<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc5019bis-08" category="std" consensus="true" submissionType="IETF" obsoletes="5019" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Lightweight OCSP Profile Update">Updates to Lightweight OCSP Profile for High Volume Environments</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5019bis-08"/>
    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="Clint Wilson">
      <organization>Apple, Inc.</organization>
      <address>
        <email>clintw@apple.com</email>
      </address>
    </author>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2024" month="April" day="10"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>This specification defines a profile of the Online Certificate Status
Protocol (OCSP) that addresses the scalability issues inherent when
using OCSP in large scale (high volume) Public Key Infrastructure
(PKI) environments and/or in PKI environments that require a
lightweight solution to minimize communication bandwidth and client-
side processing.</t>
      <t>This specification obsoletes RFC 5019. The profile specified in RFC 5019
has been updated to allow and recommend the use of SHA-256 over SHA-1.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/tadahik/RFC5019bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Online Certificate Status Protocol <xref target="RFC6960"/> specifies a mechanism
used to determine the status of digital certificates, in lieu of
using Certificate Revocation Lists (CRLs). Since its definition in
1999, it has been deployed in a variety of environments and has
proven to be a useful certificate status checking mechanism. (For
brevity we refer to OCSP as being used to verify certificate status,
but only the revocation status of a certificate is checked via this
protocol.)</t>
      <t>To date, many OCSP deployments have been used to ensure timely and
secure certificate status information for high-value electronic
transactions or highly sensitive information, such as in the banking
and financial environments. As such, the requirement for an OCSP
responder to respond in "real time" (i.e., generating a new OCSP
response for each OCSP request) has been important. In addition,
these deployments have operated in environments where bandwidth usage
is not an issue, and have run on client and server systems where
processing power is not constrained.</t>
      <t>As the use of PKI continues to grow and move into diverse
environments, so does the need for a scalable and cost-effective
certificate status mechanism. Although OCSP as currently defined and
deployed meets the need of small to medium-sized PKIs that operate on
powerful systems on wired networks, there is a limit as to how these
OCSP deployments scale from both an efficiency and cost perspective.
Mobile environments, where network bandwidth may be at a premium and
client-side devices are constrained from a processing point of view,
require the careful use of OCSP to minimize bandwidth usage and
client-side processing complexity. <xref target="OCSPMP"/></t>
      <t>PKI continues to be deployed into environments where millions if not
hundreds of millions of certificates have been issued. In many of
these environments, an even larger number of users (also known as
relying parties) have the need to ensure that the certificate they
are relying upon has not been revoked. As such, it is important that
OCSP is used in such a way that ensures the load on OCSP responders
and the network infrastructure required to host those responders are
kept to a minimum.</t>
      <t>This document addresses the scalability issues inherent when using
OCSP in PKI environments described above by defining a message
profile and clarifying OCSP client and responder behavior that will
permit:</t>
      <ol spacing="normal" type="1"><li>
          <t>OCSP response pre-production and distribution.</t>
        </li>
        <li>
          <t>Reduced OCSP message size to lower bandwidth usage.</t>
        </li>
        <li>
          <t>Response message caching both in the network and on the client.</t>
        </li>
      </ol>
      <t>It is intended that the normative requirements defined in this
profile will be adopted by OCSP clients and OCSP responders operating
in very large-scale (high-volume) PKI environments or PKI
environments that require a lightweight solution to minimize
bandwidth and client-side processing power (or both), as described
above.</t>
      <t>OCSP does not have the means to signal responder capabilities within the
protocol. Thus, clients will need to use out-of-band mechanisms to
determine whether a responder conforms to the profile defined in this
document. Regardless of the availability of such out-of-band mechanisms,
this profile ensures that interoperability will still occur between an
OCSP client that fully conforms with <xref target="RFC6960"/> and a responder that is
operating in a mode as described in this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="ocsp-message-profile">
      <name>OCSP Message Profile</name>
      <t>This section defines a subset of OCSPRequest and OCSPResponse
functionality as defined in <xref target="RFC6960"/>.</t>
      <section anchor="req-profile">
        <name>OCSP Request Profile</name>
        <section anchor="certid">
          <name>OCSPRequest Structure</name>
          <t>Provided for convenience here, but unchanged from <xref target="RFC6960"/>,
the ASN.1 structure corresponding to the OCSPRequest with the relevant
CertID is:</t>
          <artwork><![CDATA[
OCSPRequest     ::=     SEQUENCE {
   tbsRequest                  TBSRequest,
   optionalSignature   [0]     EXPLICIT Signature OPTIONAL }

