUENCE {
 30  11:       SET {
 32   9:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 39   2:           PrintableString 'XX'
       :           }
       :         }
 43  20:       SET {
 45  18:         SEQUENCE {
 47   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 52  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 65  19:       SET {
 67  17:         SEQUENCE {
 69   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 74  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 86  30:     SEQUENCE {
 88  13:       UTCTime 02/04/2024 12:37:47 GMT
103  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
118  56:     SEQUENCE {
120  11:       SET {
122   9:         SEQUENCE {
124   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
129   2:           PrintableString 'XX'
       :           }
       :         }
133  20:       SET {
135  18:         SEQUENCE {
137   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
142  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
155  19:       SET {
157  17:         SEQUENCE {
159   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
164  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
176 155:     SEQUENCE {
179  16:       SEQUENCE {
181   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
190   5:         OBJECT IDENTIFIER secp521r1 (1 3 132 0 35)
       :         }
197 134:       BIT STRING
       :         04 01 D0 FD 72 57 A8 4C 74 7F 56 25 75 C0 73 85
       :         DB EB F2 F5 2B EA 58 08 3D B8 2F DD 15 31 D8 AA
       :         E3 CC 87 5F F0 2F F7 FA 2D A2 60 D8 EB 62 D6 D2
       :         F5 D6 49 27 8E 32 17 36 A0 62 8C BB B3 03 08 B6
       :         E6 18 DB 00 F6 2A D2 04 C6 46 03 59 BC 81 8A B8
       :         96 1B F0 F0 FC 0E C5 AA E8 A4 28 17 3C E5 6F 00
       :         DE 9B 15 7C 1E 5C 82 C6 4F 56 2F CA DE FC 4A 4C
       :         28 F6 D3 42 CF 3E F6 16 FC 82 D3 3B 72 85 C9 21
       :         F2 BF 36 FD D8
       :       }
334  66:     [3] {
336  64:       SEQUENCE {
338  29:         SEQUENCE {
340   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
345  22:           OCTET STRING, encapsulates {
347  20:             OCTET STRING
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :             }
       :           }
369  15:         SEQUENCE {
371   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
376   1:           BOOLEAN TRUE
379   5:           OCTET STRING, encapsulates {
381   3:             SEQUENCE {
383   1:               BOOLEAN TRUE
       :               }
       :             }
       :           }
386  14:         SEQUENCE {
388   3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
393   1:           BOOLEAN TRUE
396   4:           OCTET STRING, encapsulates {
398   2:             BIT STRING 2 unused bits
       :               '100000'B (bit 5)
       :             }
       :           }
       :         }
       :       }
       :     }
402  10:   SEQUENCE {
404   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
414 139:   BIT STRING, encapsulates {
418 135:     SEQUENCE {
421  65:       INTEGER
       :         6E BF F5 48 98 87 0A 05 C6 10 9E D1 FB 77 AB D4
       :         B7 56 AA B7 59 1E 0B 42 C3 24 FB FB 01 41 20 99
       :         95 B3 01 22 A2 6D 8B 1A 1F E8 32 EB B9 98 3F AE
       :         FF EA 35 9B 4E EF 9A 66 63 FF E8 A9 1A 9F 13 23
       :         09
488  66:       INTEGER
       :         00 A8 67 86 C7 B5 EE 97 90 59 BB 85 45 DA B1 C2
       :         CD EE F9 2F EE A2 B0 5F 24 EC 0A F2 03 A4 40 D3
       :         44 25 FC 75 41 5E EF 78 C6 79 B8 AD 92 E9 91 1E
       :         35 61 94 12 4B A3 B9 F7 14 C2 6B 14 73 68 79 B9
       :         4C 6F
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="end-entity-certificate">
        <name>End-entity Certificate</name>
        <t>This is an end-entity certificate whose status is requested and
returned in the OCSP request and response examples below.</t>
        <t>The the key pair for the end-entity certificate is the "testECCP256"
key from <xref target="RFC9500"/>, section 2.3.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 475: SEQUENCE {
  4 316:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   4:     INTEGER 27979789
 19  10:     SEQUENCE {
 21   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 31  56:     SEQUENCE {
 33  11:       SET {
 35   9:         SEQUENCE {
 37   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 42   2:           PrintableString 'XX'
       :           }
       :         }
 46  20:       SET {
 48  18:         SEQUENCE {
 50   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 55  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 68  19:       SET {
 70  17:         SEQUENCE {
