<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc5019bis-09" category="std" consensus="true" submissionType="IETF" obsoletes="5019" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Lightweight OCSP Profile Update">Updates to Lightweight OCSP Profile for High Volume Environments</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5019bis-09"/>
    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="Clint Wilson">
      <organization>Apple, Inc.</organization>
      <address>
        <email>clintw@apple.com</email>
      </address>
    </author>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="11"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>This specification defines a profile of the Online Certificate Status
Protocol (OCSP) that addresses the scalability issues inherent when
using OCSP in large scale (high volume) Public Key Infrastructure
(PKI) environments and/or in PKI environments that require a
lightweight solution to minimize communication bandwidth and client-
side processing.</t>
      <t>This specification obsoletes RFC 5019. The profile specified in RFC 5019
has been updated to allow and recommend the use of SHA-256 over SHA-1.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/tadahik/RFC5019bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Online Certificate Status Protocol <xref target="RFC6960"/> specifies a mechanism
used to determine the status of digital certificates, in lieu of
using Certificate Revocation Lists (CRLs). Since its definition in
1999, it has been deployed in a variety of environments and has
proven to be a useful certificate status checking mechanism.
(For brevity, the term "OCSP" is used herein to denote the
verification of certificate status; however, it should be noted
that this protocol is employed solely to ascertain the
revocation status of a certificate.)</t>
      <t>To date, numerous OCSP deployments have been implemented to provide timely
and secure certificate status information, crucial for high-value
electronic transactions and the handling of highly sensitive information,
such as within the banking and financial sectors.
Therefore, the requirement for an OCSP
responder to respond in "real time" (i.e., generating a new OCSP
response for each OCSP request) has been important. In addition,
these deployments have operated in environments where bandwidth usage
is not an issue, and have run on client and server systems where
processing power is not constrained.</t>
      <t>As the use of PKI continues to grow and move into diverse
environments, so does the need for a scalable and cost-effective
certificate status mechanism. Although OCSP as currently defined and
deployed meets the need of small to medium-sized PKIs that operate on
powerful systems on wired networks, there is a limit as to how these
OCSP deployments scale from both an efficiency and cost perspective.
Mobile environments, where network bandwidth may be at a premium and
client-side devices are constrained from a processing point of view,
require the careful use of OCSP to minimize bandwidth usage and
client-side processing complexity. <xref target="OCSPMP"/></t>
      <t>PKI continues to be deployed into environments where millions if not
hundreds of millions of certificates have been issued. In many of
these environments, an even larger number of users (also known as
relying parties) have the need to ensure that the certificate they
are relying upon has not been revoked. As such, it is important that
OCSP is used in such a way that ensures the load on OCSP responders
and the network infrastructure required to host those responders are
kept to a minimum.</t>
      <t>This document addresses the scalability issues inherent when using
OCSP in highly scaled PKI environments by defining a message
profile and clarifying OCSP client and responder behavior that will
permit:</t>
      <ol spacing="normal" type="1"><li>
          <t>OCSP response pre-production and distribution.</t>
        </li>
        <li>
          <t>Reduced OCSP message size to lower bandwidth usage.</t>
        </li>
        <li>
          <t>Response message caching both in the network and on the client.</t>
        </li>
      </ol>
      <t>It is intended that the normative requirements defined in this
profile will be adopted by OCSP clients and OCSP responders operating
in very large-scale (high-volume) PKI environments or PKI
environments that require a lightweight solution to minimize
bandwidth and client-side processing power (or both), as described
above.</t>
      <t>OCSP does not have the means to signal responder capabilities within the
protocol. Thus, clients may need to use out-of-band mechanisms to
determine whether a responder conforms to the profile defined in this
document. Regardless of the availability of such out-of-band mechanisms,
this profile ensures that interoperability will still occur between an
OCSP client that fully conforms with <xref target="RFC6960"/> and a responder that is
operating in a mode as described in this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="ocsp-message-profile">
      <name>OCSP Message Profile</name>
      <t>This section defines a subset of OCSPRequest and OCSPResponse
functionality as defined in <xref target="RFC6960"/>.</t>
      <section anchor="req-profile">
        <name>OCSP Request Profile</name>
        <section anchor="certid">
          <name>OCSPRequest Structure</name>
          <t>Provided for convenience here, a partial extract of the
ASN.1 structure corresponding to the OCSPRequest with the relevant
CertID as defined in <xref target="RFC6960"/>:</t>
          <artwork><![CDATA[
OCSPRequest     ::=     SEQUENCE {
   tbsRequest                  TBSRequest,
   optionalSignature   [0]     EXPLICIT Signature OPTIONAL }

TBSRequest      ::=     SEQUENCE {
   version             [0]     EXPLICIT Version DEFAULT v1,
   requestorName       [1]     EXPLICIT GeneralName OPTIONAL,
   requestList                 SEQUENCE OF Request,
   requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }

Request         ::=     SEQUENCE {
   reqCert                     CertID,
   singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }

CertID          ::=     SEQUENCE {
   hashAlgorithm       AlgorithmIdentifier,
   issuerNameHash      OCTET STRING, -- Hash of issuer's DN
   issuerKeyHash       OCTET STRING, -- Hash of issuer's public key
   serialNumber        CertificateSerialNumber }
]]></artwork>
          <t>OCSPRequests that conform to the profile in this document <bcp14>MUST</bcp14>
include only one Request in the OCSPRequest.RequestList structure.</t>
          <t>The CertID.issuerNameHash and CertID.issuerKeyHash fields contain hashes
of the issuer's distinguished name (DN) and public key, respectively.
OCSP clients that conform with this profile <bcp14>MUST</bcp14> use SHA-256 as defined
in <xref section="2.2" sectionFormat="of" target="RFC5754"/> as
the hashing algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values.</t>
          <t>Older OCSP clients which provide backward compatibility with
<xref target="RFC5019"/> use SHA-1 as defined in <xref target="RFC3174"/> as the hashing
algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values. However, these OCSP clients <bcp14>MUST</bcp14>
transition from SHA-1 to SHA-256 as soon as practical.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> include the singleRequestExtensions structure.</t>
          <t>Clients <bcp14>SHOULD NOT</bcp14> include the requestExtensions structure. If a
requestExtensions structure is included, this profile RECOMMENDS that
it contain only the nonce extension (id-pkix-ocsp-nonce). See
<xref target="fresh"/> for issues concerning the use of a nonce in high-volume
OCSP environments.</t>
        </section>
        <section anchor="signed-ocsprequests">
          <name>Signed OCSPRequests</name>
          <t>Clients <bcp14>SHOULD NOT</bcp14> send signed OCSPRequests. Responders <bcp14>MAY</bcp14> ignore
the signature on OCSPRequests.</t>
          <t>If the OCSPRequest is signed, the client <bcp14>SHALL</bcp14> specify its name in
the OCSPRequest.requestorName field; otherwise, clients <bcp14>SHOULD NOT</bcp14>
include the requestorName field in the OCSPRequest. OCSP responders
<bcp14>MUST</bcp14> handle unsigned OCSP requests that contain the
requestorName field, as if the requestorName field were absent.</t>
        </section>
      </section>
      <section anchor="ocsp-response-profile">
        <name>OCSP Response Profile</name>
        <section anchor="ocspresponse-structure">
          <name>OCSPResponse Structure</name>
          <t>Provided for convenience here, a partial extract of the
ASN.1 structure corresponding to the OCSPResponse with the relevant
CertID as defined in <xref target="RFC6960"/>:</t>
          <artwork><![CDATA[
OCSPResponse ::= SEQUENCE {
   responseStatus         OCSPResponseStatus,
   responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }

ResponseBytes ::=       SEQUENCE {
   responseType   OBJECT IDENTIFIER,
   response       OCTET STRING }

The value for response SHALL be the DER encoding of BasicOCSPResponse.