TBSRequest      ::=     SEQUENCE {
   version             [0]     EXPLICIT Version DEFAULT v1,
   requestorName       [1]     EXPLICIT GeneralName OPTIONAL,
   requestList                 SEQUENCE OF Request,
   requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }

Request         ::=     SEQUENCE {
   reqCert                     CertID,
   singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }

CertID          ::=     SEQUENCE {
   hashAlgorithm       AlgorithmIdentifier,
   issuerNameHash      OCTET STRING, -- Hash of issuer's DN
   issuerKeyHash       OCTET STRING, -- Hash of issuer's public key
   serialNumber        CertificateSerialNumber }
]]></artwork>
          <t>OCSPRequests that conform to this profile <bcp14>MUST</bcp14> include only one Request
in the OCSPRequest.RequestList structure.</t>
          <t>The CertID.issuerNameHash and CertID.issuerKeyHash fields contain hashes
of the issuer's DN and public key, respectively. OCSP clients that
conform with this profile <bcp14>MUST</bcp14> use SHA-256 as defined in <xref target="RFC6234"/> as
the hashing algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values.</t>
          <t>Older OCSP clients which provide backward compatibility with
<xref target="RFC5019"/> use SHA-1 as defined in <xref target="RFC3174"/> as the hashing
algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values. However, these OCSP clients should
transition from SHA-1 to SHA-256 as soon as practical.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> include the singleRequestExtensions structure.</t>
          <t>Clients <bcp14>SHOULD NOT</bcp14> include the requestExtensions structure. If a
requestExtensions structure is included, this profile RECOMMENDS that
it contain only the nonce extension (id-pkix-ocsp-nonce). See
<xref target="fresh"/> for issues concerning the use of a nonce in high-volume
OCSP environments.</t>
        </section>
        <section anchor="signed-ocsprequests">
          <name>Signed OCSPRequests</name>
          <t>Clients <bcp14>SHOULD NOT</bcp14> send signed OCSPRequests. Responders <bcp14>MAY</bcp14> ignore
the signature on OCSPRequests.</t>
          <t>If the OCSPRequest is signed, the client <bcp14>SHALL</bcp14> specify its name in
the OCSPRequest.requestorName field; otherwise, clients <bcp14>SHOULD NOT</bcp14>
include the requestorName field in the OCSPRequest. OCSP servers
<bcp14>MUST</bcp14> be prepared to receive unsigned OCSP requests that contain the
requestorName field, but <bcp14>MUST</bcp14> handle such requests as if the
requestorName field were absent.</t>
        </section>
      </section>
      <section anchor="ocsp-response-profile">
        <name>OCSP Response Profile</name>
        <section anchor="ocspresponse-structure">
          <name>OCSPResponse Structure</name>
          <t>The ASN.1 structure corresponding to the OCSPResponse
with the relevant CertID is:</t>
          <artwork><![CDATA[
OCSPResponse ::= SEQUENCE {
   responseStatus         OCSPResponseStatus,
   responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }

ResponseBytes ::=       SEQUENCE {
   responseType   OBJECT IDENTIFIER,
   response       OCTET STRING }

The value for response SHALL be the DER encoding of BasicOCSPResponse.

BasicOCSPResponse       ::= SEQUENCE {
   tbsResponseData      ResponseData,
   signatureAlgorithm   AlgorithmIdentifier,
   signature            BIT STRING,
   certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }

ResponseData ::= SEQUENCE {
   version              [0] EXPLICIT Version DEFAULT v1,
   responderID              ResponderID,
   producedAt               GeneralizedTime,
   responses                SEQUENCE OF SingleResponse,
   responseExtensions   [1] EXPLICIT Extensions OPTIONAL }

