<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-trans-rfc6962-bis-40" category="exp" obsoletes="6962">

  <front>
    <title>Certificate Transparency Version 2.0</title>

    <author initials="B." surname="Laurie" fullname="Ben Laurie">
      <organization abbrev="Google">Google UK Ltd.</organization>
      <address>
        <email>benl@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Langley" fullname="Adam Langley">
      <organization abbrev="Google">Google Inc.</organization>
      <address>
        <email>agl@google.com</email>
      </address>
    </author>
    <author initials="E." surname="Kasper" fullname="Emilia Kasper">
      <organization abbrev="Google">Google Switzerland GmbH</organization>
      <address>
        <email>ekasper@google.com</email>
      </address>
    </author>
    <author initials="E." surname="Messeri" fullname="Eran Messeri">
      <organization abbrev="Google">Google UK Ltd.</organization>
      <address>
        <email>eranm@google.com</email>
      </address>
    </author>
    <author initials="R." surname="Stradling" fullname="Rob Stradling">
      <organization abbrev="Sectigo">Sectigo Ltd.</organization>
      <address>
        <email>rob@sectigo.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="28"/>

    <area>Security</area>
    <workgroup>TRANS (Public Notary Transparency)</workgroup>
    

    <abstract>


<t>This document describes version 2.0 of the Certificate Transparency (CT)
protocol for publicly logging the existence of Transport Layer Security (TLS)
server certificates as they are issued or observed, in a manner that allows
anyone to audit certification authority (CA) activity and notice the issuance of
suspect certificates as well as to audit the certificate logs themselves. The
intent is that eventually clients would refuse to honor certificates that do not
appear in a log, effectively forcing CAs to add all issued certificates to the
logs.</t>

<t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is
used to send various CT log artifacts.</t>

<t>Logs are network services that implement the protocol operations for submissions
and queries that are defined in this document.</t>

<t>[RFC Editor: please update 'RFCXXXX' to refer to this document,
once its RFC number is known, through the document.]</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Certificate Transparency aims to mitigate the problem of misissued certificates
by providing append-only logs of issued certificates. The logs do not themselves
prevent misissuance, but they ensure that interested parties (particularly those
named in certificates) can detect such misissuance. Note that this is a general
mechanism that could be used for transparently logging any form of binary data,
subject to some kind of inclusion criteria. In this document, we only describe
its use for public TLS server certificates (i.e., where the inclusion criteria
is a valid certificate issued by a public certification authority (CA)).
A typical definition of "public" can be found in <xref target="CABBR"></xref>.</t>

<t>Each log contains certificate chains, which can be submitted by anyone. It is
expected that public CAs will contribute all their newly issued certificates to
one or more logs; however, certificate holders can also contribute their own
certificate chains, as can third parties. In order to avoid logs being rendered
useless by the submission of large numbers of spurious certificates, it is
required that each chain ends with a trust anchor that is accepted by the log.
A log may also limit the length of the chain it is willing to accept;
such chains must also end with an acceptable trust anchor.
When a chain is accepted by a log, a signed timestamp is returned, which can
later be used to provide evidence to TLS clients that the chain has been
submitted. TLS clients can thus require that all certificates they accept as
valid are accompanied by signed timestamps.</t>

<t>Those who are concerned about misissuance can monitor the logs, asking them
regularly for all new entries, and can thus check whether domains for which they
are responsible have had certificates issued that they did not expect. What
they do with this information, particularly when they find that a misissuance
has happened, is beyond the scope of this document. However, broadly speaking,
they can invoke existing business mechanisms for dealing with misissued
certificates, such as working with the CA to get the certificate revoked, or
with maintainers of trust anchor lists to get the CA removed. Of course, anyone
who wants can monitor the logs and, if they believe a certificate is incorrectly
issued, take action as they see fit.</t>

<t>Similarly, those who have seen signed timestamps from a particular log can later
demand a proof of inclusion from that log. If the log is unable to provide this
(or, indeed, if the corresponding certificate is absent from monitors' copies of
that log), that is evidence of the incorrect operation of the log. The checking
operation is asynchronous to allow clients to proceed without delay, despite
possible issues such as network connectivity and the vagaries of firewalls.</t>

<t>The append-only property of each log is achieved using Merkle Trees, which can
be used to efficiently prove that any particular instance of the log is a
superset of any particular previous instance and to efficiently detect various
misbehaviors of the log (e.g., issuing a signed timestamp for a certificate that
is not subsequently logged).</t>

<t>It is necessary to treat each log as a trusted third party, because the log
auditing mechanisms described in this document can be circumvented by a
misbehaving log that shows different, inconsistent views of itself to different
clients. While mechanisms are being developed to address these
shortcomings and thereby avoid the need to blindly trust logs,
such mechanisms are outside the scope of this document.</t>

<section anchor="requirements-language" title="Requirements Language">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="data_structures" title="Data Structures">

<t>Data structures are defined and encoded according to the conventions laid out
in Section 3 of <xref target="RFC8446"></xref>.</t>

<t>This document uses object identifiers (OIDs) to identify Log IDs (see
<xref target="log_id"/>), the precertificate CMS <spanx style="verb">eContentType</spanx> (see <xref target="precertificates"/>),
and X.509v3 extensions in certificates (see <xref target="cert_transinfo_extension"/>) and
OCSP responses (see <xref target="ocsp_transinfo_extension"/>). The OIDs are defined in an
arc that was selected due to its short encoding.</t>

</section>
<section anchor="major-differences-from-ct-10" title="Major Differences from CT 1.0">

<t>This document revises and obsoletes the CT 1.0 <xref target="RFC6962"></xref> protocol, drawing on
insights gained from CT 1.0 deployments and on feedback from the community. The
major changes are:</t>

<t><list style="symbols">
  <t>Hash and signature algorithm agility: permitted algorithms are now specified
in IANA registries.</t>
  <t>Precertificate format: precertificates are now CMS objects rather than X.509
certificates, which avoids violating the certificate serial number uniqueness
requirement in Section 4.1.2.2 of <xref target="RFC5280"></xref>.</t>
  <t>Removed precertificate signing certificates and the precertificate poison
extension: the change of precertificate format means that these are no longer
needed.</t>
  <t>Logs IDs: each log is now identified by an OID rather than by the hash of its
public key. OID allocations are managed by an IANA registry.</t>
  <t><spanx style="verb">TransItem</spanx> structure: this new data structure is used to encapsulate most
types of CT data. A <spanx style="verb">TransItemList</spanx>, consisting of one or more <spanx style="verb">TransItem</spanx>
structures, can be used anywhere that <spanx style="verb">SignedCertificateTimestampList</spanx> was
used in <xref target="RFC6962"></xref>.</t>
  <t>Merkle tree leaves: the <spanx style="verb">MerkleTreeLeaf</spanx> structure has been replaced by the
<spanx style="verb">TransItem</spanx> structure, which eases extensibility and simplifies the leaf
structure by removing one layer of abstraction.</t>
  <t>Unified leaf format: the structure for both certificate and precertificate
entries now includes only the TBSCertificate (whereas certificate entries in
<xref target="RFC6962"></xref> included the entire certificate).</t>
  <t>Log Artifact Extensions: these are now typed and managed by an IANA registry,
and they can now appear not only in SCTs but also in STHs.</t>
  <t>API outputs: complete <spanx style="verb">TransItem</spanx> structures are returned, rather than the
constituent parts of each structure.</t>
  <t>get-all-by-hash: new client API for obtaining an inclusion proof and the
corresponding consistency proof at the same time.</t>
  <t>submit-entry: new client API, replacing add-chain and add-pre-chain.</t>
  <t>Presenting SCTs with proofs: TLS servers may present SCTs together with the
corresponding inclusion proofs using any of the mechanisms that <xref target="RFC6962"></xref>
defined for presenting SCTs only. (Presenting SCTs only is still supported).</t>
  <t>CT TLS extension: the <spanx style="verb">signed_certificate_timestamp</spanx> TLS extension has been
replaced by the <spanx style="verb">transparency_info</spanx> TLS extension.</t>
  <t>Verification algorithms: added detailed algorithms for verifying inclusion
proofs, for verifying consistency between two STHs, and for verifying a root
hash given a complete list of the relevant leaf input entries.</t>
  <t>Extensive clarifications and editorial work.</t>
</list></t>

</section>
</section>
<section anchor="cryptographic-components" title="Cryptographic Components">

<section anchor="mht" title="Merkle Hash Trees">

<t>A full description of Merkle Hash Tree is beyond the scope of this
document. Briefly, it is a binary tree where each non-leaf node is a
hash of its children. For CT, the number of children is at most two.
Additional information can be found in the Introduction and Reference
section of <xref target="RFC8391"/>.</t>

<section anchor="mht_definition" title="Definition of the Merkle Tree">

<t>The log uses a binary Merkle Hash Tree for efficient auditing. The hash
algorithm used is one of the log's parameters (see <xref target="log_parameters"/>).
This document establishes a registry of acceptable hash algorithms (see
<xref target="hash_algorithms"/>). Throughout this document, the hash algorithm in use is
referred to as HASH and the size of its output in bytes as HASH_SIZE. The input
to the Merkle Tree Hash is a list of data entries; these entries will be
hashed to form the leaves of the Merkle Hash Tree. The output is a single
HASH_SIZE Merkle Tree Hash. Given an ordered list of n inputs, D_n =
{d[0], d[1], …, d[n-1]}, the Merkle Tree Hash (MTH) is thus defined as
follows:</t>

<t>The hash of an empty list is the hash of an empty string:</t>

<figure><artwork><![CDATA[
MTH({}) = HASH().
]]></artwork></figure>

<t>The hash of a list with one entry (also known as a leaf hash) is:</t>

<figure><artwork><![CDATA[
MTH({d[0]}) = HASH(0x00 || d[0]).
]]></artwork></figure>

<t>For n &gt; 1, let k be the largest power of two smaller than n
(i.e., k &lt; n &lt;= 2k).
The Merkle Tree Hash of an n-element list D_n is then defined recursively as</t>

<figure><artwork><![CDATA[
MTH(D_n) = HASH(0x01 || MTH(D[0:k]) || MTH(D[k:n])),
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>|| denotes concatenation</t>
  <t>: denotes concatenation of lists</t>
  <t>D[k1:k2] = D'_(k2-k1) denotes the list {d'[0] = d[k1], d'[1] = d[k1+1],
…, d'[k2-k1-1] = d[k2-1]} of length (k2 - k1).</t>
</list></t>

<t>Note that the hash calculations for leaves and nodes differ; this domain
separation is required to give second preimage resistance.</t>

<t>Note that we do not require the length of the input list to be a power of two.
The resulting Merkle Tree may thus not be balanced; however, its shape is
uniquely determined by the number of leaves. (Note: This Merkle Tree is
essentially the same as the history tree <xref target="CrosbyWallach"></xref> proposal, except our
definition handles non-full trees differently).</t>

</section>
<section anchor="verify_hash" title="Verifying a Tree Head Given Entries">

<t>When a client has a complete list of <spanx style="verb">entries</spanx> from <spanx style="verb">0</spanx> up to
<spanx style="verb">tree_size - 1</spanx> and wishes to verify this list against a tree head <spanx style="verb">root_hash</spanx>
returned by the log for the same <spanx style="verb">tree_size</spanx>, the following algorithm may be
used:</t>

<t><list style="numbers">
  <t>Set <spanx style="verb">stack</spanx> to an empty stack.</t>
  <t>For each <spanx style="verb">i</spanx> from <spanx style="verb">0</spanx> up to <spanx style="verb">tree_size - 1</spanx>:  <list style="numbers">
      <t>Push <spanx style="verb">HASH(0x00 || entries[i])</spanx> to <spanx style="verb">stack</spanx>.</t>
      <t>Set <spanx style="verb">merge_count</spanx> to the lowest value (<spanx style="verb">0</spanx> included) such that <spanx style="verb">LSB(i &gt;&gt;
merge_count)</spanx> is not set, where <spanx style="verb">LSB</spanx> means the least significant bit.
In other words, set <spanx style="verb">merge_count</spanx> to the number
of consecutive <spanx style="verb">1</spanx>s found starting at the least significant bit of <spanx style="verb">i</spanx>.</t>
      <t>Repeat <spanx style="verb">merge_count</spanx> times:      <list style="numbers">
          <t>Pop <spanx style="verb">right</spanx> from <spanx style="verb">stack</spanx>.</t>
          <t>Pop <spanx style="verb">left</spanx> from <spanx style="verb">stack</spanx>.</t>
          <t>Push <spanx style="verb">HASH(0x01 || left || right)</spanx> to <spanx style="verb">stack</spanx>.</t>
        </list></t>
    </list></t>
  <t>If there is more than one element in the <spanx style="verb">stack</spanx>, repeat the same merge
procedure (the sub-items of Step 2.3 above) until only a single element
remains.</t>
  <t>The remaining element in <spanx style="verb">stack</spanx> is the Merkle Tree hash for the given
<spanx style="verb">tree_size</spanx> and should be compared by equality against the supplied
<spanx style="verb">root_hash</spanx>.</t>
</list></t>

</section>
<section anchor="merkle_inclusion_proof" title="Merkle Inclusion Proofs">

<t>A Merkle inclusion proof for a leaf in a Merkle Hash Tree is the shortest list
of additional nodes in the Merkle Tree required to compute the Merkle Tree Hash
for that tree. Each node in the tree is either a leaf node or is computed from
the two nodes immediately below it (i.e., towards the leaves). At each step up
the tree (towards the root), a node from the inclusion proof is combined with
the node computed so far. In other words, the inclusion proof consists of the
list of missing nodes required to compute the nodes leading from a leaf to the
root of the tree. If the root computed from the inclusion proof matches the true
root, then the inclusion proof proves that the leaf exists in the tree.</t>

<section anchor="generating-an-inclusion-proof" title="Generating an Inclusion Proof">

<t>Given an ordered list of n inputs to the tree, D_n = {d[0], d[1], …,
d[n-1]}, the Merkle inclusion proof PATH(m, D_n) for the (m+1)th input d[m],
0 &lt;= m &lt; n, is defined as follows:</t>

<t>The proof for the single leaf in a tree with a one-element input list D[1] =
{d[0]} is empty:</t>

<figure><artwork><![CDATA[
PATH(0, {d[0]}) = {}
]]></artwork></figure>

<t>For n &gt; 1, let k be the largest power of two smaller than n. The proof for the
(m+1)th element d[m] in a list of n &gt; m elements is then defined recursively as</t>

<figure><artwork><![CDATA[
PATH(m, D_n) = PATH(m, D[0:k]) : MTH(D[k:n]) for m < k; and

PATH(m, D_n) = PATH(m - k, D[k:n]) : MTH(D[0:k]) for m >= k,
]]></artwork></figure>

<t>The : operator and D[k1:k2] are defined the same as in <xref target="mht_definition"/>.</t>

</section>
<section anchor="verify_inclusion" title="Verifying an Inclusion Proof">

<t>When a client has received an inclusion proof (e.g., in a <spanx style="verb">TransItem</spanx> of type
<spanx style="verb">inclusion_proof_v2</spanx>) and wishes to verify inclusion of an input <spanx style="verb">hash</spanx> for a
given <spanx style="verb">tree_size</spanx> and <spanx style="verb">root_hash</spanx>, the following algorithm may be used to prove
the <spanx style="verb">hash</spanx> was included in the <spanx style="verb">root_hash</spanx>:</t>