 72   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 77  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 89  30:     SEQUENCE {
 91  13:       UTCTime 02/04/2024 12:37:47 GMT
106  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
121  28:     SEQUENCE {
123  26:       SET {
125  24:         SEQUENCE {
127   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
132  17:           UTF8String 'xn--18j4d.example'
       :           }
       :         }
       :       }
151  89:     SEQUENCE {
153  19:       SEQUENCE {
155   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
164   8:         OBJECT IDENTIFIER prime256v1 (1 2 840 10045 3 1 7)
       :         }
174  66:       BIT STRING
       :         04 42 25 48 F8 8F B7 82 FF B5 EC A3 74 44 52 C7
       :         2A 1E 55 8F BD 6F 73 BE 5E 48 E9 32 32 CC 45 C5
       :         B1 6C 4C D1 0C 4C B8 D5 B8 A1 71 39 E9 48 82 C8
       :         99 25 72 99 34 25 F4 14 19 AB 7E 90 A4 2A 49 42
       :         72
       :       }
242  80:     [3] {
244  78:       SEQUENCE {
246  29:         SEQUENCE {
248   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
253  22:           OCTET STRING, encapsulates {
255  20:             OCTET STRING
       :               5B 70 A7 98 17 F7 9F F6 37 D2 F7 E3 DC 44 6C 21
       :               09 D7 BB D4
       :             }
       :           }
277  31:         SEQUENCE {
279   3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
284  24:           OCTET STRING, encapsulates {
286  22:             SEQUENCE {
288  20:               [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :               }
       :             }
       :           }
310  12:         SEQUENCE {
312   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
317   1:           BOOLEAN TRUE
320   2:           OCTET STRING, encapsulates {
322   0:             SEQUENCE {}
       :             }
       :           }
       :         }
       :       }
       :     }
324  10:   SEQUENCE {
326   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
336 140:   BIT STRING, encapsulates {
340 136:     SEQUENCE {
343  66:       INTEGER
       :         00 8A 2D F1 26 0D 16 44 9C AD CB 18 E5 3F 35 1D
       :         29 8D CE 13 FF D0 60 BC EC DD D6 23 CE 3D 08 DD
       :         2A 98 D6 B4 9C C5 D6 F0 79 C3 28 64 79 9E FF C3
       :         F7 1F 93 F2 E2 CC 06 5A 45 51 69 87 42 65 C0 24
       :         F3 7C
411  66:       INTEGER
       :         01 5B C0 34 5E C8 B2 3C 9C 99 7D A6 62 78 E0 E6
       :         B6 7A 08 A1 B6 4F F9 E4 CB 35 69 06 50 52 FA B8
       :         2B 4B B5 09 98 B6 B5 E9 2C 02 5F BE 41 3A 59 85
       :         6A 09 49 78 F7 92 B1 F6 5E 8C F5 30 4B 2B 95 FA
       :         57 7C
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-responder-certificate">
        <name>OCSP Responder Certificate</name>
        <t>This is a certificate for the OCSP delegated response that signed the
OCSP response example below.</t>
        <t>The the key pair for the OCSP Responder certificate is the "testECCP384"
key from <xref target="RFC9500"/>, section 2.3.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 587: SEQUENCE {
  4 430:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 1
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 28  56:     SEQUENCE {
 30  11:       SET {
 32   9:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 39   2:           PrintableString 'XX'
       :           }
       :         }
 43  20:       SET {
 45  18:         SEQUENCE {
 47   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 52  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 65  19:       SET {
 67  17:         SEQUENCE {
 69   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 74  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 86  30:     SEQUENCE {
 88  13:       UTCTime 02/04/2024 12:37:47 GMT
103  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
118  60:     SEQUENCE {
120  11:       SET {
122   9:         SEQUENCE {
124   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
129   2:           PrintableString 'XX'
       :           }
       :         }
133  20:       SET {
135  18:         SEQUENCE {
137   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
142  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
155  23:       SET {
157  21:         SEQUENCE {
159   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
164  14:           UTF8String 'OCSP Responder'
       :           }
       :         }
       :       }
180 118:     SEQUENCE {
182  16:       SEQUENCE {
184   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
193   5:         OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
       :         }
200  98:       BIT STRING
       :         04 5B 09 01 B8 85 23 29 6E B9 19 D5 0F FA 1A 9C