BasicOCSPResponse       ::= SEQUENCE {
   tbsResponseData      ResponseData,
   signatureAlgorithm   AlgorithmIdentifier,
   signature            BIT STRING,
   certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }

ResponseData ::= SEQUENCE {
   version              [0] EXPLICIT Version DEFAULT v1,
   responderID              ResponderID,
   producedAt               GeneralizedTime,
   responses                SEQUENCE OF SingleResponse,
   responseExtensions   [1] EXPLICIT Extensions OPTIONAL }

SingleResponse ::= SEQUENCE {
   certID                       CertID,
   certStatus                   CertStatus,
   thisUpdate                   GeneralizedTime,
   nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,
   singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }
]]></artwork>
          <t>Responders <bcp14>MUST</bcp14> generate a BasicOCSPResponse as identified by the
id-pkix-ocsp-basic OID. Clients <bcp14>MUST</bcp14> be able to parse and accept a
BasicOCSPResponse. OCSPResponses that conform to this profile <bcp14>SHOULD</bcp14>
include only one SingleResponse in the
ResponseData.responses structure, but <bcp14>MAY</bcp14> include
additional SingleResponse elements if necessary to improve response
pre-generation performance or cache efficiency, and
to ensure backward compatibility. For instance,
to provide support to OCSP clients which do not yet support the
use of SHA-256 for CertID hash calculation, the OCSP responder
<bcp14>MAY</bcp14> include two SingleResponses in a BasicOCSPResponse.
In that BasicOCSPResponse, the CertID of one of the SingleResponses
uses SHA-1 for the hash calculation, and the CertID in the other
SingleResponse uses SHA-256. OCSP responders <bcp14>SHOULD NOT</bcp14> distribute
OCSP responses that contain CertIDs that use SHA-1 if the OCSP
responder has no clients that require the use of SHA-1.
Operators of OCSP responders may consider logging the hash
algorithm used by OCSP clients to inform their determination of
when it is appropriate to obsolete the distribution of OCSP responses
that employ SHA-1 for CertID field hashes. See <xref target="sha1-sec"/> for more
information on the security considerations for the continued use of
SHA-1.</t>
          <t>The responder <bcp14>SHOULD NOT</bcp14> include responseExtensions. As specified in
<xref target="RFC6960"/>, clients <bcp14>MUST</bcp14> ignore unrecognized non-critical
responseExtensions in the response.</t>
          <t>In the case where a responder does not have the ability to respond to
an OCSP request containing an option not supported by the responder, it
<bcp14>SHOULD</bcp14> return the most complete response it can. For example, in the
case where a responder only supports pre-produced responses and does
not have the ability to respond to an OCSP request containing a
nonce, it <bcp14>SHOULD</bcp14> return a response that does not include a nonce.</t>
          <t>Clients <bcp14>SHOULD</bcp14> attempt to process a response even if the response
does not include a nonce. See <xref target="fresh"/> for details on validating
responses that do not contain a nonce. See also <xref target="sec-cons"/> for
relevant security considerations.</t>
          <t>Responders that do not have the ability to respond to OCSP requests
that contain an unsupported option such as a nonce <bcp14>MAY</bcp14> forward the
request to an OCSP responder capable of doing so.</t>
          <t>The responder <bcp14>MAY</bcp14> include the singleResponse.singleResponse
extensions structure.</t>
        </section>
        <section anchor="byKey">
          <name>Signed OCSPResponses</name>
          <t>Clients <bcp14>MUST</bcp14> validate the signature on the OCSPResponse.</t>
          <t>If the response is signed by a delegate of the issuing certification
authority (CA), a valid responder certificate <bcp14>MUST</bcp14> be referenced in
the BasicOCSPResponse.certs structure.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> that the OCSP responder's certificate contain the
id-pkix-ocsp-nocheck extension, as defined in <xref target="RFC6960"/>, to indicate
to the client that it need not check the certificate's status. In
addition, it is <bcp14>RECOMMENDED</bcp14> that neither an OCSP authorityInfoAccess
(AIA) extension nor cRLDistributionPoints (CRLDP) extension be
included in the OCSP responder's certificate. Accordingly, the
responder's signing certificate <bcp14>SHOULD</bcp14> be relatively short-lived and
renewed regularly.</t>
          <t>Clients <bcp14>MUST</bcp14> be able to identify OCSP responder certificates using
the byKey field and <bcp14>SHOULD</bcp14> be able to identify OCSP responder
certificates using the byName field of the
ResponseData.ResponderID <xref target="RFC6960"/> choices.</t>
          <t>Older responders which provide backward compatibility with <xref target="RFC5019"/>
            <bcp14>MAY</bcp14> use the byName field to represent the ResponderID, but should
transition to using the byKey field as soon as practical.</t>
          <t>Newer responders that conform to this profile <bcp14>MUST</bcp14> use the byKey
field to represent the ResponderID to reduce the size of the response.</t>
        </section>
        <section anchor="ocspresponsestatus-values">
          <name>OCSPResponseStatus Values</name>
          <t>As long as the OCSP infrastructure has authoritative records for a
particular certificate, an OCSPResponseStatus of "successful" will be
returned. When access to authoritative records for a particular
certificate is not available, the responder <bcp14>MUST</bcp14> return an
OCSPResponseStatus of "unauthorized". As such, this profile extends
the <xref target="RFC6960"/> definition of "unauthorized" as follows:</t>
          <t>The response "unauthorized" is returned in cases where the client
is not authorized to make this query to this responder or the responder
is not capable of responding authoritatively.</t>
          <t>For example, OCSP responders that do not have access to authoritative
records for a requested certificate, such as those that generate and
distribute OCSP responses in advance and thus do not have the ability
to properly respond with a signed "successful" yet "unknown"
response, will respond with an OCSPResponseStatus of "unauthorized".
Also, in order to ensure the database of revocation information does
not grow unbounded over time, the responder <bcp14>MAY</bcp14> remove the status
records of expired certificates. Requests from clients for
certificates whose record has been removed will result in an
OCSPResponseStatus of "unauthorized".</t>
          <t>Security considerations regarding the use of unsigned responses are
discussed in <xref target="RFC6960"/>.</t>
        </section>
        <section anchor="times">
          <name>thisUpdate, nextUpdate, and producedAt</name>
          <t>When pre-producing OCSPResponse messages, the responder <bcp14>MUST</bcp14> set the
thisUpdate, nextUpdate, and producedAt times as follows:</t>
          <dl>
            <dt>thisUpdate:</dt>
            <dd>
              <t>The time at which the status being indicated is known to be correct.</t>
            </dd>
            <dt>nextUpdate:</dt>
            <dd>
              <t>The time at or before which newer information will be available
about the status of the certificate.
As described in <xref section="2.4" sectionFormat="of" target="RFC6960"/>, this field is optional.
However, this field <bcp14>MUST</bcp14> be included in the profile specified
in this document to help clients cache responses.