<t><list style="numbers">
  <t>Compare <spanx style="verb">leaf_index</spanx> from the <spanx style="verb">inclusion_proof_v2</spanx> structure
against <spanx style="verb">tree_size</spanx>. If <spanx style="verb">leaf_index</spanx> is greater than or
equal to <spanx style="verb">tree_size</spanx> then fail the proof verification.</t>
  <t>Set <spanx style="verb">fn</spanx> to <spanx style="verb">leaf_index</spanx> and <spanx style="verb">sn</spanx> to <spanx style="verb">tree_size - 1</spanx>.</t>
  <t>Set <spanx style="verb">r</spanx> to <spanx style="verb">hash</spanx>.</t>
  <t>For each value <spanx style="verb">p</spanx> in the <spanx style="verb">inclusion_path</spanx> array:  <vspace blankLines='1'/>
If <spanx style="verb">sn</spanx> is 0, stop the iteration and fail the proof verification.  <vspace blankLines='1'/>
If <spanx style="verb">LSB(fn)</spanx> is set, or if <spanx style="verb">fn</spanx> is equal to <spanx style="verb">sn</spanx>, then:  <list style="numbers">
      <t>Set <spanx style="verb">r</spanx> to <spanx style="verb">HASH(0x01 || p || r)</spanx></t>
      <t>If <spanx style="verb">LSB(fn)</spanx> is not set, then right-shift both <spanx style="verb">fn</spanx> and <spanx style="verb">sn</spanx> equally
until either <spanx style="verb">LSB(fn)</spanx> is set or <spanx style="verb">fn</spanx> is <spanx style="verb">0</spanx>.</t>
    </list>
Otherwise:  <list style="numbers">
      <t>Set <spanx style="verb">r</spanx> to <spanx style="verb">HASH(0x01 || r || p)</spanx></t>
    </list>
Finally, right-shift both <spanx style="verb">fn</spanx> and <spanx style="verb">sn</spanx> one time.</t>
  <t>Compare <spanx style="verb">sn</spanx> to 0. Compare <spanx style="verb">r</spanx> against the <spanx style="verb">root_hash</spanx>. If <spanx style="verb">sn</spanx> is equal to
0, and <spanx style="verb">r</spanx> and the <spanx style="verb">root_hash</spanx> are equal, then the log has proven the
inclusion of <spanx style="verb">hash</spanx>. Otherwise, fail the proof verification.</t>
</list></t>

</section>
</section>
<section anchor="consistency" title="Merkle Consistency Proofs">

<t>Merkle consistency proofs prove the append-only property of the tree. A Merkle
consistency proof for a Merkle Tree Hash MTH(D_n) and a previously advertised
hash MTH(D[0:m]) of the first m leaves, m &lt;= n, is the list of nodes in the
Merkle Tree required to verify that the first m inputs D[0:m] are equal in both
trees. Thus, a consistency proof must contain a set of intermediate nodes (i.e.,
commitments to inputs) sufficient to verify MTH(D_n), such that (a subset of)
the same nodes can be used to verify MTH(D[0:m]). We define an algorithm that
outputs the (unique) minimal consistency proof.</t>

<section anchor="generating-a-consistency-proof" title="Generating a Consistency Proof">

<t>Given an ordered list of n inputs to the tree, D_n = {d[0], d[1], …,
d[n-1]}, the Merkle consistency proof PROOF(m, D_n) for a previous Merkle Tree
Hash MTH(D[0:m]), 0 &lt; m &lt; n, is defined as:</t>

<figure><artwork><![CDATA[
PROOF(m, D_n) = SUBPROOF(m, D_n, true)
]]></artwork></figure>

<t>In SUBPROOF, the boolean value represents whether the subtree created from
D[0:m] is a complete subtree of the Merkle Tree created from D_n, and,
consequently, whether the subtree Merkle Tree Hash MTH(D[0:m]) is known. The
initial call to SUBPROOF sets this to be true, and SUBPROOF is then defined as
follows:</t>

<t>The subproof for m = n is empty if m is the value for which PROOF was originally
requested (meaning that the subtree created from D[0:m] is a complete subtree
of the Merkle Tree created from the original D_n for which PROOF was
requested, and the subtree Merkle Tree Hash MTH(D[0:m]) is known):</t>

<figure><artwork><![CDATA[
SUBPROOF(m, D_m, true) = {}
]]></artwork></figure>

<t>Otherwise, the subproof for m = n is the Merkle Tree Hash committing inputs
D[0:m]:</t>

<figure><artwork><![CDATA[
SUBPROOF(m, D_m, false) = {MTH(D_m)}
]]></artwork></figure>

<t>For m &lt; n, let k be the largest power of two smaller than n. The subproof is
then defined recursively, using the appropriate step below:</t>

<t>If m &lt;= k, the right subtree entries D[k:n] only exist in the current tree.
We prove that the left subtree entries D[0:k] are consistent and add a
commitment to D[k:n]:</t>

<figure><artwork><![CDATA[
SUBPROOF(m, D_n, b) = SUBPROOF(m, D[0:k], b) : MTH(D[k:n])
]]></artwork></figure>

<t>If m &gt; k, the left subtree entries D[0:k] are identical in both trees. We prove
that the right subtree entries D[k:n] are consistent and add a commitment to
D[0:k].</t>

<figure><artwork><![CDATA[
SUBPROOF(m, D_n, b) = SUBPROOF(m - k, D[k:n], false) : MTH(D[0:k])
]]></artwork></figure>

<t>The number of nodes in the resulting proof is bounded above by ceil(log2(n)) +
1.</t>

<t>The : operator and D[k1:k2] are defined the same as in <xref target="mht_definition"/>.</t>

</section>
<section anchor="verify_consistency" title="Verifying Consistency between Two Tree Heads">

<t>When a client has a tree head <spanx style="verb">first_hash</spanx> for tree size <spanx style="verb">first</spanx>, a tree head
<spanx style="verb">second_hash</spanx> for tree size <spanx style="verb">second</spanx> where <spanx style="verb">0 &lt; first &lt; second</spanx>, and has
received a consistency proof between the two (e.g., in a <spanx style="verb">TransItem</spanx> of type
<spanx style="verb">consistency_proof_v2</spanx>), the following algorithm may be used to verify the
consistency proof:</t>

<t><list style="numbers">
  <t>If <spanx style="verb">consistency_path</spanx> is an empty array, stop and fail the proof
verification.</t>
  <t>If <spanx style="verb">first</spanx> is an exact power of 2, then prepend <spanx style="verb">first_hash</spanx> to the
<spanx style="verb">consistency_path</spanx> array.</t>
  <t>Set <spanx style="verb">fn</spanx> to <spanx style="verb">first - 1</spanx> and <spanx style="verb">sn</spanx> to <spanx style="verb">second - 1</spanx>.</t>
  <t>If <spanx style="verb">LSB(fn)</spanx> is set, then right-shift both <spanx style="verb">fn</spanx> and <spanx style="verb">sn</spanx> equally until
<spanx style="verb">LSB(fn)</spanx> is not set.</t>
  <t>Set both <spanx style="verb">fr</spanx> and <spanx style="verb">sr</spanx> to the first value in the <spanx style="verb">consistency_path</spanx> array.</t>
  <t>For each subsequent value <spanx style="verb">c</spanx> in the <spanx style="verb">consistency_path</spanx> array:  <vspace blankLines='1'/>
If <spanx style="verb">sn</spanx> is 0, stop the iteration and fail the proof verification.  <vspace blankLines='1'/>
If <spanx style="verb">LSB(fn)</spanx> is set, or if <spanx style="verb">fn</spanx> is equal to <spanx style="verb">sn</spanx>, then:  <list style="numbers">
      <t>Set <spanx style="verb">fr</spanx> to <spanx style="verb">HASH(0x01 || c || fr)</spanx><vspace />
Set <spanx style="verb">sr</spanx> to <spanx style="verb">HASH(0x01 || c || sr)</spanx></t>
      <t>If <spanx style="verb">LSB(fn)</spanx> is not set, then right-shift both <spanx style="verb">fn</spanx> and <spanx style="verb">sn</spanx> equally
until either <spanx style="verb">LSB(fn)</spanx> is set or <spanx style="verb">fn</spanx> is <spanx style="verb">0</spanx>.</t>
    </list>
Otherwise:  <list style="numbers">
      <t>Set <spanx style="verb">sr</spanx> to <spanx style="verb">HASH(0x01 || sr || c)</spanx></t>
    </list>
Finally, right-shift both <spanx style="verb">fn</spanx> and <spanx style="verb">sn</spanx> one time.</t>
  <t>After completing iterating through the <spanx style="verb">consistency_path</spanx> array as described
above, verify that the <spanx style="verb">fr</spanx> calculated is equal to the <spanx style="verb">first_hash</spanx> supplied,
that the <spanx style="verb">sr</spanx> calculated is equal to the <spanx style="verb">second_hash</spanx> supplied and that <spanx style="verb">sn</spanx>
is 0.</t>
</list></t>

</section>
</section>
<section anchor="example" title="Example">

<t>The binary Merkle Tree with 7 leaves:</t>

<figure><artwork><![CDATA[
            hash
           /    \
          /      \
         /        \
        /          \
       /            \
      k              l
     / \            / \
    /   \          /   \
   /     \        /     \
  g       h      i      j
 / \     / \    / \     |
 a b     c d    e f     d6
 | |     | |    | |
d0 d1   d2 d3  d4 d5
]]></artwork></figure>

<t>The inclusion proof for d0 is [b, h, l].</t>

<t>The inclusion proof for d3 is [c, g, l].</t>

<t>The inclusion proof for d4 is [f, j, k].</t>

<t>The inclusion proof for d6 is [i, k].</t>

<t>The same tree, built incrementally in four steps:</t>

<figure><artwork><![CDATA[
    hash0          hash1=k
    / \              /  \
   /   \            /    \
  /     \          /      \
  g      c         g       h
 / \     |        / \     / \
 a b     d2       a b     c d
 | |              | |     | |
d0 d1            d0 d1   d2 d3

          hash2                    hash
          /  \                    /    \
         /    \                  /      \
        /      \                /        \
       /        \              /          \
      /          \            /            \
     k            i          k              l
    / \          / \        / \            / \
   /   \         e f       /   \          /   \
  /     \        | |      /     \        /     \
 g       h      d4 d5    g       h      i      j
/ \     / \             / \     / \    / \     |
a b     c d             a b     c d    e f     d6
| |     | |             | |     | |    | |
d0 d1   d2 d3           d0 d1   d2 d3  d4 d5
]]></artwork></figure>

<t>The consistency proof between hash0 and hash is PROOF(3, D[7]) = [c, d, g, l].
c, g are used to verify hash0, and d, l are additionally used to show hash is
consistent with hash0.</t>

<t>The consistency proof between hash1 and hash is PROOF(4, D[7]) = [l]. hash can
be verified using hash1=k and l.</t>

<t>The consistency proof between hash2 and hash is PROOF(6, D[7]) = [i, j, k].
k, i are used to verify hash2, and j is additionally used to show hash is
consistent with hash2.</t>

</section>
</section>
<section anchor="signatures" title="Signatures">

<t>When signing data structures, a log MUST use one of
the signature algorithms from the IANA CT Signature Algorithms registry,
described in <xref target="signature_algorithms"/>.</t>

</section>
</section>
<section anchor="submitters" title="Submitters">

<t>Submitters submit certificates or preannouncements of certificates prior to
issuance (precertificates) to logs for public auditing, as described below. In
order to enable attribution of each logged certificate or precertificate to its
issuer, each submission MUST be accompanied by all additional certificates
required to verify the chain up to an accepted trust anchor (<xref target="get-anchors"/>).
The trust anchor (a root or intermediate CA certificate) MAY be omitted from the
submission.</t>

<t>If a log accepts a submission, it will return a Signed Certificate Timestamp
(SCT) (see <xref target="sct"/>). The submitter SHOULD validate the returned SCT as described
in <xref target="tls_clients"/> if they understand its format and they intend to use it
directly in a TLS handshake or to construct a certificate. If the submitter does
not need the SCT (for example, the certificate is being submitted simply to make
it available in the log), it MAY validate the SCT.</t>

<section anchor="certificates" title="Certificates">

<t>Any entity can submit a certificate (<xref target="submit-entry"/>) to a log. Since it is
anticipated that TLS clients will reject certificates that are not logged, it is
expected that certificate issuers and subjects will be strongly motivated to
submit them.</t>

</section>
<section anchor="precertificates" title="Precertificates">

<t>CAs may preannounce a certificate prior to issuance by submitting a
precertificate (<xref target="submit-entry"/>) that the log can use to create an entry that
will be valid against the issued certificate. The CA MAY incorporate the
returned SCT in the issued certificate. One example of where the returned SCT is
not incorporated in the issued certificate is when a CA sends the precertificate
to multiple logs, but only incorporates the SCTs that are returned first.</t>

<t>A precertificate is a CMS <xref target="RFC5652"></xref> <spanx style="verb">signed-data</spanx> object that conforms to the
following profile:</t>

<t><list style="symbols">
  <t>It MUST be DER encoded as described in <xref target="X690"></xref>.</t>
  <t><spanx style="verb">SignedData.version</spanx> MUST be v3(3).</t>
  <t><spanx style="verb">SignedData.digestAlgorithms</spanx> MUST be the same as the
<spanx style="verb">SignerInfo.digestAlgorithm</spanx> OID value (see below).</t>
  <t><spanx style="verb">SignedData.encapContentInfo</spanx>:
  <list style="symbols">
      <t><spanx style="verb">eContentType</spanx> MUST be the OID 1.3.101.78.</t>
      <t><spanx style="verb">eContent</spanx> MUST contain a TBSCertificate <xref target="RFC5280"></xref> that will be identical to
the TBSCertificate in the issued certificate, except that the Transparency
Information (<xref target="x509v3_transinfo_extension"/>) extension MUST be omitted.</t>
    </list></t>
  <t><spanx style="verb">SignedData.certificates</spanx> MUST be omitted.</t>
  <t><spanx style="verb">SignedData.crls</spanx> MUST be omitted.</t>
  <t><spanx style="verb">SignedData.signerInfos</spanx> MUST contain one <spanx style="verb">SignerInfo</spanx>:
  <list style="symbols">
      <t><spanx style="verb">version</spanx> MUST be v3(3).</t>
      <t><spanx style="verb">sid</spanx> MUST use the <spanx style="verb">subjectKeyIdentifier</spanx> option.</t>
      <t><spanx style="verb">digestAlgorithm</spanx> MUST be one of the hash algorithm OIDs listed in
the IANA CT Hash Algorithms Registry, described in
<xref target="hash_algorithms"/>.</t>
      <t><spanx style="verb">signedAttrs</spanx> MUST be present and MUST contain two attributes:
      <list style="symbols">
          <t>A content-type attribute whose value is the same as
<spanx style="verb">SignedData.encapContentInfo.eContentType</spanx>.</t>
          <t>A message-digest attribute whose value is the message digest of
<spanx style="verb">SignedData.encapContentInfo.eContent</spanx>.</t>
        </list></t>
      <t><spanx style="verb">signatureAlgorithm</spanx> MUST be the same OID as <spanx style="verb">TBSCertificate.signature</spanx>.</t>
      <t><spanx style="verb">signature</spanx> MUST be from the same (root or intermediate) CA that intends to
issue the corresponding certificate (see <xref target="binding_intent_to_issue"/>).</t>
      <t><spanx style="verb">unsignedAttrs</spanx> MUST be omitted.</t>
    </list></t>
</list></t>

<t><spanx style="verb">SignerInfo.signedAttrs</spanx> is included in the message digest calculation process
(see Section 5.4 of <xref target="RFC5652"></xref>), which ensures that the <spanx style="verb">SignerInfo.signature</spanx>
value will not be a valid X.509v3 signature that could be used in conjunction
with the TBSCertificate (from <spanx style="verb">SignedData.encapContentInfo.eContent</spanx>) to
construct a valid certificate.</t>

<section anchor="binding_intent_to_issue" title="Binding Intent to Issue">

<t>Under normal circumstances, there will be a short delay between precertificate
submission and issuance of the corresponding certificate. Longer delays are to
be expected occasionally (e.g., due to log server downtime), and in some cases
the CA might not actually issue the corresponding certificate. Nevertheless, a
precertificate's <spanx style="verb">signature</spanx> indicates the CA's binding intent to issue the
corresponding certificate, which means that:</t>

<t><list style="symbols">
  <t>Misissuance of a precertificate is considered equivalent to misissuance of
the corresponding certificate. The CA should expect to be held to account,
even if the corresponding certificate has not actually been issued.</t>
  <t>Upon observing a precertificate, a client can reasonably presume that the
corresponding certificate has been issued. A client may wish to obtain status
information (e.g., by using the Online Certificate Status Protocol <xref target="RFC6960"></xref>
or by checking a Certificate Revocation List <xref target="RFC5280"></xref>) about a certificate
that is presumed to exist, especially if there is evidence or suspicion that
the corresponding precertificate was misissued.</t>
  <t>TLS clients may have policies that require CAs to be able to revoke, and to
provide certificate status services for, each certificate that is presumed to
exist based on the existence of a corresponding precertificate.</t>
</list></t>

