<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-lamps-x509-pq-commit-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQCHC">X.509 Extensions for PQC or Composite Certificate Hosting Continuity</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-lamps-x509-pq-commit-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <postal>
          <street>7 HaPsagot St.</street>
          <city>Petah Tikva</city>
          <country>Israel</country>
        </postal>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="13"/>
    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 82?>

<t>This document specifies a new X.509 certificate extension, Post-Quantum or Composite Hosting Continuity (PQCHC), which enables a certificate subject to signal a intent to continue serving PQC or composite certificates for a defined continuity period after certificate expiration. This extension helps relying parties detect downgrade and man-in-the-middle (MitM) attacks during transition phases, where a cryptographically relevant quantum computer (CRQC) would make traditional certificates insecure.</t>
    </abstract>
  </front>
  <middle>
    <?line 86?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to post-quantum cryptography (PQC) will not happen
instantly. During the transition, servers are expected to host both
traditional and PQC or composite certificates. This dual-hosting
strategy ensures that services remain reachable by legacy clients that
do not yet support PQC while also providing PQ or PQ/T authentication
to updated clients. The decision to continue offering traditional
certificates often depends on the size of the installed legacy base,
the larger the base, the stronger the incentive to maintain
traditional certificate support for accessibility. Relevant work on
PQC certificates includes <xref target="I-D.ietf-lamps-dilithium-certificates"/>
for ML-DSA and <xref target="I-D.ietf-lamps-x509-slhdsa"/> for SLH-DSA and
<xref target="I-D.ietf-lamps-pq-composite-sigs"/> for composite certificates.</t>
      <t>However, the continued use of traditional certificates becomes
untenable once a cryptographically relevant quantum computer (CRQC) is
known to exist. A publicly available CRQC would render classical
public-key algorithms insecure, forcing server operators to revoke
traditional certificates immediately, even if this disrupts access for
legacy clients. In practice, though, the availability of a CRQC may
not be disclosed. Like a zero-day vulnerability, an adversary could
secretly use a CRQC to compromise traditional certificates without
alerting the wider ecosystem. In such a scenario, an attacker could
suppress PQC or composite certificates and present only traditional
ones to targeted clients, enabling an active MitM attack and giving the
attacker full control over the encrypted session. Relying parties need a
way to detect when a server that claims to support PQC or composite
certificates suddenly offers only traditional credentials.</t>
      <t>This document specifies a new X.509 certificate extension,
Post-Quantum/Composite Hosting Continuity (PQCHC), which enables a
certificate subject and its Certification Authority (CA) to assert an
intent to continue serving PQC or composite credentials for a
defined period beyond the nominal expiration of a certificate. This
extension provides an operational signal that helps relying parties
identify inconsistencies, for example, when a PQC-capable server
unexpectedly stops advertising PQC or composite certificates and to take
appropriate action to mitigate downgrade attacks.</t>
      <t>The PQCHC extension is protocol-agnostic and applies to any PKI-based
authentication context where a subject wishes to indicate continued
availability of PQC or composite credentials to relying parties.</t>
      <t>The PQCHC extension does not change certificate validation semantics
and does not extend a certificate's validity period. Instead, it
provides an informational assurance of server behavior to help relying
parties make security decisions during the transition to PQC.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="x509-certificate-extension">
      <name>X.509 Certificate Extension</name>
      <t>This section specifies the syntax and semantics of the PQC or composite
Hosting Continuity (PQCHC) extension for X.509 public key
certificates. This extension provides an informational assertion, made
by the certificate subject, regarding the continued availability of pure PQC or
composite credentials beyond the expiration date of the certificate
that contains the extension.</t>
      <section anchor="extension-overview">
        <name>Extension Overview</name>
        <t>The PQCHC extension is an optional, non-critical X.509 certificate
extension. When present, it indicates that the subject intends to
continue deploying and presenting valid PQC or composite certificates
both during the certificate’s validity period and for the declared
"continuityPeriod" after the certificate’s "notAfter" date.