       :         B3 74 BC 4D 40 95 86 28 2B FE CA 11 B1 D9 5A DB
       :         B5 47 34 AF 57 0B F8 2B 72 28 CF 22 6B CF 4C 25
       :         DD BC FE 3B 1A 3A D3 94 30 EF F7 63 E1 D6 8D 2E
       :         15 1D 91 72 0B 77 95 B5 8D A6 B3 46 39 61 3A 8F
       :         B9 B5 A8 DA 48 C6 74 71 17 F9 91 9E 84 24 F3 7E
       :         C8
       :       }
300 135:     [3] {
303 132:       SEQUENCE {
306  29:         SEQUENCE {
308   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
313  22:           OCTET STRING, encapsulates {
315  20:             OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :             }
       :           }
337  31:         SEQUENCE {
339   3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
344  24:           OCTET STRING, encapsulates {
346  22:             SEQUENCE {
348  20:               [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :               }
       :             }
       :           }
370  12:         SEQUENCE {
372   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
377   1:           BOOLEAN TRUE
380   2:           OCTET STRING, encapsulates {
382   0:             SEQUENCE {}
       :             }
       :           }
384  14:         SEQUENCE {
386   3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
391   1:           BOOLEAN TRUE
394   4:           OCTET STRING, encapsulates {
396   2:             BIT STRING 7 unused bits
       :               '1'B (bit 0)
       :             }
       :           }
400  19:         SEQUENCE {
402   3:           OBJECT IDENTIFIER extKeyUsage (2 5 29 37)
407  12:           OCTET STRING, encapsulates {
409  10:             SEQUENCE {
411   8:               OBJECT IDENTIFIER ocspSigning (1 3 6 1 5 5 7 3 9)
       :               }
       :             }
       :           }
421  15:         SEQUENCE {
423   9:           OBJECT IDENTIFIER ocspNoCheck (1 3 6 1 5 5 7 48 1 5)
434   2:           OCTET STRING, encapsulates {
436   0:             NULL
       :             }
       :           }
       :         }
       :       }
       :     }
438  10:   SEQUENCE {
440   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
450 138:   BIT STRING, encapsulates {
454 134:     SEQUENCE {
457  65:       INTEGER
       :         14 2A 8C D6 0A 6C 65 C7 74 65 DF 11 5B C1 FF F8
       :         BE 0E 21 B4 DA 1A DA 53 D9 06 34 A5 DE 89 07 0F
       :         75 94 5A 8D 0B 18 FE 17 59 3D 5C 9A CA 49 00 15
       :         54 06 BF 6F 72 5A 64 EB 11 AC 7E AF 8A 19 4E DC
       :         C6
524  65:       INTEGER
       :         49 0B 0B 49 A6 2E E6 D3 44 31 F6 BF EE 80 D5 AC
       :         9C 21 52 88 A5 1D C6 EB E3 EE 68 3D 94 9B 73 D2
       :         17 B1 44 96 4A 14 E0 D6 24 6E 5D 52 1F FF 05 CD
       :         B0 F2 FC B0 81 86 28 76 E5 EE E1 02 DC A0 FD 7B
       :         08
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-request">
        <name>OCSP Request</name>
        <t>This is a base64-encoded OCSP request for the end-entity certificate
above.</t>
        <artwork><![CDATA[
MGEwXzBdMFswWTANBglghkgBZQMEAgEFAAQgOplGd1aAc6cHv95QGGNF5M1hNNsI
Xrqh0QQl8DtvCOoEIEdKbKMB8j3J9/cHhwThx/X8lucWdfbtiC56tlw/WEVDAgQB
qvAN
]]></artwork>
        <artwork><![CDATA[
0  97: SEQUENCE {
  2  95:   SEQUENCE {
  4  93:     SEQUENCE {
  6  91:       SEQUENCE {
  8  89:         SEQUENCE {
 10  13:           SEQUENCE {
 12   9:             OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
 23   0:             NULL
       :             }
 25  32:           OCTET STRING
       :             3A 99 46 77 56 80 73 A7 07 BF DE 50 18 63 45 E4
       :             CD 61 34 DB 08 5E BA A1 D1 04 25 F0 3B 6F 08 EA
 59  32:           OCTET STRING
       :             47 4A 6C A3 01 F2 3D C9 F7 F7 07 87 04 E1 C7 F5
       :             FC 96 E7 16 75 F6 ED 88 2E 7A B6 5C 3F 58 45 43
 93   4:           INTEGER 27979789
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-response">
        <name>OCSP Response</name>
        <t>This is a base64-encoded OCSP response for the end-entity certificate
above.</t>
        <artwork><![CDATA[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]]></artwork>
        <artwork><![CDATA[
0 927: SEQUENCE {
  4   1:   ENUMERATED 0
  7 920:   [0] {
 11 916:     SEQUENCE {
 15   9:       OBJECT IDENTIFIER ocspBasic (1 3 6 1 5 5 7 48 1 1)
 26 901:       OCTET STRING, encapsulates {
 30 897:         SEQUENCE {
 34 176:           SEQUENCE {
 37  22:             [2] {
 39  20:               OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :               }
 61  15:             GeneralizedTime 02/04/2024 12:37:47 GMT
 78 132:             SEQUENCE {
 81 129:               SEQUENCE {
 84  89:                 SEQUENCE {
 86  13:                   SEQUENCE {
 88   9:                     OBJECT IDENTIFIER