See <xref target="cache-recs"/> for additional information on caching.</t>
            </dd>
            <dt>producedAt:</dt>
            <dd>
              <t>The time at which the OCSP response was signed.</t>
            </dd>
          </dl>
          <aside>
            <t>Note: The values of thisUpdate, nextUpdate, and producedAt are
 set as described in <xref section="2.5" sectionFormat="of" target="RFC6960"/>,
 and in many cases the value of thisUpdate and producedAt are
 the same.</t>
          </aside>
          <t>For the purposes of this profile, ASN.1-encoded GeneralizedTime
values such as thisUpdate, nextUpdate, and producedAt <bcp14>MUST</bcp14> be
expressed Greenwich Mean Time (Zulu) and <bcp14>MUST</bcp14> include seconds (i.e.,
times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values <bcp14>MUST NOT</bcp14> include fractional seconds.</t>
        </section>
      </section>
    </section>
    <section anchor="client-behavior">
      <name>Client Behavior</name>
      <section anchor="ocsp-responder-discovery">
        <name>OCSP Responder Discovery</name>
        <t>Clients <bcp14>MUST</bcp14> support the authorityInfoAccess extension as defined in
<xref target="RFC5280"/> and <bcp14>MUST</bcp14> recognize the id-ad-ocsp access method. This
enables CAs to inform clients how they can contact the OCSP service.</t>
        <t>In the case where a client is checking the status of a certificate
that contains both an authorityInformationAccess (AIA) extension
pointing to an OCSP responder and a cRLDistributionPoints extension
pointing to a CRL, the client <bcp14>SHOULD</bcp14> attempt to contact the OCSP
responder first. Clients <bcp14>MAY</bcp14> attempt to retrieve the CRL if no
OCSPResponse is received from the responder after a locally
configured timeout and number of retries.</t>
      </section>
      <section anchor="sending-an-ocsp-request">
        <name>Sending an OCSP Request</name>
        <t>To avoid needless network traffic, applications <bcp14>MUST</bcp14> verify the
signature of signed data before asking an OCSP client to check the
status of certificates used to verify the data. If the signature is
invalid or the application is not able to verify it, an OCSP check
<bcp14>MUST NOT</bcp14> be requested.</t>
        <t>Similarly, an application <bcp14>MUST</bcp14> validate the signature on certificates
in a chain, before asking an OCSP client to check the status of the
certificate. If the certificate signature is invalid or the
application is not able to verify it, an OCSP check <bcp14>MUST NOT</bcp14> be
requested. Clients <bcp14>SHOULD NOT</bcp14> make a request to check the status of
expired certificates.</t>
      </section>
    </section>
    <section anchor="fresh">
      <name>Ensuring an OCSPResponse Is Fresh</name>
      <t>In order to ensure that a client does not accept an out-of-date
response that indicates a 'good' status when in fact there is a more
up-to-date response that specifies the status of 'revoked', a client
must ensure the responses they receive are fresh.</t>
      <t>In general, two mechanisms are available to clients to ensure a
response is fresh. The first uses nonces, and the second is based on
time. In order for time-based mechanisms to work, both clients and
responders <bcp14>MUST</bcp14> have access to an accurate source of time.</t>
      <t>Because this profile specifies that clients <bcp14>SHOULD NOT</bcp14> include a
requestExtensions structure in OCSPRequests (see <xref target="req-profile"/>),
clients <bcp14>MUST</bcp14> be able to determine OCSPResponse freshness based on an
accurate source of time. Clients that opt to include a nonce in the
request <bcp14>SHOULD NOT</bcp14> reject a corresponding OCSPResponse solely on the
basis of the nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to
validating the OCSPResponse based on time.</t>
      <t>Clients that do not include a nonce in the request <bcp14>MUST</bcp14> ignore any
nonce that may be present in the response.</t>
      <t>Clients <bcp14>MUST</bcp14> check for the existence of the nextUpdate field and <bcp14>MUST</bcp14>
ensure the current time, expressed in GMT time as described in
<xref target="times"/>, falls between the thisUpdate and nextUpdate times. If
the nextUpdate field is absent, the client <bcp14>MUST</bcp14> reject the response.</t>
      <t>If the nextUpdate field is present, the client <bcp14>MUST</bcp14> ensure that it is
not earlier than the current time. If the current time on the client
is later than the time specified in the nextUpdate field, the client
<bcp14>MUST</bcp14> reject the response as stale. Clients <bcp14>MAY</bcp14> allow configuration
of a small tolerance period for acceptance of responses after
nextUpdate to handle minor clock differences relative to responders
and caches. This tolerance period should be chosen based on the
accuracy and precision of time synchronization technology available
to the calling application environment. For example, Internet peers
with low latency connections typically expect NTP time
synchronization to keep them accurate within parts of a second;
higher latency environments or where an NTP analogue is not available
may have to be more liberal in their tolerance
(e.g. allow one day difference).</t>
      <t>See the security considerations in <xref target="sec-cons"/> for additional details
on replay and man-in-the-middle attacks.</t>
    </section>
    <section anchor="transport">
      <name>Transport Profile</name>
      <t>OCSP clients can send HTTP-based OCSP requests using either the GET
or POST method.
The OCSP responder <bcp14>MUST</bcp14> support requests and responses over HTTP.
When sending requests that are less than or equal to 255 bytes in
total (after encoding) including the scheme and delimiters (http://),
server name and base64-encoded OCSPRequest structure, clients <bcp14>MUST</bcp14>
use the GET method (to enable OCSP response caching). OCSP requests
larger than 255 bytes <bcp14>SHOULD</bcp14> be submitted using the POST method. In
all cases, clients <bcp14>MUST</bcp14> follow the descriptions in A.1 of <xref target="RFC6960"/>
when constructing these messages.</t>
      <t>When constructing a GET message, OCSP clients <bcp14>MUST</bcp14> base64-encode the
OCSPRequest structure according to <xref section="4" sectionFormat="of" target="RFC4648"/>. Clients
<bcp14>MUST NOT</bcp14> include whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string. Clients
<bcp14>MUST</bcp14> properly URL-encode the base64-encoded OCSPRequest according to
<xref target="RFC3986"/>. OCSP clients <bcp14>MUST</bcp14> append the base64-encoded OCSPRequest
to the URI specified in the AIA extension <xref target="RFC5280"/>. For example:</t>
      <artwork><![CDATA[
   http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dA
   deGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D
]]></artwork>
      <t>In response to properly formatted OCSPRequests that are cachable
(i.e., responses that contain a nextUpdate value), the responder will
include the binary value of the DER encoding of the OCSPResponse
preceded by the following HTTP <xref target="RFC9110"/> and <xref target="RFC9111"/> headers.</t>
      <artwork><![CDATA[
   Content-type: application/ocsp-response
   Content-length: < OCSP response length >
   Last-modified: < producedAt HTTP-date >
   ETag: "< strong validator >"
   Expires: < nextUpdate HTTP-date >
   Cache-control: max-age=< n >, public, no-transform, must-revalidate
   Date: < current HTTP-date >
]]></artwork>
      <t>See <xref target="http-proxies"/> for details on the use of these headers.</t>
    </section>
    <section anchor="cache-recs">
      <name>Caching Recommendations</name>
      <t>The ability to cache OCSP responses throughout the network is an
important factor in high volume OCSP deployments. This section
discusses the recommended caching behavior of OCSP clients and HTTP
proxies and the steps that should be taken to minimize the number of
times that OCSP clients "hit the wire". In addition, the concept of
including OCSP responses in protocol exchanges (aka stapling or
piggybacking), such as has been defined in TLS, is also discussed.</t>
      <section anchor="caching-at-the-client">
        <name>Caching at the Client</name>
        <t>To minimize bandwidth usage, clients <bcp14>MUST</bcp14> locally cache authoritative
OCSP responses (i.e., a response with a signature that has been
successfully validated and that indicate an OCSPResponseStatus of
'successful').</t>
        <t>Most OCSP clients will send OCSPRequests at or near the nextUpdate
time (when a cached response expires). To avoid large spikes in
responder load that might occur when many clients refresh cached
responses for a popular certificate, responders <bcp14>MAY</bcp14> indicate when the
client should fetch an updated OCSP response by using the cache-
control:max-age directive. Clients <bcp14>SHOULD</bcp14> fetch the updated OCSP
Response on or after the max-age time. To ensure that clients
receive an updated OCSP response, OCSP responders <bcp14>MUST</bcp14> refresh the