</section>
</section>
</section>
<section anchor="log-format-and-operation" title="Log Format and Operation">

<t>A log is a single, append-only Merkle Tree of submitted certificate and
precertificate entries.</t>

<t>When it receives and accepts a valid submission, the log MUST return an SCT that
corresponds to the submitted certificate or precertificate. If the log has
previously seen this valid submission, it SHOULD return the same SCT as it
returned before, as discussed in <xref target="misbehaving_logs"/>.
If different SCTs are produced for the same
submission, multiple log entries will have to be created, one for each SCT (as
the timestamp is a part of the leaf structure). Note that if a certificate was
previously logged as a precertificate, then the precertificate's SCT of type
<spanx style="verb">precert_sct_v2</spanx> would not be appropriate; instead, a fresh SCT of type
<spanx style="verb">x509_sct_v2</spanx> should be generated.</t>

<t>An SCT is the log's promise to append to its Merkle Tree an entry for the
accepted submission. Upon producing an SCT, the log MUST fulfil this promise by
performing the following actions within a fixed amount of time known as the
Maximum Merge Delay (MMD), which is one of the log's parameters (see
<xref target="log_parameters"/>):</t>

<t><list style="symbols">
  <t>Allocate a tree index to the entry representing the accepted submission.</t>
  <t>Calculate the root of the tree.</t>
  <t>Sign the root of the tree (see <xref target="sth"/>).</t>
</list></t>

<t>The log may append multiple entries before signing the root of the tree.</t>

<t>Log operators SHOULD NOT impose any conditions on retrieving or sharing data
from the log.</t>

<section anchor="log_parameters" title="Log Parameters">

<t>A log is defined by a collection of immutable parameters, which are used by
clients to communicate with the log and to verify log artifacts. Except for the
Final Signed Tree Head (STH), each of these parameters MUST be established
before the log operator begins to operate the log.</t>

<t><list style="hanging">
  <t hangText="Base URL:">
  The prefix used to construct URLs (<xref target="RFC3986"></xref>) for client messages (see
<xref target="client_messages"/>). The base URL MUST be an "https" URL, MAY contain a port,
MAY contain a path with any number of path segments, but MUST NOT contain a
query string, fragment, or trailing "/".
Example: https://ct.example.org/blue</t>
  <t hangText="Hash Algorithm:">
  The hash algorithm used for the Merkle Tree (see <xref target="hash_algorithms"/>).</t>
  <t hangText="Signature Algorithm:">
  The signature algorithm used (see <xref target="signatures"/>).</t>
  <t hangText="Public Key:">
  The public key used to verify signatures generated by the log. A log MUST NOT
use the same keypair as any other log.</t>
  <t hangText="Log ID:">
  The OID that uniquely identifies the log.</t>
  <t hangText="Maximum Merge Delay:">
  The MMD the log has committed to.
This document deliberately does not specify any limits on the value, to allow
for experimentation.</t>
  <t hangText="Version:">
  The version of the protocol supported by the log (currently 1 or 2).</t>
  <t hangText="Maximum Chain Length:">
  The longest certificate chain submission the log is willing to accept, if the log imposes
any limit.</t>
  <t hangText="STH Frequency Count:">
  The maximum number of STHs the log may produce in any period equal to the
<spanx style="verb">Maximum Merge Delay</spanx> (see <xref target="sth"/>).</t>
  <t hangText="Final STH:">
  If a log has been closed down (i.e., no longer accepts new entries), existing
entries may still be valid. In this case, the client should know the final
valid STH in the log to ensure no new entries can be added without detection.
This value MUST be provided in the form of a TransItem of type
<spanx style="verb">signed_tree_head_v2</spanx>.
If a log is still accepting entries, this value should not be provided.</t>
</list></t>

<t><xref target="JSON.Metadata"></xref> is an example of a metadata format which includes the above
elements.</t>

</section>
<section anchor="evaluating-submissions" title="Evaluating Submissions">

<t>A log determines whether to accept or reject a submission by evaluating it
against the minimum acceptance criteria (see <xref target="minimum_criteria"/>) and against
the log's discretionary acceptance criteria (see <xref target="discretionary_criteria"/>).</t>

<t>If the acceptance criteria are met, the log SHOULD accept the submission. (A log
may decide, for example, to temporarily reject acceptable submissions to protect
itself against denial-of-service attacks).</t>

<t>The log SHALL allow retrieval of its list of accepted trust anchors (see
<xref target="get-anchors"/>), each of which is a root or intermediate CA certificate. This
list might usefully be the union of root certificates trusted by major browser
vendors.</t>

<section anchor="minimum_criteria" title="Minimum Acceptance Criteria">

<t>To ensure that logged certificates and precertificates are attributable to an
accepted trust anchor, and to set clear expectations for what monitors would
find in the log, and to avoid being overloaded by invalid submissions, the log
MUST reject a submission if any of the following conditions are not met:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">submission</spanx>, <spanx style="verb">type</spanx> and <spanx style="verb">chain</spanx> inputs MUST be set as described in
<xref target="submit-entry"/>. The log MUST NOT accommodate misordered CA certificates or
use any other source of intermediate CA certificates to attempt certification
path construction.</t>
  <t>Each of the zero or more intermediate CA certificates in the chain MUST have
one or both of the following features:
  <list style="symbols">
      <t>The Basic Constraints extension with the cA boolean asserted.</t>
      <t>The Key Usage extension with the keyCertSign bit asserted.</t>
    </list></t>
  <t>Each certificate in the chain MUST fall within the limits imposed by the zero
or more Basic Constraints pathLenConstraint values found higher up the chain.</t>
  <t>Precertificate submissions MUST conform to all of the requirements in
<xref target="precertificates"/>.</t>
</list></t>

</section>
<section anchor="discretionary_criteria" title="Discretionary Acceptance Criteria">

<t>If the minimum acceptance criteria are met but the submission is not fully
valid according to <xref target="RFC5280"></xref> verification rules (e.g., the certificate or
precertificate has expired, is not yet valid, has been revoked, exhibits ASN.1
DER encoding errors but the log can still parse it, etc), then the acceptability
of the submission is left to the log's discretion. It is useful for logs to
accept such submissions in order to accommodate quirks of CA certificate-issuing
software and to facilitate monitoring of CA compliance with applicable policies
and technical standards. However, it is impractical for this document to
enumerate, and for logs to consider, all of the ways that a submission might
fail to comply with <xref target="RFC5280"></xref>.</t>

<t>Logs SHOULD limit the length of chain they will accept. The maximum chain length
is one of the log's parameters (see <xref target="log_parameters"/>).</t>

</section>
</section>
<section anchor="log_entries" title="Log Entries">

<t>If a submission is accepted and an SCT issued, the accepting log MUST store the
entire chain used for verification. This chain MUST include the certificate or
precertificate itself, the zero or more intermediate CA certificates provided by
the submitter, and the trust anchor used to verify the chain (even if it was
omitted from the submission). The log MUST provide this chain for auditing upon
request (see <xref target="get-entries"/>) so that the CA cannot avoid blame by
logging a partial or empty chain.
Each log entry is a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">x509_entry_v2</spanx> or
<spanx style="verb">precert_entry_v2</spanx>. However, a log may store its entries in any format. If a
log does not store this <spanx style="verb">TransItem</spanx> in full, it must store the <spanx style="verb">timestamp</spanx>
and <spanx style="verb">sct_extensions</spanx> of the corresponding <spanx style="verb">TimestampedCertificateEntryDataV2</spanx>
structure. The <spanx style="verb">TransItem</spanx> can be reconstructed from these fields and the entire
chain that the log used to verify the submission.</t>

</section>
<section anchor="log_id" title="Log ID">

<t>Each log is identified by an OID, which is one of the log's parameters (see
<xref target="log_parameters"/>) and which MUST NOT be used to identify any other log. A
log's operator MUST either allocate the OID themselves or request an OID from
the Log ID registry (see <xref target="log_id_registry"/>).
The only advantage of the registry is that the DER encoding can be small.
(Recall that OID allocations do not require a central registration, although
logs will most likely want to make themselves known to potential clients
through out of band means.)
Various data structures include
the DER encoding of this OID, excluding the ASN.1 tag and length bytes, in an
opaque vector:</t>

<figure><artwork><![CDATA[
    opaque LogID<2..127>;
]]></artwork></figure>

<t>Note that the ASN.1 length and the opaque vector length are identical in size (1
byte) and value, so the full DER encoding (including the tag and length)
of the OID can be reproduced simply by
prepending an OBJECT IDENTIFIER tag (0x06) to the opaque vector length and
contents.</t>

<t>The OID used to identify a log is limited such that the DER encoding of its
value, excluding the tag and length, MUST be no longer than 127 octets.</t>

</section>
<section anchor="transitem-structure" title="TransItem Structure">

<t>Various data structures are encapsulated in the <spanx style="verb">TransItem</spanx> structure to ensure
that the type and version of each one is identified in a common fashion:</t>

<figure><artwork><![CDATA[
    enum {
        reserved(0),
        x509_entry_v2(1), precert_entry_v2(2),
        x509_sct_v2(3), precert_sct_v2(4),
        signed_tree_head_v2(5), consistency_proof_v2(6),
        inclusion_proof_v2(7),
        (65535)
    } VersionedTransType;

    struct {
        VersionedTransType versioned_type;
        select (versioned_type) {
            case x509_entry_v2: TimestampedCertificateEntryDataV2;
            case precert_entry_v2: TimestampedCertificateEntryDataV2;
            case x509_sct_v2: SignedCertificateTimestampDataV2;
            case precert_sct_v2: SignedCertificateTimestampDataV2;
            case signed_tree_head_v2: SignedTreeHeadDataV2;
            case consistency_proof_v2: ConsistencyProofDataV2;
            case inclusion_proof_v2: InclusionProofDataV2;
        } data;
    } TransItem;
]]></artwork></figure>

<t><spanx style="verb">versioned_type</spanx> is a value from the IANA registry in <xref target="versioned_trans_types"/>
that identifies the type of the encapsulated data structure and the earliest
version of this protocol to which it conforms. This document is v2.</t>

<t><spanx style="verb">data</spanx> is the encapsulated data structure. The various structures named with the
<spanx style="verb">DataV2</spanx> suffix are defined in later sections of this document.</t>

<t>Note that <spanx style="verb">VersionedTransType</spanx> combines the v1 <xref target="RFC6962"></xref> type enumerations
<spanx style="verb">Version</spanx>, <spanx style="verb">LogEntryType</spanx>, <spanx style="verb">SignatureType</spanx> and <spanx style="verb">MerkleLeafType</spanx>. Note also that
v1 did not define <spanx style="verb">TransItem</spanx>, but this document provides guidelines (see
<xref target="v1_coexistence"/>) on how v2 implementations can co-exist with v1
implementations.</t>

<t>Future versions of this protocol may reuse <spanx style="verb">VersionedTransType</spanx> values defined
in this document as long as the corresponding data structures are not modified,
and may add new <spanx style="verb">VersionedTransType</spanx> values for new or modified data structures.</t>

</section>
<section anchor="log-artifact-extensions" title="Log Artifact Extensions">

<figure><artwork><![CDATA[
    enum {
        reserved(65535)
    } ExtensionType;

    struct {
        ExtensionType extension_type;
        opaque extension_data<0..2^16-1>;
    } Extension;
]]></artwork></figure>

<t>The <spanx style="verb">Extension</spanx> structure provides a generic extensibility for log artifacts,
including SCTs (<xref target="sct"/>) and STHs
(<xref target="sth"/>). The interpretation of the <spanx style="verb">extension_data</spanx> field is determined solely
by the value of the <spanx style="verb">extension_type</spanx> field.</t>

<t>This document does not define any extensions, but it does establish a registry
for future <spanx style="verb">ExtensionType</spanx> values (see <xref target="log_artifact_extension_registry"/>).
Each document that registers a new <spanx style="verb">ExtensionType</spanx> must specify the context in
which it may be used (e.g., SCT, STH, or both) and describe how to interpret the
corresponding <spanx style="verb">extension_data</spanx>.</t>

</section>
<section anchor="tree_leaves" title="Merkle Tree Leaves">

<t>The leaves of a log's Merkle Tree correspond to the log's entries (see
<xref target="log_entries"/>). Each leaf is the leaf hash (<xref target="mht"/>) of a <spanx style="verb">TransItem</spanx>
structure of type <spanx style="verb">x509_entry_v2</spanx> or <spanx style="verb">precert_entry_v2</spanx>, which encapsulates a
<spanx style="verb">TimestampedCertificateEntryDataV2</spanx> structure. Note that leaf hashes are
calculated as HASH(0x00 || TransItem), where the hash algorithm is one of the
log's parameters.</t>

<figure><artwork><![CDATA[
    opaque TBSCertificate<1..2^24-1>;

    struct {
        uint64 timestamp;
        opaque issuer_key_hash<32..2^8-1>;
        TBSCertificate tbs_certificate;
        Extension sct_extensions<0..2^16-1>;
    } TimestampedCertificateEntryDataV2;
]]></artwork></figure>

<t><spanx style="verb">timestamp</spanx> is the date and time at which the certificate or precertificate was
accepted by the log, in the form of a 64-bit unsigned number of milliseconds
elapsed since the Unix Epoch (1 January 1970 00:00:00 UTC - see <xref target="UNIXTIME"></xref>),
ignoring leap seconds, in network byte order. Note that the leaves of a log's
Merkle Tree are not required to be in strict chronological order.</t>

<t><spanx style="verb">issuer_key_hash</spanx> is the HASH of the public key of the CA that issued the
certificate or precertificate, calculated over the DER encoding of the key
represented as SubjectPublicKeyInfo <xref target="RFC5280"></xref>. This is needed to bind the CA to
the certificate or precertificate, making it impossible for the corresponding
SCT to be valid for any other certificate or precertificate whose TBSCertificate
matches <spanx style="verb">tbs_certificate</spanx>. The length of the <spanx style="verb">issuer_key_hash</spanx> MUST match
HASH_SIZE.</t>

<t><spanx style="verb">tbs_certificate</spanx> is the DER encoded TBSCertificate from the submission. (Note
that a precertificate's TBSCertificate can be reconstructed from the
corresponding certificate as described in <xref target="reconstructing_tbscertificate"/>).</t>

<t><spanx style="verb">sct_extensions</spanx> is byte-for-byte identical to the SCT extensions of the
corresponding SCT.</t>

<t>The type of the <spanx style="verb">TransItem</spanx> corresponds to the value of the <spanx style="verb">type</spanx> parameter
supplied in the <xref target="submit-entry"/> call.</t>

</section>
<section anchor="sct" title="Signed Certificate Timestamp (SCT)">

<t>An SCT is a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">x509_sct_v2</spanx> or <spanx style="verb">precert_sct_v2</spanx>,
which encapsulates a <spanx style="verb">SignedCertificateTimestampDataV2</spanx> structure:</t>

<figure><artwork><![CDATA[
    struct {
        LogID log_id;
        uint64 timestamp;
        Extension sct_extensions<0..2^16-1>;
        opaque signature<1..2^16-1>;
    } SignedCertificateTimestampDataV2;
]]></artwork></figure>

<t><spanx style="verb">log_id</spanx> is this log's unique ID, encoded in an opaque vector as described in
<xref target="log_id"/>.</t>

<t><spanx style="verb">timestamp</spanx> is equal to the timestamp from the corresponding
<spanx style="verb">TimestampedCertificateEntryDataV2</spanx> structure.</t>

<t><spanx style="verb">sct_extensions</spanx> is a vector of 0 or more SCT extensions. This vector MUST NOT
include more than one extension with the same <spanx style="verb">extension_type</spanx>. The
extensions in the vector MUST be ordered by the value of the
<spanx style="verb">extension_type</spanx> field, smallest value first.
All SCT extensions are similar to non-critical X.509v3 extensions (i.e.,
the <spanx style="verb">mustUnderstand</spanx> field is not set), and a recipient SHOULD ignore any
extension it does not understand.
Furthermore, an implementation MAY choose to ignore any extension(s) that it
does understand.</t>