       :                       sha-256 (2 16 840 1 101 3 4 2 1)
 99   0:                     NULL
       :                     }
101  32:                   OCTET STRING
       :               3A 99 46 77 56 80 73 A7 07 BF DE 50 18 63 45 E4
       :               CD 61 34 DB 08 5E BA A1 D1 04 25 F0 3B 6F 08 EA
135  32:                   OCTET STRING
       :               47 4A 6C A3 01 F2 3D C9 F7 F7 07 87 04 E1 C7 F5
       :               FC 96 E7 16 75 F6 ED 88 2E 7A B6 5C 3F 58 45 43
169   4:                   INTEGER 27979789
       :                   }
175   0:                 [0]
177  15:                 GeneralizedTime 03/04/2024 12:37:47 GMT
194  17:                 [0] {
196  15:                   GeneralizedTime 10/04/2024 12:37:47 GMT
       :                   }
       :                 }
       :               }
       :             }
213  10:           SEQUENCE {
215   8:             OBJECT IDENTIFIER
       :               ecdsaWithSHA384 (1 2 840 10045 4 3 3)
       :             }
225 105:           BIT STRING, encapsulates {
228 102:             SEQUENCE {
230  49:               INTEGER
       :               00 D1 99 59 A2 21 BE 03 9B DC 84 5E 2B F6 5E DA
       :               1E 42 2E 9F B6 98 CB 9A 50 6A A9 12 22 FB 78 6D
       :               7C 5F CE CA 37 47 9C 5B A1 DF C7 10 29 8A AA AD
       :               66
281  49:               INTEGER
       :               00 CA 88 F7 2D 56 EE D2 42 CE 7C ED DD 99 04 41
       :               D0 1F 6D 23 E4 01 62 18 6B 1B 23 56 F7 F8 2F 59
       :               2B A3 48 CE 00 FA 0E 75 A5 0F 0A 52 7E 29 44 6A
       :               B3
       :               }
       :             }
332 595:           [0] {
336 591:             SEQUENCE {
340 587:               SEQUENCE {
344 430:                 SEQUENCE {
348   3:                   [0] {
350   1:                     INTEGER 2
       :                     }
353   1:                   INTEGER 1
356  10:                   SEQUENCE {
358   8:                     OBJECT IDENTIFIER
       :                       ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :                     }
368  56:                   SEQUENCE {
370  11:                     SET {
372   9:                       SEQUENCE {
374   3:                         OBJECT IDENTIFIER countryName (2 5 4 6)
379   2:                         PrintableString 'XX'
       :                         }
       :                       }
383  20:                     SET {
385  18:                       SEQUENCE {
387   3:                         OBJECT IDENTIFIER
       :                           organizationName (2 5 4 10)
392  11:                         UTF8String 'Certs 'r Us'
       :                         }
       :                       }
405  19:                     SET {
407  17:                       SEQUENCE {
409   3:                         OBJECT IDENTIFIER commonName (2 5 4 3)
414  10:                         UTF8String 'Issuing CA'
       :                         }
       :                       }
       :                     }
426  30:                   SEQUENCE {
428  13:                     UTCTime 02/04/2024 12:37:47 GMT
443  13:                     UTCTime 02/04/2025 12:37:47 GMT
       :                     }
458  60:                   SEQUENCE {
460  11:                     SET {
462   9:                       SEQUENCE {
464   3:                         OBJECT IDENTIFIER countryName (2 5 4 6)
469   2:                         PrintableString 'XX'
       :                         }
       :                       }
473  20:                     SET {
475  18:                       SEQUENCE {
477   3:                         OBJECT IDENTIFIER
       :                           organizationName (2 5 4 10)
482  11:                         UTF8String 'Certs 'r Us'
       :                         }
       :                       }
495  23:                     SET {
497  21:                       SEQUENCE {
499   3:                         OBJECT IDENTIFIER commonName (2 5 4 3)
504  14:                         UTF8String 'OCSP Responder'
       :                         }
       :                       }
       :                     }
520 118:                   SEQUENCE {
522  16:                     SEQUENCE {
524   7:                       OBJECT IDENTIFIER
       :                         ecPublicKey (1 2 840 10045 2 1)
533   5:                       OBJECT IDENTIFIER
       :                         secp384r1 (1 3 132 0 34)
       :                       }
540  98:                     BIT STRING
       :               04 5B 09 01 B8 85 23 29 6E B9 19 D5 0F FA 1A 9C
       :               B3 74 BC 4D 40 95 86 28 2B FE CA 11 B1 D9 5A DB
       :               B5 47 34 AF 57 0B F8 2B 72 28 CF 22 6B CF 4C 25