OCSP response before the max-age time.</t>
      </section>
      <section anchor="http-proxies">
        <name>HTTP Proxies</name>
        <t>The responder <bcp14>SHOULD</bcp14> set the HTTP headers of the OCSP response in
such a way as to allow for the intelligent use of intermediate HTTP
proxy servers. See <xref target="RFC9110"/> and <xref target="RFC9111"/> for the full definition
of these headers and the proper format of any date and time values.</t>
        <table anchor="http-headers">
          <name>HTTP Headers</name>
          <thead>
            <tr>
              <th align="left">HTTP Header</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Date</td>
              <td align="left">The date and time at which the OCSP responder generated the HTTP response.</td>
            </tr>
            <tr>
              <td align="left">Last-Modified</td>
              <td align="left">This value specifies the date and time at which the OCSP responder last modified the response. This date and time will be the same as the thisUpdate timestamp in the request itself.</td>
            </tr>
            <tr>
              <td align="left">Expires</td>
              <td align="left">Specifies how long the response is considered fresh. This date and time will be the same as the nextUpdate timestamp in the OCSP response itself.</td>
            </tr>
            <tr>
              <td align="left">ETag</td>
              <td align="left">A string that identifies a particular version of the associated data. This profile RECOMMENDS that the ETag value be the ASCII HEX representation of the SHA-256 hash of the OCSPResponse structure.</td>
            </tr>
            <tr>
              <td align="left">Cache-Control</td>
              <td align="left">Contains a number of caching directives. <br/> * max-age = &lt; n &gt; -where n is a time value later than thisUpdate but earlier than nextUpdate. <br/> * public -makes normally uncachable response cachable by both shared and nonshared caches. <br/> * no-transform -specifies that a proxy cache cannot change the type, length, or encoding of the object content. <br/> * must-revalidate -prevents caches from intentionally returning stale responses.</td>
            </tr>
          </tbody>
        </table>
        <t>OCSP responders <bcp14>MUST NOT</bcp14> include a "Pragma: no-cache", "Cache-
Control: no-cache", or "Cache-Control: no-store" header in
authoritative OCSP responses.</t>
        <t>OCSP responders <bcp14>SHOULD</bcp14> include one or more of these headers in non-
authoritative OCSP responses.</t>
        <t>For example, assume that an OCSP response has the following timestamp
values:</t>
        <artwork><![CDATA[
   thisUpdate = March 19, 2023 01:00:00 GMT
   nextUpdate = March 21, 2023 01:00:00 GMT
   productedAt = March 19, 2023 01:00:00 GMT
]]></artwork>
        <t>and that an OCSP client requests the response on March 20, 2023 01:00:00
GMT. In this scenario, the HTTP response may look like this:</t>
        <artwork><![CDATA[
   Content-Type: application/ocsp-response
   Content-Length: 1000
   Date: Mon, 20 Mar 2023 01:00:00 GMT
   Last-Modified: Sun, 19 Mar 2023 01:00:00 GMT
   ETag: "97df3588b5a3f24babc3851b372f0ba7
         1a9dcdded43b14b9d06961bfc1707d9d"
   Expires: Tue, 21 Mar 2023 01:00:00 GMT
   Cache-Control: max-age=86000,public,no-transform,must-revalidate
   <...>
]]></artwork>
        <t>OCSP clients <bcp14>MUST NOT</bcp14> include a no-cache header in OCSP request
messages, unless the client encounters an expired response which may
be a result of an intermediate proxy caching stale data. In this
situation, clients <bcp14>SHOULD</bcp14> resend the request specifying that proxies
should be bypassed by including an appropriate HTTP header in the
request (i.e., Pragma: no-cache or Cache-Control: no-cache).</t>
      </section>
      <section anchor="caching-at-servers">
        <name>Caching at Servers</name>
        <t>In some scenarios, it is advantageous to include OCSP response
information within the protocol being utilized between the client and
OCSP responder.
Including OCSP responses in this manner has a few attractive effects.</t>
        <t>First, it allows for the caching of OCSP responses on the
OCSP responder, thus lowering the number of hits.</t>
        <t>Second, it enables certificate validation in the event the client is
not connected to a network and thus eliminates the need for clients
to establish a new HTTP session with the OCSP responder.</t>
        <t>Third, it reduces the number of round trips the client needs to make
in order to complete a handshake.</t>
        <t>Fourth, it simplifies the client-side OCSP implementation by enabling
a situation where the client need only the ability to parse and
recognize OCSP responses.</t>
        <t>This functionality has been specified as an extension to the TLS
<xref target="I-D.ietf-tls-rfc8446bis"/> protocol in
<xref section="4.4.2" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>,
but can be applied to any client-server protocol.</t>
        <t>This profile RECOMMENDS that both TLS clients and servers implement
the certificate status request extension mechanism for TLS.</t>
        <t>Further information regarding caching issues can be obtained
from <xref target="RFC3143"/>.</t>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The following considerations apply in addition to the security
considerations addressed in <xref section="5" sectionFormat="of" target="RFC6960"/>.</t>
      <section anchor="replay-attacks">
        <name>Replay Attacks</name>
        <t>Because the use of nonces in this profile is optional, there is a
possibility that an out of date OCSP response could be replayed, thus
causing a client to accept a good response when in fact there is a
more up-to-date response that specifies the status of revoked. In
order to mitigate this attack, clients <bcp14>MUST</bcp14> have access to an
accurate source of time and ensure that the OCSP responses they
receive are sufficiently fresh.</t>
        <t>Clients that do not have an accurate source of date and time are
vulnerable to service disruption. For example, a client with a
sufficiently fast clock may reject a fresh OCSP response. Similarly
a client with a sufficiently slow clock may incorrectly accept
expired valid responses for certificates that may in fact be revoked.</t>
        <t>Future versions of the OCSP protocol may provide a way for the client
to know whether the responder supports nonces or does not support
nonces. If a client can determine that the responder supports nonces,
it <bcp14>MUST</bcp14> reject a reply that does not contain an expected nonce.
Otherwise, clients that opt to include a nonce in the request <bcp14>SHOULD
NOT</bcp14> reject a corresponding OCSPResponse solely on the basis of the
nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to validating the
OCSPResponse based on time.</t>
      </section>
      <section anchor="man-in-the-middle-attacks">
        <name>Man-in-the-Middle Attacks</name>
        <t>To mitigate risk associated with this class of attack, the client
<bcp14>MUST</bcp14> properly validate the signature on the response.</t>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of the OCSP responder and to verify that it is authorized to
sign responses on the CA's behalf.</t>
        <t>Clients <bcp14>MUST</bcp14> ensure that they are communicating with an authorized
responder by the rules described in <xref section="4.2.2.2" sectionFormat="of" target="RFC6960"/>.</t>
      </section>
      <section anchor="impersonation-attacks">
        <name>Impersonation Attacks</name>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of OCSP responder.</t>
        <t>As detailed in <xref target="RFC6960"/>, clients must properly validate the signature
of the OCSP response and the signature on the OCSP response signer
certificate to ensure an authorized responder created it.</t>
      </section>
      <section anchor="denial-of-service-attacks">
        <name>Denial-of-Service Attacks</name>
        <t>OCSP responders <bcp14>SHOULD</bcp14> take measures to prevent or mitigate denial-
of-service attacks. As this profile specifies the use of unsigned
OCSPRequests, access to the responder may be implicitly given to
everyone who can send a request to a responder, and thus the ability
to mount a denial-of-service attack via a flood of requests may be
greater. For example, a responder could limit the rate of incoming
requests from a particular IP address if questionable behavior is
detected.</t>
      </section>
      <section anchor="modification-of-http-headers">
        <name>Modification of HTTP Headers</name>
        <t>Values included in HTTP headers, as described in <xref target="transport"/>
and <xref target="cache-recs"/>,
are not cryptographically protected; they may be manipulated by an
attacker. Clients <bcp14>SHOULD</bcp14> use these values for caching guidance only
and ultimately <bcp14>SHOULD</bcp14> rely only on the values present in the signed
OCSPResponse <xref section="4.2.2.1" sectionFormat="of" target="RFC6960"/>.