<t><spanx style="verb">signature</spanx> is computed over a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">x509_entry_v2</spanx>
or <spanx style="verb">precert_entry_v2</spanx> (see <xref target="tree_leaves"/>) using the signature algorithm
declared in the log's parameters (see <xref target="log_parameters"/>).</t>

</section>
<section anchor="tree_head" title="Merkle Tree Head">

<t>The log stores information about its Merkle Tree in a <spanx style="verb">TreeHeadDataV2</spanx>:</t>

<figure><artwork><![CDATA[
    opaque NodeHash<32..2^8-1>;

    struct {
        uint64 timestamp;
        uint64 tree_size;
        NodeHash root_hash;
        Extension sth_extensions<0..2^16-1>;
    } TreeHeadDataV2;
]]></artwork></figure>

<t>The length of NodeHash MUST match HASH_SIZE of the log.</t>

<t><spanx style="verb">timestamp</spanx> is the current date and time, using the format defined in
<xref target="tree_leaves"/>.</t>

<t><spanx style="verb">tree_size</spanx> is the number of entries currently in the log's Merkle Tree.</t>

<t><spanx style="verb">root_hash</spanx> is the root of the Merkle Hash Tree.</t>

<t><spanx style="verb">sth_extensions</spanx> is a vector of 0 or more STH extensions. This vector MUST NOT
include more than one extension with the same <spanx style="verb">extension_type</spanx>. The
extensions in the vector MUST be ordered by the value of the
<spanx style="verb">extension_type</spanx> field, smallest value first. If an implementation sees an
extension that it does not understand, it SHOULD ignore that extension.
Furthermore, an implementation MAY choose to ignore any extension(s) that it
does understand.</t>

</section>
<section anchor="sth" title="Signed Tree Head (STH)">

<t>Periodically each log SHOULD sign its current tree head information (see
<xref target="tree_head"/>) to produce an STH. When a client requests a log's latest STH (see
<xref target="get-sth"/>), the log MUST return an STH that is no older than the log's MMD.
However, since STHs could be used to mark individual clients (by producing a new
STH for each query), a log MUST NOT produce STHs more frequently than its
parameters declare (see <xref target="log_parameters"/>). In general, there is no need to
produce a new STH unless there are new entries in the log; however, in the event
that a log does not accept any submissions during an MMD period, the log MUST
sign the same Merkle Tree Hash with a fresh timestamp.</t>

<t>An STH is a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">signed_tree_head_v2</spanx>, which
encapsulates a <spanx style="verb">SignedTreeHeadDataV2</spanx> structure:</t>

<figure><artwork><![CDATA[
    struct {
        LogID log_id;
        TreeHeadDataV2 tree_head;
        opaque signature<1..2^16-1>;
    } SignedTreeHeadDataV2;
]]></artwork></figure>

<t><spanx style="verb">log_id</spanx> is this log's unique ID, encoded in an opaque vector as described in
<xref target="log_id"/>.</t>

<t>The <spanx style="verb">timestamp</spanx> in <spanx style="verb">tree_head</spanx> MUST be at least as recent as the most recent SCT
timestamp in the tree. Each subsequent timestamp MUST be more recent than the
timestamp of the previous update.</t>

<t><spanx style="verb">tree_head</spanx> contains the latest tree head information (see <xref target="tree_head"/>).</t>

<t><spanx style="verb">signature</spanx> is computed over the <spanx style="verb">tree_head</spanx> field using the signature algorithm
declared in the log's parameters (see <xref target="log_parameters"/>).</t>

</section>
<section anchor="merkle-consistency-proofs" title="Merkle Consistency Proofs">

<t>To prepare a Merkle Consistency Proof for distribution to clients, the log
produces a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">consistency_proof_v2</spanx>, which
encapsulates a <spanx style="verb">ConsistencyProofDataV2</spanx> structure:</t>

<figure><artwork><![CDATA[
    struct {
        LogID log_id;
        uint64 tree_size_1;
        uint64 tree_size_2;
        NodeHash consistency_path<0..2^16-1>;
    } ConsistencyProofDataV2;
]]></artwork></figure>

<t><spanx style="verb">log_id</spanx> is this log's unique ID, encoded in an opaque vector as described in
<xref target="log_id"/>.</t>

<t><spanx style="verb">tree_size_1</spanx> is the size of the older tree.</t>

<t><spanx style="verb">tree_size_2</spanx> is the size of the newer tree.</t>

<t><spanx style="verb">consistency_path</spanx> is a vector of Merkle Tree nodes proving the consistency of
two STHs as described in <xref target="consistency"/>.</t>

</section>
<section anchor="merkle-inclusion-proofs" title="Merkle Inclusion Proofs">

<t>To prepare a Merkle Inclusion Proof for distribution to clients, the log
produces a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">inclusion_proof_v2</spanx>, which
encapsulates an <spanx style="verb">InclusionProofDataV2</spanx> structure:</t>

<figure><artwork><![CDATA[
    struct {
        LogID log_id;
        uint64 tree_size;
        uint64 leaf_index;
        NodeHash inclusion_path<0..2^16-1>;
    } InclusionProofDataV2;
]]></artwork></figure>

<t><spanx style="verb">log_id</spanx> is this log's unique ID, encoded in an opaque vector as described in
<xref target="log_id"/>.</t>

<t><spanx style="verb">tree_size</spanx> is the size of the tree on which this inclusion proof is based.</t>

<t><spanx style="verb">leaf_index</spanx> is the 0-based index of the log entry corresponding to this
inclusion proof.</t>

<t><spanx style="verb">inclusion_path</spanx> is a vector of Merkle Tree nodes proving the inclusion of the
chosen certificate or precertificate as described in <xref target="merkle_inclusion_proof"/>.</t>

</section>
<section anchor="log_shutdown" title="Shutting down a log">

<t>Log operators may decide to shut down a log for various reasons, such as
deprecation of the signature algorithm. If there are entries in the log for
certificates that have not yet expired, simply making TLS clients stop
recognizing that log will have the effect of invalidating SCTs from that log.
In order to avoid that, the following actions SHOULD be taken:</t>

<t><list style="symbols">
  <t>Make it known to clients and monitors that the log will be frozen.
This is not part of the API, so it will have to be done via a relevant
out-of-band mechanism.</t>
  <t>Stop accepting new submissions (the error code "shutdown" should be returned
for such requests).</t>
  <t>Once MMD from the last accepted submission has passed and all pending
submissions are incorporated, issue a final STH and publish it as one of the
log's parameters. Having an STH with a timestamp that is after the MMD has
passed from the last SCT issuance allows clients to audit this log regularly
without special handling for the final STH. At this point the log's private
key is no longer needed and can be destroyed.</t>
  <t>Keep the log running until the certificates in all of its entries have expired
or exist in other logs (this can be determined by scanning other logs or
connecting to domains mentioned in the certificates and inspecting the SCTs
served).</t>
</list></t>

</section>
</section>
<section anchor="client_messages" title="Log Client Messages">

<t>Messages are sent as HTTPS GET or POST requests. Parameters for POSTs and all
responses are encoded as JavaScript Object Notation (JSON) objects <xref target="RFC8259"></xref>.
Parameters for GETs are encoded as order-independent key/value URL parameters,
using the "application/x-www-form-urlencoded" format described in the "HTML 4.01
Specification" <xref target="HTML401"></xref>. Binary data is base64 encoded according to
section 4 of <xref target="RFC4648"></xref> as specified
in the individual messages.</t>

<t>Clients are configured with a log's base URL, which is one of the log's
parameters. Clients construct URLs for requests by appending suffixes to this
base URL. This structure places some degree of restriction on how log operators
can deploy these services, as noted in <xref target="RFC8820"></xref>. However, operational
experience with version 1 of this protocol has not indicated that these
restrictions are a problem in practice.</t>

<t>Note that JSON objects and URL parameters may contain fields not specified here,
to allow for experimentation. Any fields that are not understood SHOULD
be ignored.</t>

<t>In practice, log servers may include multiple front-end machines. Since it is
impractical to keep these machines in perfect sync, errors may occur that are
caused by skew between the machines. Where such errors are possible, the
front-end will return additional information (as specified below) making it
possible for clients to make progress, if progress is possible. Front-ends MUST
only serve data that is free of gaps (that is, for example, no front-end will
respond with an STH unless it is also able to prove consistency from all log
entries logged within that STH).</t>

<t>For example, when a consistency proof between two STHs is requested, the
front-end reached may not yet be aware of one or both STHs. In the case where it
is unaware of both, it will return the latest STH it is aware of. Where it is
aware of the first but not the second, it will return the latest STH it is aware
of and a consistency proof from the first STH to the returned STH. The case
where it knows the second but not the first should not arise (see the "no gaps"
requirement above).</t>

<t>If the log is unable to process a client's request, it MUST return an HTTP
response code of 4xx/5xx (see <xref target="RFC7231"></xref>), and, in place of the responses
outlined in the subsections below, the body SHOULD be a JSON Problem Details
Object (see <xref target="RFC7807"></xref> Section 3), containing:</t>

<t><list style="hanging">
  <t hangText="type:">
  A URN reference identifying the problem. To facilitate automated response
to errors, this document defines a set of standard tokens for use in the
<spanx style="verb">type</spanx> field, within the URN namespace of: "urn:ietf:params:trans:error:".</t>
  <t hangText="detail:">
  A human-readable string describing the error that prevented the log from
processing the request, ideally with sufficient detail to enable the error to
be rectified.</t>
</list></t>

<t>e.g., In response to a request of
<spanx style="verb">&lt;Base URL&gt;/ct/v2/get-entries?start=100&amp;end=99</spanx>, the log would return a
<spanx style="verb">400 Bad Request</spanx> response code with a body similar to the following:</t>

<figure><artwork><![CDATA[
    {
        "type": "urn:ietf:params:trans:error:endBeforeStart",
        "detail": "'start' cannot be greater than 'end'"
    }
]]></artwork></figure>

<t>Most error types are specific to the type of request and are defined in the
respective subsections below. The one exception is the "malformed" error type,
which indicates that the log server could not parse the client's request because
it did not comply with this document:</t>

<texttable>
      <ttcol align='left'>type</ttcol>
      <ttcol align='left'>detail</ttcol>
      <c>malformed</c>
      <c>The request could not be parsed.</c>
</texttable>

<t>Clients SHOULD treat <spanx style="verb">500 Internal Server Error</spanx> and <spanx style="verb">503 Service Unavailable</spanx>
responses as transient failures and MAY retry the same request without
modification at a later date. Note that as per <xref target="RFC7231"></xref>, in the case of a 503
response the log MAY include a <spanx style="verb">Retry-After:</spanx> header field in order to request a
minimum time for the client to wait before retrying the request.
In the absence of this header field, this document does not specify a minimum.</t>

<t>Clients SHOULD treat any 4xx error as a problem with the request and not
attempt to resubmit without some modification to the request. The full
status code MAY provide additional details.</t>

<t>This document deliberately does not provide more specific guidance
on the use of HTTP status codes.</t>

<section anchor="submit-entry" title="Submit Entry to Log">

<t>POST &lt;Base URL&gt;/ct/v2/submit-entry</t>

<t><list style="hanging">
  <t hangText="Inputs:">
        <list style="hanging">
        <t hangText="submission:">
        The base64 encoded certificate or precertificate.</t>
        <t hangText="type:">
        The <spanx style="verb">VersionedTransType</spanx> integer value that indicates the type of the
<spanx style="verb">submission</spanx>: 1 for <spanx style="verb">x509_entry_v2</spanx>, or 2 for <spanx style="verb">precert_entry_v2</spanx>.</t>
        <t hangText="chain:">
        An array of zero or more JSON strings,
each of which is a base64 encoded CA certificate. The first element
is the certifier of the <spanx style="verb">submission</spanx>; the second certifies the first; etc.
The last element of <spanx style="verb">chain</spanx> (or, if <spanx style="verb">chain</spanx> is an empty array, the
<spanx style="verb">submission</spanx>) is certified by an accepted trust anchor.</t>
      </list>
  </t>
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="sct:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">x509_sct_v2</spanx> or <spanx style="verb">precert_sct_v2</spanx>,
signed by this log, that corresponds to the <spanx style="verb">submission</spanx>.</t>
      </list>

If the submitted entry is immediately appended to (or already exists in) this
log's tree, then the log SHOULD also output:
      <list style="hanging">
        <t hangText="sth:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">signed_tree_head_v2</spanx>, signed by this
log.</t>
        <t hangText="inclusion:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">inclusion_proof_v2</spanx> whose
<spanx style="verb">inclusion_path</spanx> array of Merkle Tree nodes proves the inclusion of the
<spanx style="verb">submission</spanx> in the returned <spanx style="verb">sth</spanx>.</t>
      </list>
  </t>
</list></t>

<t>Error codes:</t>

<texttable>
      <ttcol align='left'>type</ttcol>
      <ttcol align='left'>detail</ttcol>
      <c>badSubmission</c>
      <c><spanx style="verb">submission</spanx> is neither a valid certificate nor a valid precertificate.</c>
      <c>badType</c>
      <c><spanx style="verb">type</spanx> is neither 1 nor 2.</c>
      <c>badChain</c>
      <c>The first element of <spanx style="verb">chain</spanx> is not the certifier of the <spanx style="verb">submission</spanx>, or the second element does not certify the first, etc.</c>
      <c>badCertificate</c>
      <c>One or more certificates in the <spanx style="verb">chain</spanx> are not valid (e.g., not properly encoded).</c>
      <c>unknownAnchor</c>
      <c>The last element of <spanx style="verb">chain</spanx> (or, if <spanx style="verb">chain</spanx> is an empty array, the <spanx style="verb">submission</spanx>) both is not, and is not certified by, an accepted trust anchor.</c>
      <c>shutdown</c>
      <c>The log is no longer accepting submissions.</c>
</texttable>

<t>If the version of <spanx style="verb">sct</spanx> is not v2, then a v2 client may be unable to verify the
signature. It MUST NOT construe this as an error. This is to avoid forcing an
upgrade of compliant v2 clients that do not use the returned SCTs.</t>

<t>If a log detects bad encoding in a chain that otherwise verifies correctly then
the log MUST either log the certificate or return the "bad certificate" error.
If the certificate is logged, an SCT MUST be issued. Logging the certificate is
useful, because monitors (<xref target="monitor"/>) can then detect these encoding errors,
which may be accepted by some TLS clients.</t>

<t>If <spanx style="verb">submission</spanx> is an accepted trust anchor whose certifier is neither an
accepted trust anchor nor the first element of <spanx style="verb">chain</spanx>, then the log MUST return
the "unknown anchor" error. A log is not able to generate an SCT for a
submission if it
does not have access to the issuer's public key.</t>

<t>If the returned <spanx style="verb">sct</spanx> is intended to be provided to TLS clients, then <spanx style="verb">sth</spanx> and
<spanx style="verb">inclusion</spanx> (if returned) SHOULD also be provided to TLS clients. For
example, if
<spanx style="verb">type</spanx> was 2 (indicating <spanx style="verb">precert_sct_v2</spanx>) then all three <spanx style="verb">TransItem</spanx>s could be
embedded in the certificate.</t>

</section>
<section anchor="get-sth" title="Retrieve Latest STH">

<t>GET &lt;Base URL&gt;/ct/v2/get-sth</t>

<t>No inputs.</t>

<t><list style="hanging">
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="sth:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">signed_tree_head_v2</spanx>, signed by this
log, that is no older than the log's MMD.</t>
      </list>
  </t>
</list></t>

</section>
<section anchor="get-sth-consistency" title="Retrieve Merkle Consistency Proof between Two STHs">

<t>GET &lt;Base URL&gt;/ct/v2/get-sth-consistency</t>

<t><list style="hanging">
  <t hangText="Inputs:">
        <list style="hanging">
        <t hangText="first:">
        The tree_size of the older tree, in decimal.</t>
        <t hangText="second:">
        The tree_size of the newer tree, in decimal (optional).</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>Both tree sizes must be from existing v2 STHs. However, because of skew, the
receiving front-end may not know one or both of the existing STHs. If both are
known, then only the <spanx style="verb">consistency</spanx> output is returned. If the first is known
but the second is not (or has been omitted), then the latest known STH is
returned, along with a consistency proof between the first STH and the latest.
If neither are known, then the latest known STH is returned without a
consistency proof.</t>
</list></t>