This extension does not extend the certificate’s validity period and
does not modify path validation procedures as defined in <xref target="RFC5280"/>.</t>
        <t>The extension allows relying parties to detect inconsistencies during
the PQC migration phase. For example, if a server previously declared
an intent to keep its PQC certificate available for 12 months after
expiry but suddenly presents only a traditional certificate, a relying
party can infer potential misbehavior or active suppression of PQC
credentials.</t>
      </section>
      <section anchor="pqchc-ext">
        <name>PQCHC Certificate Extension Definition</name>
        <t>The PQCHC certificate extension <bcp14>MAY</bcp14> be included in public key
certificates <xref target="RFC5280"/>. The PQCHC certificate extension <bcp14>MUST</bcp14> be
identified by the following object identifier (OID):</t>
        <sourcecode type="asn.1"><![CDATA[
id-pe-pqchc OBJECT IDENTIFIER ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-pe(1) TBD2
}
]]></sourcecode>
        <t>The extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <sourcecode type="asn.1"><![CDATA[
PQCHC ::= SEQUENCE {
continuityPeriod INTEGER (0..MAX),
policyURI IA5String OPTIONAL
}
]]></sourcecode>
        <t>The extension value is an ASN.1 SEQUENCE containing:</t>
        <ul spacing="compact">
          <li>
            <t>continuityPeriod : an INTEGER (measured in days) indicating the number
of days after the certificate’s "notAfter" date that the subject intends
to continue presenting valid PQC/composite certificates. A value of zero explicitly
indicates that no intent exists beyond the certificate’s expiry.</t>
          </li>
          <li>
            <t>policyURI (<bcp14>OPTIONAL</bcp14>): an IA5String containing a URI where the operator publishes additional
information related to PQC deployment, such as migration information.</t>
          </li>
        </ul>
        <t>The extension <bcp14>MUST</bcp14> be marked non-critical so that relying parties that
do not understand it will ignore it, consistent with <xref target="RFC5280"/>
guidance for informational extensions.</t>
      </section>
      <section anchor="certificate-extension-processing">
        <name>Certificate Extension Processing</name>
        <t>When this extension is present:</t>
        <ul spacing="compact">
          <li>
            <t>The certificate subject asserts that the subject’s server(s) will continue
deploying and presenting valid PQC or composite
certificates for at least the indicated continuity period after this
certificate’s expiration.</t>
          </li>
          <li>
            <t>The extension is a CA-signed declaration of the subject's operational intent
and does not create a contractual service-level agreement between the subject
and any relying party. Relying parties <bcp14>MAY</bcp14> use the indicated "continuityPeriod" to
trigger local policy decisions, for example, by monitoring the revocation status
of the declared PQC or composite certificate. If, during the stated period, the
PQC or composite certificate remains unrevoked but is not observed in use, this
may indicate a downgrade and MitM attack.</t>
          </li>
        </ul>
        <t>The extension does not imply that the CA will automatically issue new certificates, nor does it extend the cryptographic validity of an expired certificate. Rather, it signals the server operator's operational intent to maintain PQC or composite credentials in parallel with traditional credentials for the indicated transition period.</t>
        <t>After successful certificate path validation <xref target="RFC5280"/>, a relying party that observes a certificate containing the PQCHC extension can cache the following information:</t>
        <ul spacing="compact">
          <li>
            <t>the server identity (as indicated in the certificate’s SubjectAltName),</t>
          </li>
          <li>
            <t>the PQC or composite algorithm identifier (e.g., an OID such as id-ml-dsa-44 <xref target="I-D.ietf-lamps-dilithium-certificates"/>) associated with the end-entity certificate,</t>
          </li>
          <li>
            <t>the remaining lifetime of the certificate at the time of observation (i.e., the time between observation and the certificate’s "notAfter" date).</t>
          </li>
        </ul>
        <t>The effective continuity window is the sum of the remaining lifetime and the "continuityPeriod". During this window, the relying party can expect the server to present certificates for the same subjectAltName that use the cached PQC or composite algorithm. If, within the effective continuity window, a relying party observes only a traditional certificate while the cached PQC/composite certificate remains unrevoked, the relying party <bcp14>SHOULD</bcp14> treat the behavior as suspicious and terminate the connection. The relying party <bcp14>MAY</bcp14> apply local downgrade-detection policy, which can range from logging or raising an alert, to attempting an alternate network path.</t>
        <t>If the operator changes from one PQC algorithm to another, the cached algorithm identifier will not match. In this case, the relying party <bcp14>MUST</bcp14> start a new continuity period. This also helps detect algorithm upgrades or downgrades (e.g., from ML-DSA-44 to ML-DSA-87).</t>
        <t>Note: PQCHC may also apply to PQC-to-PQC transitions. For example, an operator might switch from ML-DSA to SLH-DSA in response to deployment guidance. The security implications of treating PQC-to-PQC changes as continuity events remain an open question and require further analysis as NIST’s standardization process progresses.</t>
      </section>
    </section>
    <section anchor="applicability-and-deployment-considerations">
      <name>Applicability and Deployment Considerations</name>
      <t>PQCHC is an informational mechanism and not a cryptographic guarantee.
It must be combined with traditional mechanisms such as revocation checking.