Clients <bcp14>SHOULD NOT</bcp14> rely on cached responses beyond the
nextUpdate time.</t>
      </section>
      <section anchor="request-authentication-and-authorization">
        <name>Request Authentication and Authorization</name>
        <t>The suggested use of unsigned requests in this environment removes an
option that allows the responder to determine the authenticity of
incoming request. Thus, access to the responder may be implicitly
given to everyone who can send a request to a responder.
Environments where explicit authorization to access the OCSP
responder is necessary can utilize other mechanisms to authenticate
requestors or restrict or meter service.</t>
      </section>
      <section anchor="sha1-sec">
        <name>Use of SHA-1 for the calculation of CertID field values</name>
        <t>Although the use of SHA-1 for the calculation of CertID field values is
not of concern from a cryptographic security standpoint, the continued
use of SHA-1 in an ecosystem requires that software that interoperates
with the ecosystem maintain support for SHA-1. This increases
implementation complexity and potential attack surface for the software
in question. Thus, the continued use of SHA-1 in an ecosystem to
maintain interoperability with legacy software must be weighed against
the increased implementation complexity and potential attack surface.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5754">
          <front>
            <title>Using SHA2 Algorithms with Cryptographic Message Syntax</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document describes the conventions for using the Secure Hash Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384, SHA-512) with the Cryptographic Message Syntax (CMS). It also describes the conventions for using these algorithms with the CMS and the Digital Signature Algorithm (DSA), Rivest Shamir Adleman (RSA), and Elliptic Curve DSA (ECDSA) signature algorithms. Further, it provides SMIMECapabilities attribute values for each algorithm. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5754"/>
          <seriesInfo name="DOI" value="10.17487/RFC5754"/>
        </reference>
        <reference anchor="RFC5019">
          <front>
            <title>The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments</title>
            <author fullname="A. Deacon" initials="A." surname="Deacon"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This specification defines a profile of the Online Certificate Status Protocol (OCSP) that addresses the scalability issues inherent when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) environments and/or in PKI environments that require a lightweight solution to minimize communication bandwidth and client-side processing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5019"/>
          <seriesInfo name="DOI" value="10.17487/RFC5019"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="OCSPMP">
          <front>
            <title>OCSP Mobile Profile V1.0</title>
            <author>
              <organization>Open Mobile Alliance</organization>
            </author>
            <date/>
          </front>
          <seriesInfo name="www.openmobilealliance.org" value=""/>
        </reference>
        <reference anchor="RFC3174">
          <front>
            <title>US Secure Hash Algorithm 1 (SHA1)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="P. Jones" initials="P." surname="Jones"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3174"/>
          <seriesInfo name="DOI" value="10.17487/RFC3174"/>
        </reference>
        <reference anchor="RFC3143">
          <front>
            <title>Known HTTP Proxy/Caching Problems</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="J. Dilley" initials="J." surname="Dilley"/>
            <date month="June" year="2001"/>
            <abstract>
              <t>This document catalogs a number of known problems with World Wide Web (WWW) (caching) proxies and cache servers. The goal of the document is to provide a discussion of the problems and proposed workarounds, and ultimately to improve conditions by illustrating problems. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3143"/>
          <seriesInfo name="DOI" value="10.17487/RFC3143"/>
        </reference>
        <reference anchor="RFC9500">
          <front>
            <title>Standard Public Key Cryptography (PKC) Test Keys</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
            <author fullname="C. Bonnell" initials="C." surname="Bonnell"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>This document provides a set of standard Public Key Cryptography (PKC) test keys that may be used wherever pre-generated keys and associated operations like digital signatures are required. Like the European Institute for Computer Antivirus Research (EICAR) virus test and the Generic Test for Unsolicited Bulk Email (GTUBE) spam test files, these publicly known test keys can be detected and recognised by applications consuming them as being purely for testing purposes without assigning any security properties to them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9500"/>
          <seriesInfo name="DOI" value="10.17487/RFC9500"/>
        </reference>
      </references>
    </references>
    <?line 727?>

<section anchor="differences-from-rfc-5019">
      <name>Differences from RFC 5019</name>
      <t>This document obsoletes <xref target="RFC5019"/>. <xref target="RFC5019"/> defines a lightweight
profile for OCSP that makes the protocol more suitable for use in
high-volume environments. The lightweight profile specifies the
mandatory use of SHA-1 when calculating the values of several fields in
OCSP requests and responses. In recent years, weaknesses have been
demonstrated with the SHA-1 algorithm. As a result, SHA-1 is
increasingly falling out of use even for non-security relevant
use cases. This document obsoletes the lightweight profile as specified
in RFC 5019 to instead recommend the use of SHA-256 where SHA-1 was
previously required. An <xref target="RFC5019"/>-compliant OCSP client is still able
to use SHA-1, but the use of SHA-1 may become obsolete in the future.</t>
      <t>Substantive changes to RFC 5019:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="certid"/> requires new OCSP clients to use SHA-256 to
support migration for OCSP clients.</t>
        </li>
        <li>
          <t><xref target="byKey"/> requires new OCSP responders to use the byKey field,
and support migration from byName fields.</t>
        </li>
        <li>
          <t><xref target="transport"/> clarifies that OCSP clients <bcp14>MUST NOT</bcp14> include
whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string.</t>
        </li>
      </ul>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="root-certification-authority-certificate">
        <name>Root Certification Authority Certificate</name>
        <t>This is a self-signed certificate for the certification authority that
issued the end-entity certificate and OCSP delegated responder
example certificates below.</t>
        <t>The key pair for the certification authority is the "testECCP521"
key from <xref section="2.3" sectionFormat="of" target="RFC9500"/>.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIICKDCCAYqgAwIBAgIBATAKBggqhkjOPQQDBDA4MQswCQYDVQQGEwJYWDEUMBIG
A1UECgwLQ2VydHMgJ3IgVXMxEzARBgNVBAMMCklzc3VpbmcgQ0EwHhcNMjQwNDAy
MTIzNzQ3WhcNMjUwNDAyMTIzNzQ3WjA4MQswCQYDVQQGEwJYWDEUMBIGA1UECgwL
Q2VydHMgJ3IgVXMxEzARBgNVBAMMCklzc3VpbmcgQ0EwgZswEAYHKoZIzj0CAQYF
K4EEACMDgYYABAHQ/XJXqEx0f1YldcBzhdvr8vUr6lgIPbgv3RUx2KrjzIdf8C/3
+i2iYNjrYtbS9dZJJ44yFzagYoy7swMItuYY2wD2KtIExkYDWbyBiriWG/Dw/A7F
quikKBc85W8A3psVfB5cgsZPVi/K3vxKTCj200LPPvYW/ILTO3KFySHyvzb92KNC
MEAwHQYDVR0OBBYEFI7CFAlgduqQOOk5rhttUsQXfZ++MA8GA1UdEwEB/wQFMAMB
Af8wDgYDVR0PAQH/BAQDAgIEMAoGCCqGSM49BAMEA4GLADCBhwJBbr/1SJiHCgXG
EJ7R+3er1LdWqrdZHgtCwyT7+wFBIJmVswEiom2LGh/oMuu5mD+u/+o1m07vmmZj
/+ipGp8TIwkCQgCoZ4bHte6XkFm7hUXascLN7vkv7qKwXyTsCvIDpEDTRCX8dUFe
73jGebitkumRHjVhlBJLo7n3FMJrFHNoeblMbw==