<t><list style="hanging">
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="consistency:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">consistency_proof_v2</spanx>, whose
<spanx style="verb">tree_size_1</spanx> MUST match the <spanx style="verb">first</spanx> input. If the <spanx style="verb">sth</spanx> output is omitted,
then <spanx style="verb">tree_size_2</spanx> MUST match the <spanx style="verb">second</spanx> input.
If <spanx style="verb">first</spanx> and <spanx style="verb">second</spanx> are equal and correspond to a known STH, the
returned consistency proof MUST be empty (a <spanx style="verb">consistency_path</spanx> array with
zero elements).</t>
        <t hangText="sth:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">signed_tree_head_v2</spanx>, signed by this
log.</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>Note that no signature is required for the <spanx style="verb">consistency</spanx> output as it is used
to verify the consistency between two STHs, which are signed.</t>
</list></t>

<t>Error codes:</t>

<texttable>
      <ttcol align='left'>type</ttcol>
      <ttcol align='left'>detail</ttcol>
      <c>firstUnknown</c>
      <c><spanx style="verb">first</spanx> is before the latest known STH but is not from an existing STH.</c>
      <c>secondUnknown</c>
      <c><spanx style="verb">second</spanx> is before the latest known STH but is not from an existing STH.</c>
      <c>secondBeforeFirst</c>
      <c><spanx style="verb">second</spanx> is smaller than <spanx style="verb">first</spanx>.</c>
</texttable>

<t>See <xref target="verify_consistency"/> for an outline of how to use the <spanx style="verb">consistency</spanx>
output.</t>

</section>
<section anchor="get-proof-by-hash" title="Retrieve Merkle Inclusion Proof from Log by Leaf Hash">

<t>GET &lt;Base URL&gt;/ct/v2/get-proof-by-hash</t>

<t><list style="hanging">
  <t hangText="Inputs:">
        <list style="hanging">
        <t hangText="hash:">
        A base64 encoded v2 leaf hash.</t>
        <t hangText="tree_size:">
        The tree_size of the tree on which to base the proof, in decimal.</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>The <spanx style="verb">hash</spanx> must be calculated as defined in <xref target="tree_leaves"/>. A v2 STH must
exist for the <spanx style="verb">tree_size</spanx>.  Because of skew, the front-end may not know
the requested tree head. In that case, it will return the latest STH it knows, along
with an inclusion proof to that STH. If the front-end knows the requested tree head
then only <spanx style="verb">inclusion</spanx> is returned.</t>
</list></t>

<t><list style="hanging">
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="inclusion:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">inclusion_proof_v2</spanx> whose
<spanx style="verb">inclusion_path</spanx> array of Merkle Tree nodes proves the inclusion of the
certificate (as specified by the <spanx style="verb">hash</spanx> parameter) in the selected STH.</t>
        <t hangText="sth:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">signed_tree_head_v2</spanx>, signed by this
log.</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>Note that no signature is required for the <spanx style="verb">inclusion</spanx> output as it is used to
verify inclusion in the selected STH, which is signed.</t>
</list></t>

<t>Error codes:</t>

<texttable>
      <ttcol align='left'>type</ttcol>
      <ttcol align='left'>detail</ttcol>
      <c>hashUnknown</c>
      <c><spanx style="verb">hash</spanx> is not the hash of a known leaf (may be caused by skew or by a known certificate not yet merged).</c>
      <c>treeSizeUnknown</c>
      <c><spanx style="verb">hash</spanx> is before the latest known STH but is not from an existing STH.</c>
</texttable>

<t>See <xref target="verify_inclusion"/> for an outline of how to use the <spanx style="verb">inclusion</spanx> output.</t>

</section>
<section anchor="get-all-by-hash" title="Retrieve Merkle Inclusion Proof, STH and Consistency Proof by Leaf Hash">

<t>GET &lt;Base URL&gt;/ct/v2/get-all-by-hash</t>

<t><list style="hanging">
  <t hangText="Inputs:">
        <list style="hanging">
        <t hangText="hash:">
        A base64 encoded v2 leaf hash.</t>
        <t hangText="tree_size:">
        The tree_size of the tree on which to base the proofs, in decimal.</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>The <spanx style="verb">hash</spanx> must be calculated as defined in <xref target="tree_leaves"/>. A v2 STH must
exist for the <spanx style="verb">tree_size</spanx>.</t>
</list></t>

<t>Because of skew, the front-end may not know the requested tree head or the requested
hash, which leads to a number of cases:</t>

<texttable>
      <ttcol align='left'>Case</ttcol>
      <ttcol align='left'>Response</ttcol>
      <c>latest STH &lt; requested tree head</c>
      <c>Return latest STH</c>
      <c>latest STH &gt; requested tree head</c>
      <c>Return latest STH and a consistency proof between it and the requested tree head (see <xref target="get-sth-consistency"/>)</c>
      <c>index of requested hash &lt; latest STH</c>
      <c>Return <spanx style="verb">inclusion</spanx></c>
</texttable>

<t>Note that more than one case can be true, in which case the returned data is
their union. It is also possible for none to be true, in which case the
front-end MUST return an empty response.</t>

<t><list style="hanging">
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="inclusion:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">inclusion_proof_v2</spanx> whose
<spanx style="verb">inclusion_path</spanx> array of Merkle Tree nodes proves the inclusion of the
certificate (as specified by the <spanx style="verb">hash</spanx> parameter) in the selected STH.</t>
        <t hangText="sth:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">signed_tree_head_v2</spanx>, signed by this
log.</t>
        <t hangText="consistency:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">consistency_proof_v2</spanx> that proves the
consistency of the requested tree head and the returned STH.</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>Note that no signature is required for the <spanx style="verb">inclusion</spanx> or <spanx style="verb">consistency</spanx>
outputs as they are used to verify inclusion in and consistency of STHs, which
are signed.</t>
</list></t>

<t>Errors are the same as in <xref target="get-proof-by-hash"/>.</t>

<t>See <xref target="verify_inclusion"/> for an outline of how to use the <spanx style="verb">inclusion</spanx> output,
and see <xref target="verify_consistency"/> for an outline of how to use the <spanx style="verb">consistency</spanx>
output.</t>

</section>
<section anchor="get-entries" title="Retrieve Entries and STH from Log">

<t>GET &lt;Base URL&gt;/ct/v2/get-entries</t>

<t><list style="hanging">
  <t hangText="Inputs:">
        <list style="hanging">
        <t hangText="start:">
        0-based index of first entry to retrieve, in decimal.</t>
        <t hangText="end:">
        0-based index of last entry to retrieve, in decimal.</t>
      </list>
  </t>
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="entries:">
        An array of objects, each consisting of

            <list style="hanging">
              <t hangText="log_entry:">
              The base64 encoded <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">x509_entry_v2</spanx> or
<spanx style="verb">precert_entry_v2</spanx> (see <xref target="log_entries"/>).</t>
              <t hangText="submitted_entry:">
              JSON object equivalent to inputs that were submitted to
<spanx style="verb">submit-entry</spanx>, with the addition of the trust anchor to the <spanx style="verb">chain</spanx>
field if the submission did not include it.</t>
              <t hangText="sct:">
              The base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">x509_sct_v2</spanx> or <spanx style="verb">precert_sct_v2</spanx>
corresponding to this log entry.</t>
            </list>
        </t>
        <t hangText="sth:">
        A base64 encoded <spanx style="verb">TransItem</spanx> of type <spanx style="verb">signed_tree_head_v2</spanx>, signed by this
log.</t>
      </list>
  </t>
</list></t>

<t>Note that this message is not signed -- the <spanx style="verb">entries</spanx> data can be verified by
constructing the Merkle Tree Hash corresponding to a retrieved STH. All leaves
MUST be v2. However, a compliant v2 client MUST NOT construe an unrecognized
TransItem type as an error. This means it may be unable to parse some entries,
but note that each client can inspect the entries it does recognize as well as
verify the integrity of the data by treating unrecognized leaves as opaque input
to the tree.</t>

<t>The <spanx style="verb">start</spanx> and <spanx style="verb">end</spanx> parameters SHOULD be within the range 0 &lt;= x &lt; <spanx style="verb">tree_size</spanx>
as returned by <spanx style="verb">get-sth</spanx> in <xref target="get-sth"/>.</t>

<t>The <spanx style="verb">start</spanx> parameter MUST be less than or equal to the <spanx style="verb">end</spanx> parameter.</t>

<t>Each <spanx style="verb">submitted_entry</spanx> output parameter MUST include the trust anchor that the
log used to verify the <spanx style="verb">submission</spanx>, even if that trust anchor was not provided
to <spanx style="verb">submit-entry</spanx> (see <xref target="submit-entry"/>). If the <spanx style="verb">submission</spanx> does not certify
itself, then the first element of <spanx style="verb">chain</spanx> MUST be present and MUST certify the
<spanx style="verb">submission</spanx>.</t>

<t>Log servers MUST honor requests where 0 &lt;= <spanx style="verb">start</spanx> &lt; <spanx style="verb">tree_size</spanx> and <spanx style="verb">end</spanx> &gt;=
<spanx style="verb">tree_size</spanx> by returning a partial response covering only the valid entries in
the specified range. <spanx style="verb">end</spanx> &gt;= <spanx style="verb">tree_size</spanx> could be caused by skew. Note that the
following restriction may also apply:</t>

<t>Logs MAY restrict the number of entries that can be retrieved per <spanx style="verb">get-entries</spanx>
request. If a client requests more than the permitted number of entries, the log
SHALL return the maximum number of entries permissible. These entries SHALL be
sequential beginning with the entry specified by <spanx style="verb">start</spanx>.
Note that limit on the number of entries is not immutable and therefore
the restriction may be changed or lifted at any time and is not listed
with the other Log Parameters in <xref target="log_parameters"/>.</t>

<t>Because of skew, it is possible the log server will not have any entries between
<spanx style="verb">start</spanx> and <spanx style="verb">end</spanx>. In this case it MUST return an empty <spanx style="verb">entries</spanx> array.</t>

<t>In any case, the log server MUST return the latest STH it knows about.</t>

<t>See <xref target="verify_hash"/> for an outline of how to use a complete list of <spanx style="verb">log_entry</spanx>
entries to verify the <spanx style="verb">root_hash</spanx>.</t>

<t>Error codes:</t>

<texttable>
      <ttcol align='left'>type</ttcol>
      <ttcol align='left'>detail</ttcol>
      <c>startUnknown</c>
      <c><spanx style="verb">start</spanx> is greater than the number of entries in the Merkle tree.</c>
      <c>endBeforeStart</c>
      <c><spanx style="verb">start</spanx> cannot be greater than <spanx style="verb">end</spanx>.</c>
</texttable>

</section>
<section anchor="get-anchors" title="Retrieve Accepted Trust Anchors">

<t>GET &lt;Base URL&gt;/ct/v2/get-anchors</t>

<t>No inputs.</t>

<t><list style="hanging">
  <t hangText="Outputs:">
        <list style="hanging">
        <t hangText="certificates:">
        An array of JSON strings, each of which
is a base64 encoded CA certificate that is acceptable to the log.</t>
        <t hangText="max_chain_length:">
        If the server has chosen to limit the length of chains it accepts, this is
the maximum number of certificates in the chain, in decimal. If there is no
limit, this is omitted.</t>
      </list>
  </t>
</list></t>

<t><list style='empty'>
  <t>This data is not signed and the protocol depends on the security guarantees
of TLS to ensure correctness.</t>
</list></t>

</section>
</section>
<section anchor="tls_servers" title="TLS Servers">

<t>CT-using TLS servers MUST use at least one of the mechanisms described below
to present one or more SCTs from one or more logs to each TLS client during full
TLS handshakes, when requested by the client, where each SCT corresponds to the server certificate.
(Of course, a server can only send a TLS extension if the client has
specified it first.)
Servers
SHOULD also present corresponding inclusion proofs and STHs.</t>

<t>A server can provide SCTs using
a TLS 1.3 extension (Section 4.2 of <xref target="RFC8446"></xref>) with type <spanx style="verb">transparency_info</spanx>
(see <xref target="tls_transinfo_extension"/>). This mechanism allows TLS servers to
participate in CT without the cooperation of CAs, unlike the other two
mechanisms. It also allows SCTs and inclusion proofs to be updated on the fly.</t>

<t>The server may also use an Online Certificate Status Protocol (OCSP)
<xref target="RFC6960"></xref> response extension (see <xref target="ocsp_transinfo_extension"/>),
providing the OCSP response as part of the TLS handshake. Providing
a response during a TLS handshake is popularly known as "OCSP stapling."
For TLS
1.3, the information is encoded as an extension in the <spanx style="verb">status_request</spanx>
extension data; see Section 4.4.2.1 of <xref target="RFC8446"></xref>. For TLS 1.2 (<xref target="RFC5246"></xref>), the information
is encoded in the <spanx style="verb">CertificateStatus</spanx> message; see Section 8
of <xref target="RFC6066"></xref>.  Using stapling also
allows SCTs and inclusion proofs to be updated on the fly.</t>

<t>CT information can also be encoded as an extension in the X.509v3 certificate
(see <xref target="cert_transinfo_extension"/>). This
mechanism allows the use of unmodified TLS servers, but the SCTs and inclusion
proofs cannot be updated on the fly. Since the logs from which the SCTs and
inclusion proofs originated won't necessarily be accepted by TLS clients for
the full lifetime of the certificate, there is a risk that TLS clients may
subsequently consider the certificate to be non-compliant and in need of
re-issuance or the use of one of the other two methods for delivering CT
information.</t>

<section anchor="tls-client-authentication" title="TLS Client Authentication">

<t>This specification includes no description of how a TLS server can
use CT for TLS client certificates.
While this may be useful, it is not documented here for the following
reasons:</t>

<t><list style="symbols">
  <t>The greater security exposure is for clients to end up interacting with an
illegitimate server.</t>
  <t>In general, TLS client certificates are not expected to be submitted to
CT logs, particularly those intended for general public use.</t>
</list></t>

<t>A future version could include such information.</t>

</section>
<section anchor="multiple-scts" title="Multiple SCTs">

<t>CT-using TLS servers SHOULD send SCTs from multiple logs, because:</t>

<t><list style="symbols">
  <t>One or more logs may not have become acceptable to all CT-using TLS clients.
Note that client discovery, trust, and distrust of logs is expected to
be handled out-of-band and is out of scope of this document.</t>
  <t>If a CA and a log collude, it is possible to temporarily hide misissuance from
clients. When a TLS client requires SCTs from multiple logs to be provided, it
is more difficult to mount this attack.</t>
  <t>If a log misbehaves or suffers a key compromise, a consequence may be that
clients cease to trust it. Since the time an SCT may be in use can be
considerable (several years is common in current practice when embedded in a
certificate), including SCTs from multiple logs reduces the probability of the
certificate being rejected by TLS clients.</t>
  <t>TLS clients may have policies related to the above risks requiring TLS servers
to present multiple SCTs. For example, at the time of writing, Chromium
<xref target="Chromium.Log.Policy"></xref> requires multiple SCTs to be presented with EV
certificates in order for the EV indicator to be shown.</t>
</list></t>

<t>To select the logs from which to obtain SCTs, a TLS server can, for example,
examine the set of logs popular TLS clients accept and recognize.</t>

</section>
<section anchor="transitemlist-structure" title="TransItemList Structure">

<t>Multiple SCTs, inclusion proofs, and indeed <spanx style="verb">TransItem</spanx> structures of any type,
are combined into a list as follows:</t>

<figure><artwork><![CDATA[
      opaque SerializedTransItem<1..2^16-1>;

      struct {
          SerializedTransItem trans_item_list<1..2^16-1>;
      } TransItemList;
]]></artwork></figure>

<t>Here, <spanx style="verb">SerializedTransItem</spanx> is an opaque byte string that contains the
serialized <spanx style="verb">TransItem</spanx> structure. This encoding ensures that TLS clients can
decode each <spanx style="verb">TransItem</spanx> individually (so, for example, if there is a version
upgrade, out-of-date clients can still parse old <spanx style="verb">TransItem</spanx> structures while
skipping over new <spanx style="verb">TransItem</spanx> structures whose versions they don't understand).</t>

</section>
<section anchor="presenting_transitems" title="Presenting SCTs, inclusions proofs and STHs">