Its effectiveness depends on both correct configuration by servers
and correct interpretation by relying parties.</t>
      <t>PQCHC can also appear in certificates used for CRL signing or OCSP response signing to assert that any successor certificate for these roles will use a PQC or composite algorithm. If, within the declared continuity period, a new CRL signing or OCSP responder certificate is issued using only a traditional algorithm, relying parties can interpret this as a potential downgrade.</t>
      <t>PQCHC cannot detect all failure modes. In particular, if a server silently ceases to present PQC or composite certificates without revoking them, relying parties will continue to observe only traditional certificates and have no authoritative indication whether the change was intentional or the result of an attack. In such cases PQCHC can only highlight the inconsistency.</t>
      <t>Operators should choose "continuityPeriod" values that balance the detection benefit against operational flexibility. A "continuityPeriod" that is too short increases the window in which an attacker can cause an undetected downgrade; a "continuityPeriod" that is overly long may unduly constrain the operator's
ability to phase out an algorithm in response to new cryptanalytic evidence.</t>
    </section>
    <section anchor="sec-priv-cons">
      <name>Security Considerations</name>
      <section anchor="certificate-caching-versus-pqchc">
        <name>Certificate Caching Versus PQCHC</name>
        <t>This section compares PQCHC to relying solely on client-side caching of previously observed PQC certificates and describes how PQCHC mitigates downgrade attacks.</t>
        <t>A relying party could, in principle, remember that it previously observed a PQC or composite certificate and enforce that expectation in subsequent connections. However, such caching is limited by certificate expiration: once the cached certificate passes its "notAfter" date, the relying party can no longer rely on it for validation, and any enforced expectation is effectively lost. An attacker who can suppress PQC or composite certificates at that moment could cause a downgrade to traditional certificates without detection.</t>
        <t>The PQCHC extension mitigates this limitation by providing a CA-signed assertion that the subject intends to continue deploying valid PQC or composite certificates for the configured continuityPeriod beyond the certificate’s expiration. Because this assertion is signed by the issuing CA and carried in the certificate, it provides a durable, authenticated basis for relying parties to detect inconsistencies that simple client-side caching cannot address.</t>
      </section>
      <section anchor="downgrade-attack-detection">
        <name>Downgrade attack detection</name>
        <t>The PQCHC certificate extension provides a signal analogous to HTTP
Strict Transport Security (HSTS) mechanism. Once a relying party has
successfully observed a server presenting a PQC or composite certificate
containing the PQCHC extension, it can "pin" the expectation that the
server will continue to offer PQC or composite credentials until the date
indicated by the extension.</t>
        <t>This mechanism helps relying parties detect inconsistent server behavior:</t>
        <ul spacing="compact">
          <li>
            <t>If a PQC or composite certificate carrying PQCHC is expected to remain
valid until a stated date but is revoked early, the change can be
interpreted as a legitimate operational decision by the server
operator.</t>
          </li>
          <li>
            <t>If the certificate remains unrevoked yet is not observed by clients
in subsequent connections, this anomaly may indicate an active
downgrade attack in which a MitM suppresses the PQC or composite
certificate and presents only traditional credentials.</t>
          </li>
        </ul>
      </section>
      <section anchor="bootstrap-limitation">
        <name>Bootstrap limitation</name>
        <t>Like HSTS mechanism, the PQCHC extension cannot provide protection on
the very first connection. If an attacker successfully downgrades that
initial handshake so the client never sees a PQC or composite certificate
with PQCHC, the client will not learn the expected behavior and gains
no additional assurance from this extension.</t>
      </section>
      <section anchor="revocation-check">
        <name>Revocation check</name>
        <t>Because an active MitM can block PQC or composite certificates, relying
parties cannot confirm server behavior solely by observing TLS
handshakes. Certificate revocation remains the most reliable mechanism
for determining when a server has intentionally stopped using a
PQC or composite certificate.</t>
        <t>Revocation can be signaled through CRLs published by CAs, OCSP, Browser
curated revocation lists (e.g., CRLSet), or by relying on short-lived
certificates that naturally expire quickly. During the transition to PQC,
revocation information must remain verifiable by both legacy and upgraded
clients. This requires that CRLs and OCSP responses be signed using both
a traditional algorithm (e.g., RSA or ECDSA) for compatibility with legacy
clients, and a PQC or composite algorithm for protection against CRQC
adversaries. Legacy clients will continue to validate the traditional
signature, while PQ-aware clients <bcp14>MUST</bcp14> verify the PQC or composite
signature to ensure that revocation signaling itself cannot be forged.</t>
        <t>Curated browser/OS revocation lists can provide emergency coverage but
generally do not cover all domains, limiting their completeness. OCSP
stapling is also insufficient in this setting, since although an OCSP
response itself provides freshness, stapling relies on the server to
deliver that response and cannot guarantee that PQC certificates are
included when a CRQC-capable adversary acts as a MitM and suppresses them.</t>
        <t>The PQCHC extension provides an informational signal that can support
policy decisions, monitoring, and detection of possible
downgrades. However, it is not a cryptographic proof of server
behavior, and relying parties must continue to perform revocation
checks to verify certificate validity. When inconsistencies are
detected, relying parties may apply fallback mechanisms such as
attempting connection through a different network interface or a VPN
tunnel to help distinguish between genuine server changes and MitM
downgrade attack.</t>
        <t>A PQC certificate may be revoked for legitimate reasons such as key
compromise, operational error, or migration to a new CA.