-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 552: SEQUENCE {
  4 394:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 1
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 28  56:     SEQUENCE {
 30  11:       SET {
 32   9:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 39   2:           PrintableString 'XX'
       :           }
       :         }
 43  20:       SET {
 45  18:         SEQUENCE {
 47   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 52  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 65  19:       SET {
 67  17:         SEQUENCE {
 69   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 74  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 86  30:     SEQUENCE {
 88  13:       UTCTime 02/04/2024 12:37:47 GMT
103  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
118  56:     SEQUENCE {
120  11:       SET {
122   9:         SEQUENCE {
124   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
129   2:           PrintableString 'XX'
       :           }
       :         }
133  20:       SET {
135  18:         SEQUENCE {
137   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
142  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
155  19:       SET {
157  17:         SEQUENCE {
159   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
164  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
176 155:     SEQUENCE {
179  16:       SEQUENCE {
181   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
190   5:         OBJECT IDENTIFIER secp521r1 (1 3 132 0 35)
       :         }
197 134:       BIT STRING
       :         04 01 D0 FD 72 57 A8 4C 74 7F 56 25 75 C0 73 85
       :         DB EB F2 F5 2B EA 58 08 3D B8 2F DD 15 31 D8 AA
       :         E3 CC 87 5F F0 2F F7 FA 2D A2 60 D8 EB 62 D6 D2
       :         F5 D6 49 27 8E 32 17 36 A0 62 8C BB B3 03 08 B6
       :         E6 18 DB 00 F6 2A D2 04 C6 46 03 59 BC 81 8A B8
       :         96 1B F0 F0 FC 0E C5 AA E8 A4 28 17 3C E5 6F 00
       :         DE 9B 15 7C 1E 5C 82 C6 4F 56 2F CA DE FC 4A 4C
       :         28 F6 D3 42 CF 3E F6 16 FC 82 D3 3B 72 85 C9 21
       :         F2 BF 36 FD D8
       :       }
334  66:     [3] {
336  64:       SEQUENCE {
338  29:         SEQUENCE {
340   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
345  22:           OCTET STRING, encapsulates {
347  20:             OCTET STRING
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :             }
       :           }
369  15:         SEQUENCE {
371   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
376   1:           BOOLEAN TRUE
379   5:           OCTET STRING, encapsulates {
381   3:             SEQUENCE {
383   1:               BOOLEAN TRUE
       :               }
       :             }
       :           }
386  14:         SEQUENCE {
388   3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
393   1:           BOOLEAN TRUE
396   4:           OCTET STRING, encapsulates {
398   2:             BIT STRING 2 unused bits
       :               '100000'B (bit 5)
       :             }
       :           }
       :         }
       :       }
       :     }
402  10:   SEQUENCE {
404   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
414 139:   BIT STRING, encapsulates {
418 135:     SEQUENCE {
421  65:       INTEGER
       :         6E BF F5 48 98 87 0A 05 C6 10 9E D1 FB 77 AB D4
       :         B7 56 AA B7 59 1E 0B 42 C3 24 FB FB 01 41 20 99
       :         95 B3 01 22 A2 6D 8B 1A 1F E8 32 EB B9 98 3F AE
       :         FF EA 35 9B 4E EF 9A 66 63 FF E8 A9 1A 9F 13 23
       :         09
488  66:       INTEGER
       :         00 A8 67 86 C7 B5 EE 97 90 59 BB 85 45 DA B1 C2
       :         CD EE F9 2F EE A2 B0 5F 24 EC 0A F2 03 A4 40 D3
       :         44 25 FC 75 41 5E EF 78 C6 79 B8 AD 92 E9 91 1E
       :         35 61 94 12 4B A3 B9 F7 14 C2 6B 14 73 68 79 B9
       :         4C 6F
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="end-entity-certificate">
        <name>End-entity Certificate</name>
        <t>This is an end-entity certificate whose status is requested and
returned in the OCSP request and response examples below.</t>
        <t>The key pair for the end-entity certificate is the "testECCP256"
key from <xref section="2.3" sectionFormat="of" target="RFC9500"/>.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 475: SEQUENCE {
  4 316:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   4:     INTEGER 27979789
 19  10:     SEQUENCE {
 21   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 31  56:     SEQUENCE {
 33  11:       SET {
 35   9:         SEQUENCE {
 37   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 42   2:           PrintableString 'XX'
       :           }
       :         }
 46  20:       SET {
 48  18:         SEQUENCE {
 50   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 55  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 68  19:       SET {
 70  17:         SEQUENCE {
 72   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 77  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 89  30:     SEQUENCE {
 91  13:       UTCTime 02/04/2024 12:37:47 GMT
106  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
121  28:     SEQUENCE {
123  26:       SET {
125  24:         SEQUENCE {
127   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
132  17:           UTF8String 'xn--18j4d.example'
       :           }
       :         }
       :       }
151  89:     SEQUENCE {
153  19:       SEQUENCE {
155   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
164   8:         OBJECT IDENTIFIER prime256v1 (1 2 840 10045 3 1 7)
       :         }
174  66:       BIT STRING
       :         04 42 25 48 F8 8F B7 82 FF B5 EC A3 74 44 52 C7
       :         2A 1E 55 8F BD 6F 73 BE 5E 48 E9 32 32 CC 45 C5
       :         B1 6C 4C D1 0C 4C B8 D5 B8 A1 71 39 E9 48 82 C8
       :         99 25 72 99 34 25 F4 14 19 AB 7E 90 A4 2A 49 42
       :         72
       :       }
242  80:     [3] {
244  78:       SEQUENCE {
246  29:         SEQUENCE {
248   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
253  22:           OCTET STRING, encapsulates {
255  20:             OCTET STRING
       :               5B 70 A7 98 17 F7 9F F6 37 D2 F7 E3 DC 44 6C 21
       :               09 D7 BB D4
       :             }
       :           }
277  31:         SEQUENCE {
279   3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
284  24:           OCTET STRING, encapsulates {
286  22:             SEQUENCE {
288  20:               [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :               }
       :             }
       :           }
310  12:         SEQUENCE {
312   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
317   1:           BOOLEAN TRUE
320   2:           OCTET STRING, encapsulates {
322   0:             SEQUENCE {}
       :             }
       :           }
       :         }
       :       }
       :     }
324  10:   SEQUENCE {
326   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
336 140:   BIT STRING, encapsulates {
340 136:     SEQUENCE {
343  66:       INTEGER
       :         00 8A 2D F1 26 0D 16 44 9C AD CB 18 E5 3F 35 1D
       :         29 8D CE 13 FF D0 60 BC EC DD D6 23 CE 3D 08 DD
       :         2A 98 D6 B4 9C C5 D6 F0 79 C3 28 64 79 9E FF C3
       :         F7 1F 93 F2 E2 CC 06 5A 45 51 69 87 42 65 C0 24
       :         F3 7C
411  66:       INTEGER
       :         01 5B C0 34 5E C8 B2 3C 9C 99 7D A6 62 78 E0 E6
       :         B6 7A 08 A1 B6 4F F9 E4 CB 35 69 06 50 52 FA B8
       :         2B 4B B5 09 98 B6 B5 E9 2C 02 5F BE 41 3A 59 85
       :         6A 09 49 78 F7 92 B1 F6 5E 8C F5 30 4B 2B 95 FA
       :         57 7C
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-responder-certificate">
        <name>OCSP Responder Certificate</name>
        <t>This is a certificate for the OCSP delegated response that signed the
OCSP response example below.</t>
        <t>The key pair for the OCSP Responder certificate is the "testECCP384"