<t>In each <spanx style="verb">TransItemList</spanx> that is sent during a TLS handshake, the TLS
server MUST include a <spanx style="verb">TransItem</spanx> structure of type <spanx style="verb">x509_sct_v2</spanx> or
<spanx style="verb">precert_sct_v2</spanx>.</t>

<t>Presenting inclusion proofs and STHs in the TLS handshake helps to protect the
client's privacy (see <xref target="fetching_inclusion_proofs"/>) and reduces load on log
servers. Therefore, if the TLS server can obtain them, it SHOULD also include
<spanx style="verb">TransItem</spanx>s of type <spanx style="verb">inclusion_proof_v2</spanx> and <spanx style="verb">signed_tree_head_v2</spanx> in the
<spanx style="verb">TransItemList</spanx>.</t>

</section>
<section anchor="tls_transinfo_extension" title="transparency_info TLS Extension">

<t>Provided that a TLS client includes the <spanx style="verb">transparency_info</spanx> extension type in
the ClientHello and the TLS server supports the <spanx style="verb">transparency_info</spanx> extension:</t>

<t><list style="symbols">
  <t>The TLS server MUST verify that the received <spanx style="verb">extension_data</spanx> is empty.</t>
  <t>The TLS server MUST construct a <spanx style="verb">TransItemList</spanx> of relevant <spanx style="verb">TransItem</spanx>s (see
<xref target="presenting_transitems"/>), which SHOULD omit any <spanx style="verb">TransItem</spanx>s that are
already embedded in the server certificate or the stapled OCSP response (see
<xref target="x509v3_transinfo_extension"/>). If the constructed <spanx style="verb">TransItemList</spanx> is not
empty, then the TLS server MUST include the <spanx style="verb">transparency_info</spanx> extension with
the <spanx style="verb">extension_data</spanx> set to this <spanx style="verb">TransItemList</spanx>. If the list is empty
then the server SHOULD omit the <spanx style="verb">extension_data</spanx> element, but MAY send
it with an empty array.</t>
</list></t>

<t>TLS servers MUST only include this extension in the following messages:</t>

<t><list style="symbols">
  <t>the ServerHello message (for TLS 1.2 or earlier).</t>
  <t>the Certificate or CertificateRequest message (for TLS 1.3).</t>
</list></t>

<t>TLS servers MUST NOT process or include this extension when a TLS session is
resumed, since session resumption uses the original session information.</t>

</section>
</section>
<section anchor="certification-authorities" title="Certification Authorities">

<section anchor="x509v3_transinfo_extension" title="Transparency Information X.509v3 Extension">

<t>The Transparency Information X.509v3 extension, which has OID 1.3.101.75 and
SHOULD be non-critical, contains one or more <spanx style="verb">TransItem</spanx> structures in a
<spanx style="verb">TransItemList</spanx>. This extension MAY be included in OCSP responses (see
<xref target="ocsp_transinfo_extension"/>) and certificates (see
<xref target="cert_transinfo_extension"/>). Since RFC5280 requires the <spanx style="verb">extnValue</spanx> field (an
OCTET STRING) of each X.509v3 extension to include the DER encoding of an ASN.1
value, a <spanx style="verb">TransItemList</spanx> MUST NOT be included directly. Instead, it MUST be
wrapped inside an additional OCTET STRING, which is then put into the
<spanx style="verb">extnValue</spanx> field:</t>

<figure><artwork><![CDATA[
    TransparencyInformationSyntax ::= OCTET STRING
]]></artwork></figure>

<t><spanx style="verb">TransparencyInformationSyntax</spanx> contains a <spanx style="verb">TransItemList</spanx>.</t>

<section anchor="ocsp_transinfo_extension" title="OCSP Response Extension">

<t>A certification authority MAY include a Transparency Information X.509v3
extension in the <spanx style="verb">singleExtensions</spanx> of a <spanx style="verb">SingleResponse</spanx> in an OCSP response.
All included SCTs and inclusion proofs MUST be for the certificate identified by
the <spanx style="verb">certID</spanx> of that <spanx style="verb">SingleResponse</spanx>, or for a precertificate that corresponds
to that certificate.</t>

</section>
<section anchor="cert_transinfo_extension" title="Certificate Extension">

<t>A certification authority MAY include a Transparency Information X.509v3
extension in a certificate. All included SCTs and inclusion proofs MUST be for a
precertificate that corresponds to this certificate.</t>

</section>
</section>
<section anchor="tls-feature-x509v3-extension" title="TLS Feature X.509v3 Extension">

<t>A certification authority SHOULD NOT issue any certificate that identifies the
<spanx style="verb">transparency_info</spanx> TLS extension in a TLS feature extension <xref target="RFC7633"></xref>, because
TLS servers are not required to support the <spanx style="verb">transparency_info</spanx> TLS extension in
order to participate in CT (see <xref target="tls_servers"/>).</t>

</section>
</section>
<section anchor="clients" title="Clients">

<t>There are various different functions clients of logs might perform. We describe
here some typical clients and how they should function. Any inconsistency may be
used as evidence that a log has not behaved correctly, and the signatures on the
data structures prevent the log from denying that misbehavior.</t>

<t>All clients need various parameters in order to communicate with logs and verify
their responses. These parameters are described in <xref target="log_parameters"/>, but note
that this document does not describe how the parameters are obtained, which is
implementation-dependent (see, for example, <xref target="Chromium.Policy"></xref>).</t>

<section anchor="tls_clients" title="TLS Client">

<section anchor="receiving_transitems" title="Receiving SCTs and inclusion proofs">

<t>TLS clients receive SCTs and inclusion proofs alongside or in certificates.
CT-using TLS clients MUST implement all of the three mechanisms by which TLS
servers may present SCTs (see <xref target="tls_servers"/>).</t>

<t>TLS clients that support the <spanx style="verb">transparency_info</spanx> TLS extension
(see <xref target="tls_transinfo_extension"/>) SHOULD include it in ClientHello messages,
with empty <spanx style="verb">extension_data</spanx>. If a TLS server includes the <spanx style="verb">transparency_info</spanx>
TLS extension when resuming a TLS session, the TLS client MUST abort the
handshake.</t>

</section>
<section anchor="reconstructing_tbscertificate" title="Reconstructing the TBSCertificate">

<t>Validation of an SCT for a certificate (where the <spanx style="verb">type</spanx> of the <spanx style="verb">TransItem</spanx> is
<spanx style="verb">x509_sct_v2</spanx>) uses the unmodified TBSCertificate component of the certificate.</t>

<t>Before an SCT for a precertificate (where the <spanx style="verb">type</spanx> of the <spanx style="verb">TransItem</spanx> is
<spanx style="verb">precert_sct_v2</spanx>) can be validated, the TBSCertificate component of the
precertificate needs to be reconstructed from the TBSCertificate component of
the certificate as follows:</t>

<t><list style="symbols">
  <t>Remove the Transparency Information extension
(see <xref target="x509v3_transinfo_extension"/>).</t>
  <t>Remove embedded v1 SCTs, identified by OID 1.3.6.1.4.1.11129.2.4.2 (see
section 3.3 of <xref target="RFC6962"></xref>). This allows embedded v1 and v2 SCTs to co-exist in
a certificate (see <xref target="v1_coexistence"/>).</t>
</list></t>

</section>
<section anchor="validating-scts" title="Validating SCTs">

<t>In order to make use of a received SCT, the TLS client MUST first validate it as
follows:</t>

<t><list style="symbols">
  <t>Compute the signature input by constructing a <spanx style="verb">TransItem</spanx> of type
<spanx style="verb">x509_entry_v2</spanx> or <spanx style="verb">precert_entry_v2</spanx>, depending on the SCT's <spanx style="verb">TransItem</spanx>
type. The <spanx style="verb">TimestampedCertificateEntryDataV2</spanx> structure is constructed in the
following manner:
  <list style="symbols">
      <t><spanx style="verb">timestamp</spanx> is copied from the SCT.</t>
      <t><spanx style="verb">tbs_certificate</spanx> is the reconstructed TBSCertificate portion of the server
 certificate, as described in <xref target="reconstructing_tbscertificate"/>.</t>
      <t><spanx style="verb">issuer_key_hash</spanx> is computed as described in <xref target="tree_leaves"/>.</t>
      <t><spanx style="verb">sct_extensions</spanx> is copied from the SCT.</t>
    </list></t>
  <t>Verify the SCT's <spanx style="verb">signature</spanx> against the computed signature input using the
public key of the corresponding log, which is identified by the <spanx style="verb">log_id</spanx>. The
required signature algorithm is one of the log's parameters.</t>
</list></t>

<t>If the TLS client does not have the corresponding log's parameters, it cannot
attempt to validate the SCT. When evaluating compliance (see
<xref target="evaluating_compliance"/>), the TLS client will consider only those SCTs that it
was able to validate.</t>

<t>Note that SCT validation is not a substitute for the normal validation of the
server certificate and its chain.</t>

</section>
<section anchor="fetching_inclusion_proofs" title="Fetching inclusion proofs">

<t>When a TLS client has validated a received SCT but does not yet possess
a corresponding inclusion proof, the TLS client MAY request the inclusion
proof directly from a log using <spanx style="verb">get-proof-by-hash</spanx> (<xref target="get-proof-by-hash"/>) or
<spanx style="verb">get-all-by-hash</spanx> (<xref target="get-all-by-hash"/>).</t>

<t>Note that fetching inclusion proofs directly from a log will disclose to the
log which TLS server the client has been communicating with. This may be
regarded as a significant privacy concern, and so it is preferable for the TLS
server to send the inclusion proofs (see <xref target="presenting_transitems"/>).</t>

</section>
<section anchor="validating_inclusion_proofs" title="Validating inclusion proofs">

<t>When a TLS client has received, or fetched, an inclusion proof (and an STH),
it SHOULD proceed to verifying the inclusion proof to the provided STH.
The TLS client SHOULD also verify consistency between the provided STH
and an STH it knows about.</t>

<t>If the TLS client holds an STH that predates the SCT, it MAY, in the process of
auditing, request a new STH from the log (<xref target="get-sth"/>), then verify it by
requesting a consistency proof (<xref target="get-sth-consistency"/>). Note that if the TLS
client uses <spanx style="verb">get-all-by-hash</spanx>, then it will already have the new STH.</t>

</section>
<section anchor="evaluating_compliance" title="Evaluating compliance">

<t>It is up to a client's local policy to specify the quantity and form of
evidence (SCTs, inclusion proofs or a combination) needed to achieve
compliance and how to handle non-compliance.</t>

<t>A TLS client can only evaluate compliance if it has given the TLS server the
opportunity to send SCTs and inclusion proofs by any of the three mechanisms
that are mandatory to implement for CT-using TLS clients (see
<xref target="receiving_transitems"/>). Therefore, a TLS client MUST NOT evaluate compliance
if it did not include both the <spanx style="verb">transparency_info</spanx> and <spanx style="verb">status_request</spanx> TLS
extensions in the ClientHello.</t>

</section>
</section>
<section anchor="monitor" title="Monitor">

<t>Monitors watch logs to check that they behave correctly, for certificates of
interest, or both. For example, a monitor may be configured to report on all
certificates that apply to a specific domain name when fetching new entries for
consistency validation.</t>

<t>A monitor MUST at least inspect every new entry in every log it watches, and it
MAY also choose to keep copies of entire logs.</t>

<t>To inspect all of the existing entries, the monitor SHOULD follow these steps
once for each log:</t>

<t><list style="numbers">
  <t>Fetch the current STH (<xref target="get-sth"/>).</t>
  <t>Verify the STH signature.</t>
  <t>Fetch all the entries in the tree corresponding to the STH (<xref target="get-entries"/>).</t>
  <t>If applicable, check each entry to see if it's a certificate of interest.</t>
  <t>Confirm that the tree made from the fetched entries produces the same hash as
that in the STH.</t>
</list></t>

<t>To inspect new entries, the monitor SHOULD follow these steps repeatedly for
each log:</t>

<t><list style="numbers">
  <t>Fetch the current STH (<xref target="get-sth"/>). Repeat until the STH changes.
This document does not specify the polling frequency, to allow for
experimentation.</t>
  <t>Verify the STH signature.</t>
  <t>Fetch all the new entries in the tree corresponding to the STH
(<xref target="get-entries"/>). If they remain unavailable for an extended period, then
this should be viewed as misbehavior on the part of the log.</t>
  <t>If applicable, check each entry to see if it's a certificate of interest.</t>
  <t>Either:  <list style="numbers">
      <t>Verify that the updated list of all entries generates a tree with the
same hash as the new STH.</t>
    </list>
Or, if it is not keeping all log entries:  <list style="numbers">
      <t>Fetch a consistency proof for the new STH with the previous STH
(<xref target="get-sth-consistency"/>).</t>
      <t>Verify the consistency proof.</t>
      <t>Verify that the new entries generate the corresponding elements in the
consistency proof.</t>
    </list></t>
  <t>Repeat from step 1.</t>
</list></t>

</section>
<section anchor="auditing" title="Auditing">

<t>Auditing ensures that the current published state of a log is reachable from
previously published states that are known to be good, and that the promises
made by the log in the form of SCTs have been kept. Audits are performed by
monitors or TLS clients.</t>

<t>In particular, there are four log behavior properties that should be checked:</t>

<t><list style="symbols">
  <t>The Maximum Merge Delay (MMD).</t>
  <t>The STH Frequency Count.</t>
  <t>The append-only property.</t>
  <t>The consistency of the log view presented to all query sources.</t>
</list></t>

<t>A benign, conformant log publishes a series of STHs over time, each derived from
the previous STH and the submitted entries incorporated into the log since
publication of the previous STH. This can be proven through auditing of STHs.
SCTs returned to TLS clients can be audited by verifying against the
accompanying certificate, and using Merkle Inclusion Proofs, against the log's
Merkle tree.</t>

<t>The action taken by the auditor if an audit fails is not specified, but note
that in general if audit fails, the auditor is in possession of signed proof of
the log's misbehavior.</t>

<t>A monitor (<xref target="monitor"/>) can audit by verifying the consistency of STHs it
receives, ensure that each entry can be fetched and that the STH is indeed the
result of making a tree from all fetched entries.</t>

<t>A TLS client (<xref target="tls_clients"/>) can audit by verifying an SCT against any STH
dated after the SCT timestamp + the Maximum Merge Delay by requesting a Merkle
inclusion proof (<xref target="get-proof-by-hash"/>). It can also verify that the SCT
corresponds to the server certificate it arrived with (i.e., the log entry is
that certificate, or is a precertificate corresponding to that certificate).</t>

<t>Checking of the consistency of the log view presented to all entities is more
difficult to perform because it requires a way to share log responses among a
set of CT-using entities, and is discussed in <xref target="misbehaving_logs"/>.</t>

</section>
</section>
<section anchor="algorithm-agility" title="Algorithm Agility">

<t>It is not possible for a log to change any of its algorithms part way through
its lifetime:</t>

<t><list style="hanging">
  <t hangText="Signature algorithm:">
  SCT signatures must remain valid so signature algorithms can only be added,
not removed.</t>
  <t hangText="Hash algorithm:">
  A log would have to support the old and new hash algorithms to allow
backwards-compatibility with clients that are not aware of a hash algorithm
change.</t>
</list></t>

<t>Allowing multiple signature or hash algorithms for a log would require that all
data structures support it and would significantly complicate client
implementation, which is why it is not supported by this document.</t>

<t>If it should become necessary to deprecate an algorithm used by a live log, then
the log MUST be frozen as specified in <xref target="log_shutdown"/> and a new log SHOULD be
started. Certificates in the frozen log that have not yet expired and require
new SCTs SHOULD be submitted to the new log and the SCTs from that log used
instead.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>The assignment policy criteria mentioned in this section refer to the policies
outlined in <xref target="RFC8126"></xref>.</t>

<section anchor="additions-to-existing-registries" title="Additions to existing registries">

<t>This sub-section defines additions to existing registries.</t>

<section anchor="new-entry-to-the-tls-extensiontype-registry" title="New Entry to the TLS ExtensionType Registry">

<t>IANA is asked to add the following entry 
to the "TLS ExtensionType Values" registry defined in <xref target="RFC8446"></xref>,
with an assigned Value:</t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Extension Name</ttcol>
      <ttcol align='left'>TLS 1.3</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>TBD</c>
      <c>transparency_info</c>
      <c>CH, CR, CT</c>
      <c>Y</c>
      <c>RFCXXXX</c>
</texttable>