SingleResponse ::= SEQUENCE {
   certID                       CertID,
   certStatus                   CertStatus,
   thisUpdate                   GeneralizedTime,
   nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,
   singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }
]]></artwork>
          <t>Responders <bcp14>MUST</bcp14> generate a BasicOCSPResponse as identified by the
id-pkix-ocsp-basic OID. Clients <bcp14>MUST</bcp14> be able to parse and accept a
BasicOCSPResponse. OCSPResponses that conform to this profile <bcp14>SHOULD</bcp14>
include only one SingleResponse in the
ResponseData.responses structure, but <bcp14>MAY</bcp14> include
additional SingleResponse elements if necessary to improve response
pre-generation performance or cache efficiency, and
to ensure backward compatibility. For instance,
to provide support to OCSP clients which do not yet support the
use of SHA-256 for CertID hash calculation, the OCSP responder
<bcp14>MAY</bcp14> include two SingleResponses in a BasicOCSPResponse.
In that BasicOCSPResponse, the CertID of one of the SingleResponses
uses SHA-1 for the hash calculation, and the CertID in the other
SingleResponse uses SHA-256. OCSP responders <bcp14>SHOULD NOT</bcp14> distribute
OCSP responses that contain CertIDs that use SHA-1 if the OCSP
responder has no clients that require the use of SHA-1.
Operators of OCSP responders may consider logging the hash
algorithm used by OCSP clients to inform their determination of
when it is appropriate to obsolete the distribution of OCSP responses
that employ SHA-1 for CertID field hashes. See <xref target="sha1-sec"/> for more
information on the security considerations for the continued use of
SHA-1.</t>
          <t>The responder <bcp14>SHOULD NOT</bcp14> include responseExtensions. As specified in
<xref target="RFC6960"/>, clients <bcp14>MUST</bcp14> ignore unrecognized non-critical
responseExtensions in the response.</t>
          <t>In the case where a responder does not have the ability to respond to
an OCSP request containing an option not supported by the server, it
<bcp14>SHOULD</bcp14> return the most complete response it can. For example, in the
case where a responder only supports pre-produced responses and does
not have the ability to respond to an OCSP request containing a
nonce, it <bcp14>SHOULD</bcp14> return a response that does not include a nonce.</t>
          <t>Clients <bcp14>SHOULD</bcp14> attempt to process a response even if the response
does not include a nonce. See <xref target="fresh"/> for details on validating
responses that do not contain a nonce. See also <xref target="sec-cons"/> for
relevant security considerations.</t>
          <t>Responders that do not have the ability to respond to OCSP requests
that contain an unsupported option such as a nonce <bcp14>MAY</bcp14> forward the
request to an OCSP responder capable of doing so.</t>
          <t>The responder <bcp14>MAY</bcp14> include the singleResponse.singleResponse
extensions structure.</t>
        </section>
        <section anchor="byKey">
          <name>Signed OCSPResponses</name>
          <t>Clients <bcp14>MUST</bcp14> validate the signature on the returned OCSPResponse.</t>
          <t>If the response is signed by a delegate of the issuing certification
authority (CA), a valid responder certificate <bcp14>MUST</bcp14> be referenced in
the BasicOCSPResponse.certs structure.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> that the OCSP responder's certificate contain the
id-pkix-ocsp-nocheck extension, as defined in <xref target="RFC6960"/>, to indicate
to the client that it need not check the certificate's status. In
addition, it is <bcp14>RECOMMENDED</bcp14> that neither an OCSP authorityInfoAccess
(AIA) extension nor cRLDistributionPoints (CRLDP) extension be
included in the OCSP responder's certificate. Accordingly, the
responder's signing certificate <bcp14>SHOULD</bcp14> be relatively short-lived and
renewed regularly.</t>
          <t>Clients <bcp14>MUST</bcp14> be able to identify OCSP responder certificates using
the byKey field and <bcp14>SHOULD</bcp14> be able to identify OCSP responder
certificates using the byName field of the ResponseData.ResponderID
choices.</t>
          <t>Older responders which provide backward compatibility with <xref target="RFC5019"/>
            <bcp14>MAY</bcp14> use the byName field to represent the ResponderID, but should
transition to using the byKey field as soon as practical.</t>
          <t>Newer responders that conform to this profile <bcp14>MUST</bcp14> use the byKey
field to represent the ResponderID to reduce the size of the response.</t>
        </section>
        <section anchor="ocspresponsestatus-values">
          <name>OCSPResponseStatus Values</name>
          <t>As long as the OCSP infrastructure has authoritative records for a
particular certificate, an OCSPResponseStatus of "successful" will be
returned. When access to authoritative records for a particular
certificate is not available, the responder <bcp14>MUST</bcp14> return an