key from <xref section="2.3" sectionFormat="of" target="RFC9500"/>.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 587: SEQUENCE {
  4 430:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 1
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 28  56:     SEQUENCE {
 30  11:       SET {
 32   9:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 39   2:           PrintableString 'XX'
       :           }
       :         }
 43  20:       SET {
 45  18:         SEQUENCE {
 47   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 52  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 65  19:       SET {
 67  17:         SEQUENCE {
 69   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 74  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 86  30:     SEQUENCE {
 88  13:       UTCTime 02/04/2024 12:37:47 GMT
103  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
118  60:     SEQUENCE {
120  11:       SET {
122   9:         SEQUENCE {
124   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
129   2:           PrintableString 'XX'
       :           }
       :         }
133  20:       SET {
135  18:         SEQUENCE {
137   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
142  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
155  23:       SET {
157  21:         SEQUENCE {
159   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
164  14:           UTF8String 'OCSP Responder'
       :           }
       :         }
       :       }
180 118:     SEQUENCE {
182  16:       SEQUENCE {
184   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
193   5:         OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
       :         }
200  98:       BIT STRING
       :         04 5B 09 01 B8 85 23 29 6E B9 19 D5 0F FA 1A 9C
       :         B3 74 BC 4D 40 95 86 28 2B FE CA 11 B1 D9 5A DB
       :         B5 47 34 AF 57 0B F8 2B 72 28 CF 22 6B CF 4C 25
       :         DD BC FE 3B 1A 3A D3 94 30 EF F7 63 E1 D6 8D 2E
       :         15 1D 91 72 0B 77 95 B5 8D A6 B3 46 39 61 3A 8F
       :         B9 B5 A8 DA 48 C6 74 71 17 F9 91 9E 84 24 F3 7E
       :         C8
       :       }
300 135:     [3] {
303 132:       SEQUENCE {
306  29:         SEQUENCE {
308   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
313  22:           OCTET STRING, encapsulates {
315  20:             OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :             }
       :           }
337  31:         SEQUENCE {
339   3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
344  24:           OCTET STRING, encapsulates {
346  22:             SEQUENCE {
348  20:               [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :               }
       :             }
       :           }
370  12:         SEQUENCE {
372   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
377   1:           BOOLEAN TRUE
380   2:           OCTET STRING, encapsulates {
382   0:             SEQUENCE {}
       :             }
       :           }
384  14:         SEQUENCE {
386   3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
391   1:           BOOLEAN TRUE
394   4:           OCTET STRING, encapsulates {
396   2:             BIT STRING 7 unused bits
       :               '1'B (bit 0)
       :             }
       :           }
400  19:         SEQUENCE {
402   3:           OBJECT IDENTIFIER extKeyUsage (2 5 29 37)
407  12:           OCTET STRING, encapsulates {
409  10:             SEQUENCE {
411   8:               OBJECT IDENTIFIER ocspSigning (1 3 6 1 5 5 7 3 9)
       :               }
       :             }
       :           }
421  15:         SEQUENCE {
423   9:           OBJECT IDENTIFIER ocspNoCheck (1 3 6 1 5 5 7 48 1 5)
434   2:           OCTET STRING, encapsulates {
436   0:             NULL
       :             }
       :           }
       :         }
       :       }
       :     }
438  10:   SEQUENCE {
440   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
450 138:   BIT STRING, encapsulates {
454 134:     SEQUENCE {
457  65:       INTEGER
       :         14 2A 8C D6 0A 6C 65 C7 74 65 DF 11 5B C1 FF F8
       :         BE 0E 21 B4 DA 1A DA 53 D9 06 34 A5 DE 89 07 0F
       :         75 94 5A 8D 0B 18 FE 17 59 3D 5C 9A CA 49 00 15
       :         54 06 BF 6F 72 5A 64 EB 11 AC 7E AF 8A 19 4E DC
       :         C6
524  65:       INTEGER
       :         49 0B 0B 49 A6 2E E6 D3 44 31 F6 BF EE 80 D5 AC
       :         9C 21 52 88 A5 1D C6 EB E3 EE 68 3D 94 9B 73 D2
       :         17 B1 44 96 4A 14 E0 D6 24 6E 5D 52 1F FF 05 CD
       :         B0 F2 FC B0 81 86 28 76 E5 EE E1 02 DC A0 FD 7B
       :         08
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-request">
        <name>OCSP Request</name>
        <t>This is a base64-encoded OCSP request for the end-entity certificate
above.</t>
        <artwork><![CDATA[
MGEwXzBdMFswWTANBglghkgBZQMEAgEFAAQgOplGd1aAc6cHv95QGGNF5M1hNNsI
Xrqh0QQl8DtvCOoEIEdKbKMB8j3J9/cHhwThx/X8lucWdfbtiC56tlw/WEVDAgQB
qvAN
]]></artwork>
        <artwork><![CDATA[
0  97: SEQUENCE {
  2  95:   SEQUENCE {
  4  93:     SEQUENCE {
  6  91:       SEQUENCE {
  8  89:         SEQUENCE {
 10  13:           SEQUENCE {
 12   9:             OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
 23   0:             NULL
       :             }
 25  32:           OCTET STRING
       :             3A 99 46 77 56 80 73 A7 07 BF DE 50 18 63 45 E4
       :             CD 61 34 DB 08 5E BA A1 D1 04 25 F0 3B 6F 08 EA
 59  32:           OCTET STRING
       :             47 4A 6C A3 01 F2 3D C9 F7 F7 07 87 04 E1 C7 F5
       :             FC 96 E7 16 75 F6 ED 88 2E 7A B6 5C 3F 58 45 43
 93   4:           INTEGER 27979789
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-response">
        <name>OCSP Response</name>
        <t>This is a base64-encoded OCSP response for the end-entity certificate
above.</t>
        <artwork><![CDATA[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]]></artwork>
        <artwork><![CDATA[
0 927: SEQUENCE {
  4   1:   ENUMERATED 0
  7 920:   [0] {
 11 916:     SEQUENCE {
 15   9:       OBJECT IDENTIFIER ocspBasic (1 3 6 1 5 5 7 48 1 1)
 26 901:       OCTET STRING, encapsulates {
 30 897:         SEQUENCE {
 34 176:           SEQUENCE {
 37  22:             [2] {
 39  20:               OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :               }
 61  15:             GeneralizedTime 02/04/2024 12:37:47 GMT
 78 132:             SEQUENCE {
 81 129:               SEQUENCE {
 84  89:                 SEQUENCE {
 86  13:                   SEQUENCE {
 88   9:                     OBJECT IDENTIFIER
       :                       sha-256 (2 16 840 1 101 3 4 2 1)
 99   0:                     NULL
       :                     }
101  32:                   OCTET STRING
       :               3A 99 46 77 56 80 73 A7 07 BF DE 50 18 63 45 E4
       :               CD 61 34 DB 08 5E BA A1 D1 04 25 F0 3B 6F 08 EA
135  32:                   OCTET STRING
       :               47 4A 6C A3 01 F2 3D C9 F7 F7 07 87 04 E1 C7 F5
       :               FC 96 E7 16 75 F6 ED 88 2E 7A B6 5C 3F 58 45 43
169   4:                   INTEGER 27979789
       :                   }
175   0:                 [0]
177  15:                 GeneralizedTime 03/04/2024 12:37:47 GMT
194  17:                 [0] {
196  15:                   GeneralizedTime 10/04/2024 12:37:47 GMT
       :                   }
       :                 }
       :               }
       :             }
213  10:           SEQUENCE {
215   8:             OBJECT IDENTIFIER
       :               ecdsaWithSHA384 (1 2 840 10045 4 3 3)
       :             }
225 105:           BIT STRING, encapsulates {
228 102:             SEQUENCE {
230  49:               INTEGER
       :               00 D1 99 59 A2 21 BE 03 9B DC 84 5E 2B F6 5E DA
       :               1E 42 2E 9F B6 98 CB 9A 50 6A A9 12 22 FB 78 6D
       :               7C 5F CE CA 37 47 9C 5B A1 DF C7 10 29 8A AA AD
       :               66
281  49:               INTEGER
       :               00 CA 88 F7 2D 56 EE D2 42 CE 7C ED DD 99 04 41
       :               D0 1F 6D 23 E4 01 62 18 6B 1B 23 56 F7 F8 2F 59