</section>
<section anchor="urn-sub-namespace-for-trans-errors-urnietfparamstranserror" title="URN Sub-namespace for TRANS errors (urn:ietf:params:trans:error)">

<t>IANA is requested to add a new entry in the
"IETF URN Sub-namespace for Registered Protocol Parameter Identifiers"
registry, following the template in <xref target="RFC3553"/>:</t>

<t>Registry name: trans:error</t>

<t>Specification: RFCXXXX</t>

<t>Repository: https://www.iana.org/assignments/trans</t>

<t>Index value: No transformation needed.</t>

</section>
</section>
<section anchor="new-ct-related-registries" title="New CT-Related registries">

<t>IANA is requested to add a new protocol registry, "Public Notary
Transparency", to the list that appears at
https://www.iana.org/assignments/</t>

<t>The rest of this section defines sub-registries to be
created within the new Public Notary Transparency registry.</t>

<section anchor="hash_algorithms" title="Hash Algorithms">

<t>IANA is asked to establish a registry of hash algorithm values, named
"Hash Algorithms", that initially consists of:</t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Hash Algorithm</ttcol>
      <ttcol align='left'>OID</ttcol>
      <ttcol align='left'>Reference / Assignment Policy</ttcol>
      <c>0x00</c>
      <c>SHA-256</c>
      <c>2.16.840.1.101.3.4.2.1</c>
      <c><xref target="RFC6234"></xref></c>
      <c>0x01 - 0xDF</c>
      <c>Unassigned</c>
      <c>&#160;</c>
      <c>Specification Required</c>
      <c>0xE0 - 0xEF</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>Experimental Use</c>
      <c>0xF0 - 0xFF</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>Private Use</c>
</texttable>

<t>The Designated Expert(s) should ensure that the proposed algorithm has a public
specification and is suitable for use as a cryptographic hash algorithm with no
known preimage or collision attacks. These attacks can damage the integrity of
the log.</t>

</section>
<section anchor="signature_algorithms" title="Signature Algorithms">

<t>IANA is asked to establish a registry of signature algorithm values, named
"Signature Algorithms".</t>

<t>The following notes should be added:</t>

<t><list style="symbols">
  <t>This is a subset of the TLS SignatureScheme Registry, limited to those
algorithms that are appropriate for CT. A major advantage of this is
leveraging the expertise of the TLS working group and its Designated
Expert(s).</t>
  <t>The value <spanx style="verb">0x0403</spanx> appears twice. While this may be confusing,
it is okay because the verification
process is the same for both algorithms, and the choice of which to use
when generating a signature is purely internal to the log server.</t>
</list></t>

<t>The registry should initially consist of:</t>

<texttable>
      <ttcol align='left'>SignatureScheme Value</ttcol>
      <ttcol align='left'>Signature Algorithm</ttcol>
      <ttcol align='left'>Reference / Assignment Policy</ttcol>
      <c>0x0000 - 0x0402</c>
      <c>Unassigned</c>
      <c>Expert Review</c>
      <c>ecdsa_secp256r1_sha256(0x0403)</c>
      <c>ECDSA (NIST P-256) with SHA-256</c>
      <c><xref target="FIPS186-4"></xref></c>
      <c>ecdsa_secp256r1_sha256(0x0403)</c>
      <c>Deterministic ECDSA (NIST P-256) with HMAC-SHA256</c>
      <c><xref target="RFC6979"></xref></c>
      <c>0x0404 - 0x0806</c>
      <c>Unassigned</c>
      <c>Expert Review</c>
      <c>ed25519(0x0807)</c>
      <c>Ed25519 (PureEdDSA with the edwards25519 curve)</c>
      <c><xref target="RFC8032"></xref></c>
      <c>0x0808 - 0xFDFF</c>
      <c>Unassigned</c>
      <c>Expert Review</c>
      <c>0xFE00 - 0xFEFF</c>
      <c>Reserved</c>
      <c>Experimental Use</c>
      <c>0xFF00 - 0xFFFF</c>
      <c>Reserved</c>
      <c>Private Use</c>
</texttable>

<t>The Designated Expert(s) should ensure that the proposed algorithm has a public
specification, has a value assigned to it in the TLS SignatureScheme Registry
(that IANA was asked to establish in <xref target="RFC8446"></xref>) and is suitable for use as a
cryptographic signature algorithm.</t>

</section>
<section anchor="versioned_trans_types" title="VersionedTransTypes">

<t>IANA is asked to establish a registry of <spanx style="verb">VersionedTransType</spanx> values, named
"VersionedTransTypes".</t>

<t>The following note should be added:</t>

<t><list style="symbols">
  <t>The 0x0000 value is reserved so that v1 SCTs are distinguishable from v2
SCTs and other <spanx style="verb">TransItem</spanx> structures.</t>
</list></t>

<t>The registry should initially consist of:</t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Type and Version</ttcol>
      <ttcol align='left'>Reference / Assignment Policy</ttcol>
      <c>0x0000</c>
      <c>Reserved</c>
      <c><xref target="RFC6962"></xref></c>
      <c>0x0001</c>
      <c>x509_entry_v2</c>
      <c>RFCXXXX</c>
      <c>0x0002</c>
      <c>precert_entry_v2</c>
      <c>RFCXXXX</c>
      <c>0x0003</c>
      <c>x509_sct_v2</c>
      <c>RFCXXXX</c>
      <c>0x0004</c>
      <c>precert_sct_v2</c>
      <c>RFCXXXX</c>
      <c>0x0005</c>
      <c>signed_tree_head_v2</c>
      <c>RFCXXXX</c>
      <c>0x0006</c>
      <c>consistency_proof_v2</c>
      <c>RFCXXXX</c>
      <c>0x0007</c>
      <c>inclusion_proof_v2</c>
      <c>RFCXXXX</c>
      <c>0x0008 - 0xDFFF</c>
      <c>Unassigned</c>
      <c>Specification Required</c>
      <c>0xE000 - 0xEFFF</c>
      <c>Reserved</c>
      <c>Experimental Use</c>
      <c>0xF000 - 0xFFFF</c>
      <c>Reserved</c>
      <c>Private Use</c>
</texttable>

<t>The Designated Expert(s) should review the public specification to ensure that it is
detailed enough to ensure implementation interoperability.</t>

</section>
<section anchor="log_artifact_extension_registry" title="Log Artifact Extension Registry">

<t>IANA is asked to establish a registry of <spanx style="verb">ExtensionType</spanx> values, named "Log
Artifact Extensions", that initially consists of:</t>

<texttable>
      <ttcol align='left'>ExtensionType</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Use</ttcol>
      <ttcol align='left'>Reference / Assignment Policy</ttcol>
      <c>0x0000 - 0xDFFF</c>
      <c>Unassigned</c>
      <c>n/a</c>
      <c>Specification Required</c>
      <c>0xE000 - 0xEFFF</c>
      <c>Reserved</c>
      <c>n/a</c>
      <c>Experimental Use</c>
      <c>0xF000 - 0xFFFF</c>
      <c>Reserved</c>
      <c>n/a</c>
      <c>Private Use</c>
</texttable>

<t>The "Use" column should contain one or both of the following values:</t>

<t><list style="symbols">
  <t>"SCT", for extensions specified for use in Signed Certificate Timestamps.</t>
  <t>"STH", for extensions specified for use in Signed Tree Heads.</t>
</list></t>

<t>The Designated Expert(s) should review the public specification to ensure that it is
detailed enough to ensure implementation interoperability. They should
also verify that the extension is appropriate to the contexts in which it is
specified to be used (SCT, STH, or both).</t>

</section>
<section anchor="log_id_registry" title="Log IDs Registry">

<t>IANA is asked to establish a registry of Log IDs, named "Log IDs",
that initially consists of:</t>

<texttable>
      <ttcol align='left'>Log ID</ttcol>
      <ttcol align='left'>Log Base URL</ttcol>
      <ttcol align='left'>Log Operator</ttcol>
      <ttcol align='left'>Reference / Assignment Policy</ttcol>
      <c>1.3.101.8192 - 1.3.101.16383</c>
      <c>Unassigned</c>
      <c>Unassigned</c>
      <c>First Come First Served</c>
      <c>1.3.101.80.0 - 1.3.101.80.*</c>
      <c>Unassigned</c>
      <c>Unassigned</c>
      <c>First Come First Served</c>
</texttable>

<t>All OIDs in the range from 1.3.101.8192 to 1.3.101.16383 have been set aside
for Log IDs.
This is a limited resource of 8,192 OIDs, each of which has an encoded length of
4 octets.</t>

<t>The 1.3.101.80 arc has also been set assigned for LogIDs.
This is an unlimited resource, but only
the 128 OIDs from 1.3.101.80.0 to 1.3.101.80.127 have an encoded length of only
4 octets.</t>

<t>Each application for the allocation of a Log ID MUST be accompanied by:</t>

<t><list style="symbols">
  <t>the Log's Base URL (see <xref target="log_parameters"/>).</t>
  <t>the Log Operator's contact details.</t>
</list></t>

<t>IANA is asked to reject any request to update a Log ID or Log Base URL in this
registry, because these fields are immutable (see <xref target="log_parameters"/>).</t>

<t>IANA is asked to accept requests from log operators to update their contact
details in this registry.</t>

<t>Since log operators can choose to not use this registry (see <xref target="log_id"/>), it is
not expected to be a global directory of all logs.</t>

</section>
<section anchor="error-types-registry" title="Error Types Registry">

<t>IANA is requested to create a new registry for errors,
the "Error Types" registry.</t>

<t>Requirements for this registry are Specification Required.</t>

<t>This registry should have the following three fields:</t>

<texttable>
      <ttcol align='left'>Field Name</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>identifier</c>
      <c>string</c>
      <c>RFCXXXX</c>
      <c>meaning</c>
      <c>string</c>
      <c>RFCXXXX</c>
      <c>reference</c>
      <c>string</c>
      <c>RFCXXXX</c>
</texttable>

<t>The initial values are as follows, taken from the text above:</t>

<texttable>
      <ttcol align='left'>Identifier</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>malformed</c>
      <c>The request could not be parsed.</c>
      <c>RFCXXXX</c>
      <c>badSubmission</c>
      <c><spanx style="verb">submission</spanx> is neither a valid certificate nor a valid precertificate</c>
      <c>RFCXXXX</c>
      <c>badType</c>
      <c><spanx style="verb">type</spanx> is neither 1 nor 2</c>
      <c>RFCXXXX</c>
      <c>badChain</c>
      <c>The first element of <spanx style="verb">chain</spanx> is not the certifier of the <spanx style="verb">submission</spanx>, or the second element does not certify the first, etc.</c>
      <c>RFCXXXX</c>
      <c>badCertificate</c>
      <c>One or more certificates in the <spanx style="verb">chain</spanx> are not valid (e.g., not properly encoded)</c>
      <c>RFCXXXX</c>
      <c>unknownAnchor</c>
      <c>The last element of <spanx style="verb">chain</spanx> (or, if <spanx style="verb">chain</spanx> is an empty array, the <spanx style="verb">submission</spanx>) both is not, and is not certified by, an accepted trust anchor</c>
      <c>RFCXXXX</c>
      <c>shutdown</c>
      <c>The log is no longer accepting submissions</c>
      <c>RFCXXXX</c>
      <c>firstUnknown</c>
      <c><spanx style="verb">first</spanx> is before the latest known STH but is not from an existing STH.</c>
      <c>RFCXXXX</c>
      <c>secondUnknown</c>
      <c><spanx style="verb">second</spanx> is before the latest known STH but is not from an existing STH.</c>
      <c>RFCXXXX</c>
      <c>secondBeforeFirst</c>
      <c><spanx style="verb">second</spanx> is smaller than <spanx style="verb">first</spanx>.</c>
      <c>RFCXXXX</c>
      <c>hashUnknown</c>
      <c><spanx style="verb">hash</spanx> is not the hash of a known leaf (may be caused by skew or by a known certificate not yet merged).</c>
      <c>RFCXXXX</c>
      <c>treeSizeUnknown</c>
      <c><spanx style="verb">hash</spanx> is before the latest known STH but is not from an existing STH.</c>
      <c>RFCXXXX</c>
      <c>startUnknown</c>
      <c><spanx style="verb">start</spanx> is greater than the number of entries in the Merkle tree.</c>
      <c>RFCXXXX</c>
      <c>endBeforeStart</c>
      <c><spanx style="verb">start</spanx> cannot be greater than <spanx style="verb">end</spanx>.</c>
      <c>RFCXXXX</c>
</texttable>

</section>
</section>
<section anchor="oid-assignment" title="OID Assignment">

<t>IANA is asked to assign one object identifier from the "SMI
Security for PKIX Module Identifier" registry to identify the
ASN.1 module in <xref target="asn1_module"/> of this document with an assigned
Decimal value.</t>

<texttable>
      <ttcol align='left'>Decimal</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>References</ttcol>
      <c>TBD</c>
      <c>id-mod-public-notary-v2</c>
      <c>RFCXXXX</c>
</texttable>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>With CAs, logs, and servers performing the actions described here, TLS clients
can use logs and signed timestamps to reduce the likelihood that they will
accept misissued certificates. If a server presents a valid signed timestamp for
a certificate, then the client knows that a log has committed to publishing the
certificate. From this, the client knows that monitors acting for the subject of
the certificate have had some time to notice the misissuance and take some
action, such as asking a CA to revoke a misissued certificate. A signed
timestamp does not guarantee this though, since appropriate monitors might not
have checked the logs or the CA might have refused to revoke the certificate.</t>

<t>In addition, if TLS clients will not accept unlogged certificates, then site
owners will have a greater incentive to submit certificates to logs, possibly
with the assistance of their CA, increasing the overall transparency of the
system.</t>

<section anchor="misissued-certificates" title="Misissued Certificates">

<t>Misissued certificates that have not been publicly logged, and thus do not have
a valid SCT, are not considered compliant. Misissued certificates that do have
an SCT from a log will appear in that public log within the Maximum Merge Delay,
assuming the log is operating correctly. Since a log is allowed to serve an STH
of any age up to the MMD, the maximum period of time during which a misissued
certificate can be used without being available for audit is twice the MMD.</t>

</section>
<section anchor="detection-of-misissue" title="Detection of Misissue">

<t>The logs do not themselves detect misissued certificates; they rely instead on
interested parties, such as domain owners, to monitor them and take corrective
action when a misissue is detected.</t>

</section>
<section anchor="misbehaving_logs" title="Misbehaving Logs">

<t>A log can misbehave in several ways. Examples include: failing to incorporate a
certificate with an SCT in the Merkle Tree within the MMD; presenting different,
conflicting views of the Merkle Tree at different times and/or to different
parties; issuing STHs too frequently; mutating the signature of a logged
certificate; and failing to present a chain containing the certifier of a logged
certificate.</t>

<t>Violation of the MMD contract is detected by log clients requesting a Merkle
inclusion proof (<xref target="get-proof-by-hash"/>) for each observed SCT. These checks can
be asynchronous and need only be done once per certificate. However, note that
there may be privacy concerns (see <xref target="fetching_inclusion_proofs"/>).</t>

<t>Violation of the append-only property or the STH issuance rate limit can be
detected by multiple clients comparing their instances of the STHs.
This technique, known as "gossip," is an active area of research and not
defined here.
Proof of misbehavior in such cases would be: a series of STHs that were
issued too closely together, proving violation of the STH issuance rate limit;
or an STH with a root hash that does not match the one calculated from a copy of
the log, proving violation of the append-only property.</t>

<t>Clients that report back SCTs can be tracked or traced if a log
produces multiple STHs or SCTs with the same timestamp and data but different
signatures. Logs SHOULD mitigate this risk by either:</t>

<t><list style="symbols">
  <t>Using deterministic signature schemes, or</t>
  <t>Producing no more than one SCT for each distinct submission and no more than one
STH for each distinct tree_size. Each of these SCTs and STHs can be stored by
the log and served to other clients that submit the same certificate or request
the same STH.</t>
</list></t>

</section>
<section anchor="requiring_multiple_scts" title="Multiple SCTs">

<t>By requiring TLS servers to offer multiple SCTs, each from a different log, TLS
clients reduce the effectiveness of an attack where a CA and a log collude
(see <xref target="multiple-scts"/>).</t>