An operator using the PQCHC facility <bcp14>SHOULD</bcp14> obtain and serve a new PQC
certificate for the remainder of the declared continuity period. This enables
relying parties to continue to observe PQC
credentials without requiring real-time revocation checking to
distinguish legitimate operator actions from active downgrade attacks.
In addition, this simplifies PQCHC by focusing on continuity of
PQC credential availability rather than revocation mechanisms.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Relying parties need to perform certificate revocation checks to
determine whether the PQC or composite certificate has been intentionally
withdrawn by the server. Revocation mechanisms such as Online
Certificate Status Protocol (OCSP) queries to the CA can expose which
servers a client is contacting, leading to privacy leaks. To mitigate
this, revocation checking can be performed using privacy-preserving
techniques such as Oblivious HTTP (OHAI) <xref target="RFC9458"/>, where queries
are relayed through intermediaries in a way that hides the client
identity from the CA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>For the certificate extension in <xref target="pqchc-ext"/>, IANA is requested to
assign an object identifier (OID) for the extension (TBD2) with a
Description of "id-pe-pqchc". The OID for the extension should be
allocated in the "SMI Security for PKIX Certificate Extension"
registry (1.3.6.1.5.5.7.1).</t>
      <t>For the ASN.1 module in <xref target="pqchc-ansi"/> , IANA is requested to
assign an object identifier (OID) for the module identifier (TBD1)
with a Description of "id-mod-pqchc". The OID for the module should be
allocated in the "SMI Security for PKIX Module Identifier" registry
(1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Mike Ounsworth for the discussion, review and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="X680" target="https://www.itu.int/rec/T-REC-X.680">
        <front>
          <title>Information Technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.680"/>
        <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
      </reference>
      <reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
        <front>
          <title>Information Technology -- Abstract Syntax Notation One (ASN.1): ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.690"/>
        <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-dilithium-certificates">
        <front>
          <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
          <author fullname="Jake Massimo" initials="J." surname="Massimo">
            <organization>AWS</organization>
          </author>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="30" month="September" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-x509-slhdsa">
        <front>
          <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
          <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
            <organization>BSI</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
            <organization>genua GmbH</organization>
          </author>
          <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
            <organization>CryptoNext Security</organization>
          </author>
          <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
            <organization>BSI</organization>
          </author>
          <date day="30" month="June" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>Bundesdruckerei GmbH</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <date day="10" month="October" year="2025"/>
          <abstract>
            <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet
   regulatory guidelines.  Composite ML-DSA is applicable in
   applications that uses X.509 or PKIX data structures that accept ML-
   DSA, but where the operator wants extra protection against breaks or
   catastrophic bugs in ML-DSA, and where EUF-CMA-level security is
   acceptable.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-12"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC9458">
        <front>
          <title>Oblivious HTTP</title>
          <author fullname="M. Thomson" initials="M." surname="Thomson"/>
          <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
          <date month="January" year="2024"/>
          <abstract>
            <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9458"/>
        <seriesInfo name="DOI" value="10.17487/RFC9458"/>
      </reference>
    </references>
    <?line 383?>

<section anchor="pqchc-ansi">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X680"/> and <xref target="X690"/>.</t>
      <sourcecode markers="true"><![CDATA[
PQCHC-Module
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pqchc (TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- PKIX OID base
id-pkix OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) }

-- Module / extension arcs
id-mod OBJECT IDENTIFIER ::= { id-pkix 0 }
id-pe  OBJECT IDENTIFIER ::= { id-pkix 1 }

-- IANA: assign values for the following OIDs
id-mod-pqchc OBJECT IDENTIFIER ::= { id-mod TBD1 }   -- module identifier
id-pe-pqchc  OBJECT IDENTIFIER ::= { id-pe  TBD2 }   -- certificate extension OID

-- PQCHC extension ASN.1 syntax
PQCHC ::= SEQUENCE {
    continuityPeriod INTEGER (0..MAX),  -- number of days after certificate notAfter
                                        -- a value of 0 indicates no post-expiry intent
    policyURI         IA5String OPTIONAL
}

END
]]></sourcecode>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