       :               DD BC FE 3B 1A 3A D3 94 30 EF F7 63 E1 D6 8D 2E
       :               15 1D 91 72 0B 77 95 B5 8D A6 B3 46 39 61 3A 8F
       :               B9 B5 A8 DA 48 C6 74 71 17 F9 91 9E 84 24 F3 7E
       :               C8
       :                     }
640 135:                   [3] {
643 132:                     SEQUENCE {
646  29:                       SEQUENCE {
648   3:                         OBJECT IDENTIFIER
       :                           subjectKeyIdentifier (2 5 29 14)
653  22:                         OCTET STRING, encapsulates {
655  20:                           OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :                           }
       :                         }
677  31:                       SEQUENCE {
679   3:                         OBJECT IDENTIFIER
       :                           authorityKeyIdentifier (2 5 29 35)
684  24:                         OCTET STRING, encapsulates {
686  22:                           SEQUENCE {
688  20:                             [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :                             }
       :                           }
       :                         }
710  12:                       SEQUENCE {
712   3:                         OBJECT IDENTIFIER
       :                           basicConstraints (2 5 29 19)
717   1:                         BOOLEAN TRUE
720   2:                         OCTET STRING, encapsulates {
722   0:                           SEQUENCE {}
       :                           }
       :                         }
724  14:                       SEQUENCE {
726   3:                         OBJECT IDENTIFIER keyUsage (2 5 29 15)
731   1:                         BOOLEAN TRUE
734   4:                         OCTET STRING, encapsulates {
736   2:                           BIT STRING 7 unused bits
       :                             '1'B (bit 0)
       :                           }
       :                         }
740  19:                       SEQUENCE {
742   3:                         OBJECT IDENTIFIER
       :                           extKeyUsage (2 5 29 37)
747  12:                         OCTET STRING, encapsulates {
749  10:                           SEQUENCE {
751   8:                             OBJECT IDENTIFIER
       :                               ocspSigning (1 3 6 1 5 5 7 3 9)
       :                             }
       :                           }
       :                         }
761  15:                       SEQUENCE {
763   9:                         OBJECT IDENTIFIER
       :                           ocspNoCheck (1 3 6 1 5 5 7 48 1 5)
774   2:                         OCTET STRING, encapsulates {
776   0:                           NULL
       :                           }
       :                         }
       :                       }
       :                     }
       :                   }
778  10:                 SEQUENCE {
780   8:                   OBJECT IDENTIFIER
       :                     ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :                   }
790 138:                 BIT STRING, encapsulates {
794 134:                   SEQUENCE {
797  65:                     INTEGER
       :               14 2A 8C D6 0A 6C 65 C7 74 65 DF 11 5B C1 FF F8
       :               BE 0E 21 B4 DA 1A DA 53 D9 06 34 A5 DE 89 07 0F
       :               75 94 5A 8D 0B 18 FE 17 59 3D 5C 9A CA 49 00 15
       :               54 06 BF 6F 72 5A 64 EB 11 AC 7E AF 8A 19 4E DC
       :               C6
864  65:                     INTEGER
       :               49 0B 0B 49 A6 2E E6 D3 44 31 F6 BF EE 80 D5 AC
       :               9C 21 52 88 A5 1D C6 EB E3 EE 68 3D 94 9B 73 D2
       :               17 B1 44 96 4A 14 E0 D6 24 6E 5D 52 1F FF 05 CD
       :               B0 F2 FC B0 81 86 28 76 E5 EE E1 02 DC A0 FD 7B
       :               08
       :                     }
       :                   }
       :                 }
       :               }
       :             }
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this version of the document wish to thank Alex Deacon
and Ryan Hurst for their work to produce the original version
of the lightweight profile for the OCSP protocol.</t>
      <t>The authors of this version of the document wish to thank
Paul Kyzivat, Russ Housley, Rob Stradling, Roman Danyliw, and
Wendy Brown for their reviews, feedback, and suggestions.</t>
      <t>The authors wish to thank Magnus Nystrom of RSA Security, Inc.,
Jagjeet Sondh of Vodafone Group R&amp;D, and David Engberg of CoreStreet,
Ltd. for their contributions to the original <xref target="RFC5019"/> specification.
Listed organizational affiliations reflect the author’s affiliation
at the time of RFC5019 was published.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