</section>
<section anchor="leakage-of-dns-information" title="Leakage of DNS Information">

<t>Malicious monitors can use logs to learn about the existence of domain names
that might not otherwise be easy to discover. Some subdomain labels may reveal
information about the service and software for which the subdomain is used,
which in turn might facilitate targeted attacks.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The authors would like to thank Erwann Abelea, Robin Alden, Andrew Ayer, Richard
Barnes, Al Cutter, David Drysdale, Francis Dupont, Adam Eijdenberg, Stephen
Farrell, Daniel Kahn Gillmor, Paul Hadfield, Brad Hill, Jeff Hodges, Paul
Hoffman, Jeffrey Hutzelman, Kat Joyce, Stephen Kent, SM, Alexey Melnikov, Linus
Nordberg, Chris Palmer, Trevor Perrin, Pierre Phaneuf, Eric Rescorla, Rich Salz,
Melinda Shore, Ryan Sleevi, Martin Smith, Carl Wallace and Paul Wouters for
their valuable contributions.</t>

<t>A big thank you to Symantec for kindly donating the OIDs from the 1.3.101 arc
that are used in this document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC3986' target='https://www.rfc-editor.org/info/rfc3986'>
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author fullname='T. Berners-Lee' initials='T.' surname='Berners-Lee'><organization/></author>
<author fullname='R. Fielding' initials='R.' surname='Fielding'><organization/></author>
<author fullname='L. Masinter' initials='L.' surname='Masinter'><organization/></author>
<date month='January' year='2005'/>
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='66'/>
<seriesInfo name='RFC' value='3986'/>
<seriesInfo name='DOI' value='10.17487/RFC3986'/>
</reference>



<reference anchor='RFC4648' target='https://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<date month='October' year='2006'/>
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>



<reference anchor='RFC5246' target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author fullname='T. Dierks' initials='T.' surname='Dierks'><organization/></author>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2008'/>
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC5652' target='https://www.rfc-editor.org/info/rfc5652'>
<front>
<title>Cryptographic Message Syntax (CMS)</title>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='September' year='2009'/>
<abstract><t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='70'/>
<seriesInfo name='RFC' value='5652'/>
<seriesInfo name='DOI' value='10.17487/RFC5652'/>
</reference>



<reference anchor='RFC6066' target='https://www.rfc-editor.org/info/rfc6066'>
<front>
<title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<date month='January' year='2011'/>
<abstract><t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, &quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;.  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6066'/>
<seriesInfo name='DOI' value='10.17487/RFC6066'/>
</reference>



<reference anchor='RFC6234' target='https://www.rfc-editor.org/info/rfc6234'>
<front>
<title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<author fullname='T. Hansen' initials='T.' surname='Hansen'><organization/></author>
<date month='May' year='2011'/>
<abstract><t>Federal Information Processing Standard, FIPS</t></abstract>
</front>
<seriesInfo name='RFC' value='6234'/>
<seriesInfo name='DOI' value='10.17487/RFC6234'/>
</reference>



<reference anchor='RFC6960' target='https://www.rfc-editor.org/info/rfc6960'>
<front>
<title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='M. Myers' initials='M.' surname='Myers'><organization/></author>
<author fullname='R. Ankney' initials='R.' surname='Ankney'><organization/></author>
<author fullname='A. Malpani' initials='A.' surname='Malpani'><organization/></author>
<author fullname='S. Galperin' initials='S.' surname='Galperin'><organization/></author>
<author fullname='C. Adams' initials='C.' surname='Adams'><organization/></author>
<date month='June' year='2013'/>
<abstract><t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents.  This document obsoletes RFCs 2560 and 6277.  It also updates RFC 5912.</t></abstract>
</front>
<seriesInfo name='RFC' value='6960'/>
<seriesInfo name='DOI' value='10.17487/RFC6960'/>
</reference>



<reference anchor='RFC6979' target='https://www.rfc-editor.org/info/rfc6979'>
<front>
<title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
<author fullname='T. Pornin' initials='T.' surname='Pornin'><organization/></author>
<date month='August' year='2013'/>
<abstract><t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t></abstract>
</front>
<seriesInfo name='RFC' value='6979'/>
<seriesInfo name='DOI' value='10.17487/RFC6979'/>
</reference>



<reference anchor='RFC7231' target='https://www.rfc-editor.org/info/rfc7231'>
<front>
<title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
<author fullname='R. Fielding' initials='R.' role='editor' surname='Fielding'><organization/></author>
<author fullname='J. Reschke' initials='J.' role='editor' surname='Reschke'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems.  This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t></abstract>
</front>
<seriesInfo name='RFC' value='7231'/>
<seriesInfo name='DOI' value='10.17487/RFC7231'/>
</reference>



<reference anchor='RFC7633' target='https://www.rfc-editor.org/info/rfc7633'>
<front>
<title>X.509v3 Transport Layer Security (TLS) Feature Extension</title>
<author fullname='P. Hallam-Baker' initials='P.' surname='Hallam-Baker'><organization/></author>
<date month='October' year='2015'/>
<abstract><t>The purpose of the TLS feature extension is to prevent downgrade attacks that are not otherwise prevented by the TLS protocol.  In particular, the TLS feature extension may be used to mandate support for revocation checking features in the TLS protocol such as Online Certificate Status Protocol (OCSP) stapling.  Informing clients that an OCSP status response will always be stapled permits an immediate failure in the case that the response is not stapled.  This in turn prevents a denial-of-service attack that might otherwise be possible.</t></abstract>
</front>
<seriesInfo name='RFC' value='7633'/>
<seriesInfo name='DOI' value='10.17487/RFC7633'/>
</reference>



<reference anchor='RFC7807' target='https://www.rfc-editor.org/info/rfc7807'>
<front>
<title>Problem Details for HTTP APIs</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='E. Wilde' initials='E.' surname='Wilde'><organization/></author>
<date month='March' year='2016'/>
<abstract><t>This document defines a &quot;problem detail&quot; as a way to carry machine- readable details of errors in a HTTP response to avoid the need to define new error response formats for HTTP APIs.</t></abstract>
</front>
<seriesInfo name='RFC' value='7807'/>
<seriesInfo name='DOI' value='10.17487/RFC7807'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8259' target='https://www.rfc-editor.org/info/rfc8259'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='STD' value='90'/>
<seriesInfo name='RFC' value='8259'/>
<seriesInfo name='DOI' value='10.17487/RFC8259'/>
</reference>



<reference anchor='RFC8391' target='https://www.rfc-editor.org/info/rfc8391'>
<front>
<title>XMSS: eXtended Merkle Signature Scheme</title>
<author fullname='A. Huelsing' initials='A.' surname='Huelsing'><organization/></author>
<author fullname='D. Butin' initials='D.' surname='Butin'><organization/></author>
<author fullname='S. Gazdag' initials='S.' surname='Gazdag'><organization/></author>
<author fullname='J. Rijneveld' initials='J.' surname='Rijneveld'><organization/></author>
<author fullname='A. Mohaisen' initials='A.' surname='Mohaisen'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system that is based on existing descriptions in scientific literature.  This note specifies Winternitz One-Time Signature Plus (WOTS+), a one-time signature scheme; XMSS, a single-tree scheme; and XMSS^MT, a multi-tree variant of XMSS.  Both XMSS and XMSS^MT use WOTS+ as a main building block. XMSS provides cryptographic digital signatures without relying on the conjectured hardness of mathematical problems.  Instead, it is proven that it only relies on the properties of cryptographic hash functions.  XMSS provides strong security guarantees and is even secure when the collision resistance of the underlying hash function is broken.  It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far withstand known attacks using quantum computers.</t></abstract>
</front>
<seriesInfo name='RFC' value='8391'/>
<seriesInfo name='DOI' value='10.17487/RFC8391'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>


<reference anchor="HTML401" target="http://www.w3.org/TR/1999/REC-html401-19991224">
  <front>
    <title>HTML 4.01 Specification</title>
    <author initials="D." surname="Raggett" fullname="David Raggett">
      <organization></organization>
    </author>
    <author initials="A." surname="Le Hors" fullname="Arnaud Le Hors">
      <organization></organization>
    </author>
    <author initials="I." surname="Jacobs" fullname="Ian Jacobs">
      <organization></organization>
    </author>
    <date year="1999" month="December" day="24"/>
  </front>
  <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-html401-19991224"/>
</reference>
<reference anchor="FIPS186-4" target="http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf">
  <front>
    <title>FIPS PUB 186-4</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2013" month="July" day="01"/>
  </front>
</reference>
<reference anchor="UNIXTIME" target="http://pubs.opengroup.org/onlinepubs/9699919799.2016edition/basedefs/V1_chap04.html#tag_04_16">
  <front>
    <title>The Open Group Base Specifications Issue 7 IEEE Std 1003.1-2008, 2016 Edition</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="X690" >
  <front>
    <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2015" month="November"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
</reference>




<reference anchor='RFC3553' target='https://www.rfc-editor.org/info/rfc3553'>
<front>
<title>An IETF URN Sub-namespace for Registered Protocol Parameters</title>
<author fullname='M. Mealling' initials='M.' surname='Mealling'><organization/></author>
<author fullname='L. Masinter' initials='L.' surname='Masinter'><organization/></author>
<author fullname='T. Hardie' initials='T.' surname='Hardie'><organization/></author>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<date month='June' year='2003'/>
<abstract><t>This document describes a new sub-delegation for the 'ietf' URN namespace for registered protocol items.  The 'ietf' URN namespace is defined in RFC 2648 as a root for persistent URIs that refer to IETF- defined resources.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='73'/>
<seriesInfo name='RFC' value='3553'/>
<seriesInfo name='DOI' value='10.17487/RFC3553'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC6962' target='https://www.rfc-editor.org/info/rfc6962'>
<front>
<title>Certificate Transparency</title>
<author fullname='B. Laurie' initials='B.' surname='Laurie'><organization/></author>
<author fullname='A. Langley' initials='A.' surname='Langley'><organization/></author>
<author fullname='E. Kasper' initials='E.' surname='Kasper'><organization/></author>
<date month='June' year='2013'/>
<abstract><t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves.  The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t><t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t></abstract>
</front>
<seriesInfo name='RFC' value='6962'/>
<seriesInfo name='DOI' value='10.17487/RFC6962'/>
</reference>



<reference anchor='RFC8126' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>



<reference anchor='RFC8820' target='https://www.rfc-editor.org/info/rfc8820'>
<front>
<title>URI Design and Ownership</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>Section 1.1.1 of RFC 3986 defines URI syntax as &quot;a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme.&quot;  In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t><t>This document provides guidance on the specification of URI substructure in standards.</t><t>This document obsoletes RFC 7320 and updates RFC 3986.</t></abstract>
</front>
<seriesInfo name='BCP' value='190'/>
<seriesInfo name='RFC' value='8820'/>
<seriesInfo name='DOI' value='10.17487/RFC8820'/>
</reference>


<reference anchor="CrosbyWallach" target="http://static.usenix.org/event/sec09/tech/full_papers/crosby.pdf">
  <front>
    <title>Efficient Data Structures for Tamper-Evident Logging</title>
    <author initials="S." surname="Crosby" fullname="Scott A. Crosby">
      <organization></organization>
    </author>
    <author initials="D." surname="Wallach" fullname="Dan S. Wallach">
      <organization></organization>
    </author>
    <date year="2009" month="August"/>
  </front>
  <seriesInfo name="Proceedings of the 18th USENIX Security Symposium," value="Montreal"/>
</reference>
<reference anchor="Chromium.Policy" target="http://www.chromium.org/Home/chromium-security/certificate-transparency">
  <front>
    <title>Chromium Certificate Transparency</title>
    <author >
      <organization>The Chromium Projects</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="JSON.Metadata" target="https://www.gstatic.com/ct/log_list/log_list_schema.json">
  <front>
    <title>Chromium Log Metadata JSON Schema</title>
    <author >
      <organization>The Chromium Projects</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Chromium.Log.Policy" target="http://www.chromium.org/Home/chromium-security/certificate-transparency/log-policy">
  <front>
    <title>Chromium Certificate Transparency Log Policy</title>
    <author >
      <organization>The Chromium Projects</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="CABBR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.7.3.pdf">
  <front>
    <title>Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2020"/>
  </front>
  <format type="PDF" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.7.3.pdf"/>
</reference>


    </references>


<section anchor="v1_coexistence" title="Supporting v1 and v2 simultaneously (Informative)">

<t>Certificate Transparency logs have to be either v1 (conforming to <xref target="RFC6962"></xref>) or
v2 (conforming to this document), as the data structures are incompatible and so
a v2 log could not issue a valid v1 SCT.</t>

<t>CT clients, however, can support v1 and v2 SCTs, for the same certificate,
simultaneously, as v1 SCTs are delivered in different TLS, X.509 and OCSP
extensions than v2 SCTs.</t>

<t>v1 and v2 SCTs for X.509 certificates can be validated independently. For
precertificates, v2 SCTs should be embedded in the TBSCertificate before
submission of the TBSCertificate (inside a v1 precertificate, as described in
Section 3.1. of <xref target="RFC6962"></xref>) to a v1 log so that TLS clients conforming to
<xref target="RFC6962"></xref> but not this document are oblivious to the embedded v2 SCTs. An issuer
can follow these steps to produce an X.509 certificate with embedded v1 and v2
SCTs:</t>

<t><list style="symbols">
  <t>Create a CMS precertificate as described in <xref target="precertificates"/> and submit it
to v2 logs.</t>
  <t>Embed the obtained v2 SCTs in the TBSCertificate, as described in
<xref target="cert_transinfo_extension"/>.</t>
  <t>Use that TBSCertificate to create a v1 precertificate, as described in
Section 3.1. of <xref target="RFC6962"></xref> and submit it to v1 logs.</t>
  <t>Embed the v1 SCTs in the TBSCertificate, as described in Section 3.3 of
<xref target="RFC6962"></xref>.</t>
  <t>Sign that TBSCertificate (which now contains v1 and v2 SCTs) to issue the
final X.509 certificate.</t>
</list></t>

</section>
<section anchor="asn1_module" title="An ASN.1 Module (Informative)">

<t>The following ASN.1 module may be useful to implementors.</t>

<figure><artwork><![CDATA[
CertificateTransparencyV2Module-2021
 -- { OID Needed, but no point in using a short one }
DEFINITIONS IMPLICIT TAGS ::= BEGIN

-- EXPORTS ALL --

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009 -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010  -- RFC 6268
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }

  TBSCertificate
  FROM PKIX1Explicit-2009 -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-explicit-02(51) }
;

--
-- Section 3.2.  Precertificates
--

ct-tbsCertificate CONTENT-TYPE ::= {
  TYPE TBSCertificate
  IDENTIFIED BY id-ct-tbsCertificate }

id-ct-tbsCertificate OBJECT IDENTIFIER ::= { 1 3 101 78 }

--
-- Section 7.1.  Transparency Information X.509v3 Extension
--

ext-transparencyInfo EXTENSION ::= {
   SYNTAX TransparencyInformationSyntax
   IDENTIFIED BY id-ce-transparencyInfo
   CRITICALITY { FALSE } }

id-ce-transparencyInfo OBJECT IDENTIFIER ::= { 1 3 101 75 }

TransparencyInformationSyntax ::= OCTET STRING

--
-- Section 7.1.1.  OCSP Response Extension
--

ext-ocsp-transparencyInfo EXTENSION ::= {
   SYNTAX TransparencyInformationSyntax
   IDENTIFIED BY id-pkix-ocsp-transparencyInfo
   CRITICALITY { FALSE } }

id-pkix-ocsp-transparencyInfo OBJECT IDENTIFIER ::=
   id-ce-transparencyInfo

--
-- Section 8.1.2.  Reconstructing the TBSCertificate
--

ext-embeddedSCT-CTv1 EXTENSION ::= {
   SYNTAX SignedCertificateTimestampList
   IDENTIFIED BY id-ce-embeddedSCT-CTv1
   CRITICALITY { FALSE } }

id-ce-embeddedSCT-CTv1 OBJECT IDENTIFIER ::= {
   1 3 6 1 4 1 11129 2 4 2 }

SignedCertificateTimestampList ::= OCTET STRING

END

]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