       :               2B A3 48 CE 00 FA 0E 75 A5 0F 0A 52 7E 29 44 6A
       :               B3
       :               }
       :             }
332 595:           [0] {
336 591:             SEQUENCE {
340 587:               SEQUENCE {
344 430:                 SEQUENCE {
348   3:                   [0] {
350   1:                     INTEGER 2
       :                     }
353   1:                   INTEGER 1
356  10:                   SEQUENCE {
358   8:                     OBJECT IDENTIFIER
       :                       ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :                     }
368  56:                   SEQUENCE {
370  11:                     SET {
372   9:                       SEQUENCE {
374   3:                         OBJECT IDENTIFIER countryName (2 5 4 6)
379   2:                         PrintableString 'XX'
       :                         }
       :                       }
383  20:                     SET {
385  18:                       SEQUENCE {
387   3:                         OBJECT IDENTIFIER
       :                           organizationName (2 5 4 10)
392  11:                         UTF8String 'Certs 'r Us'
       :                         }
       :                       }
405  19:                     SET {
407  17:                       SEQUENCE {
409   3:                         OBJECT IDENTIFIER commonName (2 5 4 3)
414  10:                         UTF8String 'Issuing CA'
       :                         }
       :                       }
       :                     }
426  30:                   SEQUENCE {
428  13:                     UTCTime 02/04/2024 12:37:47 GMT
443  13:                     UTCTime 02/04/2025 12:37:47 GMT
       :                     }
458  60:                   SEQUENCE {
460  11:                     SET {
462   9:                       SEQUENCE {
464   3:                         OBJECT IDENTIFIER countryName (2 5 4 6)
469   2:                         PrintableString 'XX'
       :                         }
       :                       }
473  20:                     SET {
475  18:                       SEQUENCE {
477   3:                         OBJECT IDENTIFIER
       :                           organizationName (2 5 4 10)
482  11:                         UTF8String 'Certs 'r Us'
       :                         }
       :                       }
495  23:                     SET {
497  21:                       SEQUENCE {
499   3:                         OBJECT IDENTIFIER commonName (2 5 4 3)
504  14:                         UTF8String 'OCSP Responder'
       :                         }
       :                       }
       :                     }
520 118:                   SEQUENCE {
522  16:                     SEQUENCE {
524   7:                       OBJECT IDENTIFIER
       :                         ecPublicKey (1 2 840 10045 2 1)
533   5:                       OBJECT IDENTIFIER
       :                         secp384r1 (1 3 132 0 34)
       :                       }
540  98:                     BIT STRING
       :               04 5B 09 01 B8 85 23 29 6E B9 19 D5 0F FA 1A 9C
       :               B3 74 BC 4D 40 95 86 28 2B FE CA 11 B1 D9 5A DB
       :               B5 47 34 AF 57 0B F8 2B 72 28 CF 22 6B CF 4C 25
       :               DD BC FE 3B 1A 3A D3 94 30 EF F7 63 E1 D6 8D 2E
       :               15 1D 91 72 0B 77 95 B5 8D A6 B3 46 39 61 3A 8F
       :               B9 B5 A8 DA 48 C6 74 71 17 F9 91 9E 84 24 F3 7E
       :               C8
       :                     }
640 135:                   [3] {
643 132:                     SEQUENCE {
646  29:                       SEQUENCE {
648   3:                         OBJECT IDENTIFIER
       :                           subjectKeyIdentifier (2 5 29 14)
653  22:                         OCTET STRING, encapsulates {
655  20:                           OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :                           }
       :                         }
677  31:                       SEQUENCE {
679   3:                         OBJECT IDENTIFIER
       :                           authorityKeyIdentifier (2 5 29 35)
684  24:                         OCTET STRING, encapsulates {
686  22:                           SEQUENCE {
688  20:                             [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :                             }
       :                           }
       :                         }
710  12:                       SEQUENCE {
712   3:                         OBJECT IDENTIFIER
       :                           basicConstraints (2 5 29 19)
717   1:                         BOOLEAN TRUE
720   2:                         OCTET STRING, encapsulates {
722   0:                           SEQUENCE {}
       :                           }
       :                         }
724  14:                       SEQUENCE {
726   3:                         OBJECT IDENTIFIER keyUsage (2 5 29 15)
731   1:                         BOOLEAN TRUE
734   4:                         OCTET STRING, encapsulates {
736   2:                           BIT STRING 7 unused bits
       :                             '1'B (bit 0)
       :                           }
       :                         }
740  19:                       SEQUENCE {
742   3:                         OBJECT IDENTIFIER
       :                           extKeyUsage (2 5 29 37)
747  12:                         OCTET STRING, encapsulates {
749  10:                           SEQUENCE {
751   8:                             OBJECT IDENTIFIER
       :                               ocspSigning (1 3 6 1 5 5 7 3 9)
       :                             }
       :                           }
       :                         }
761  15:                       SEQUENCE {
763   9:                         OBJECT IDENTIFIER
       :                           ocspNoCheck (1 3 6 1 5 5 7 48 1 5)
774   2:                         OCTET STRING, encapsulates {
776   0:                           NULL
       :                           }
       :                         }
       :                       }
       :                     }
       :                   }
778  10:                 SEQUENCE {
780   8:                   OBJECT IDENTIFIER
       :                     ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :                   }
790 138:                 BIT STRING, encapsulates {
794 134:                   SEQUENCE {
797  65:                     INTEGER
       :               14 2A 8C D6 0A 6C 65 C7 74 65 DF 11 5B C1 FF F8
       :               BE 0E 21 B4 DA 1A DA 53 D9 06 34 A5 DE 89 07 0F
       :               75 94 5A 8D 0B 18 FE 17 59 3D 5C 9A CA 49 00 15
       :               54 06 BF 6F 72 5A 64 EB 11 AC 7E AF 8A 19 4E DC
       :               C6
864  65:                     INTEGER
       :               49 0B 0B 49 A6 2E E6 D3 44 31 F6 BF EE 80 D5 AC
       :               9C 21 52 88 A5 1D C6 EB E3 EE 68 3D 94 9B 73 D2
       :               17 B1 44 96 4A 14 E0 D6 24 6E 5D 52 1F FF 05 CD
       :               B0 F2 FC B0 81 86 28 76 E5 EE E1 02 DC A0 FD 7B
       :               08
       :                     }
       :                   }
       :                 }
       :               }
       :             }
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this version of the document wish to thank Alex Deacon
and Ryan Hurst for their work to produce the original version
of the lightweight profile for the OCSP protocol.</t>
      <t>The authors of this version of the document wish to thank
Paul Kyzivat, Russ Housley, Rob Stradling, Roman Danyliw, and
Wendy Brown for their reviews, feedback, and suggestions.</t>
      <t>The authors wish to thank Magnus Nystrom of RSA Security, Inc.,
Jagjeet Sondh of Vodafone Group R&amp;D, and David Engberg of CoreStreet,
Ltd. for their contributions to the original <xref target="RFC5019"/> specification.
Listed organizational affiliations reflect the author’s affiliation
at the time of RFC5019 was published.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