OCSPResponseStatus of "unauthorized". As such, this profile extends
the <xref target="RFC6960"/> definition of "unauthorized" as follows:</t>
          <t>The response "unauthorized" is returned in cases where the client
is not authorized to make this query to this server or the server
is not capable of responding authoritatively.</t>
          <t>For example, OCSP responders that do not have access to authoritative
records for a requested certificate, such as those that generate and
distribute OCSP responses in advance and thus do not have the ability
to properly respond with a signed "successful" yet "unknown"
response, will respond with an OCSPResponseStatus of "unauthorized".
Also, in order to ensure the database of revocation information does
not grow unbounded over time, the responder <bcp14>MAY</bcp14> remove the status
records of expired certificates. Requests from clients for
certificates whose record has been removed will result in an
OCSPResponseStatus of "unauthorized".</t>
          <t>Security considerations regarding the use of unsigned responses are
discussed in <xref target="RFC6960"/>.</t>
        </section>
        <section anchor="times">
          <name>thisUpdate, nextUpdate, and producedAt</name>
          <t>When pre-producing OCSPResponse messages, the responder <bcp14>MUST</bcp14> set the
thisUpdate, nextUpdate, and producedAt times as follows:</t>
          <dl>
            <dt>thisUpdate:</dt>
            <dd>
              <t>The time at which the status being indicated is known to be correct.</t>
            </dd>
            <dt>nextUpdate:</dt>
            <dd>
              <t>The time at or before which newer information will be available
about the status of the certificate. Responders <bcp14>MUST</bcp14> always include
this value to aid in response caching. See <xref target="cache-recs"/> for additional
information on caching.</t>
            </dd>
            <dt>producedAt:</dt>
            <dd>
              <t>The time at which the OCSP response was signed.</t>
            </dd>
          </dl>
          <aside>
            <t>Note: In many cases the value of thisUpdate and producedAt will be
  the same.</t>
          </aside>
          <t>For the purposes of this profile, ASN.1-encoded GeneralizedTime
values such as thisUpdate, nextUpdate, and producedAt <bcp14>MUST</bcp14> be
expressed Greenwich Mean Time (Zulu) and <bcp14>MUST</bcp14> include seconds (i.e.,
times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values <bcp14>MUST NOT</bcp14> include fractional seconds.</t>
        </section>
      </section>
    </section>
    <section anchor="client-behavior">
      <name>Client Behavior</name>
      <section anchor="ocsp-responder-discovery">
        <name>OCSP Responder Discovery</name>
        <t>Clients <bcp14>MUST</bcp14> support the authorityInfoAccess extension as defined in
<xref target="RFC5280"/> and <bcp14>MUST</bcp14> recognize the id-ad-ocsp access method. This
enables CAs to inform clients how they can contact the OCSP service.</t>
        <t>In the case where a client is checking the status of a certificate
that contains both an authorityInformationAccess (AIA) extension
pointing to an OCSP responder and a cRLDistributionPoints extension
pointing to a CRL, the client <bcp14>SHOULD</bcp14> attempt to contact the OCSP
responder first. Clients <bcp14>MAY</bcp14> attempt to retrieve the CRL if no
OCSPResponse is received from the responder after a locally
configured timeout and number of retries.</t>
      </section>
      <section anchor="sending-an-ocsp-request">
        <name>Sending an OCSP Request</name>
        <t>To avoid needless network traffic, applications <bcp14>MUST</bcp14> verify the
signature of signed data before asking an OCSP client to check the
status of certificates used to verify the data. If the signature is
invalid or the application is not able to verify it, an OCSP check
<bcp14>MUST NOT</bcp14> be requested.</t>
        <t>Similarly, an application <bcp14>MUST</bcp14> validate the signature on certificates
in a chain, before asking an OCSP client to check the status of the
certificate. If the certificate signature is invalid or the
application is not able to verify it, an OCSP check <bcp14>MUST NOT</bcp14> be
requested. Clients <bcp14>SHOULD NOT</bcp14> make a request to check the status of
expired certificates.</t>
      </section>
    </section>
    <section anchor="fresh">
      <name>Ensuring an OCSPResponse Is Fresh</name>
      <t>In order to ensure that a client does not accept an out-of-date
response that indicates a 'good' status when in fact there is a more
up-to-date response that specifies the status of 'revoked', a client
must ensure the responses they receive are fresh.</t>
      <t>In general, two mechanisms are available to clients to ensure a
response is fresh. The first uses nonces, and the second is based on
time. In order for time-based mechanisms to work, both clients and
responders <bcp14>MUST</bcp14> have access to an accurate source of time.</t>
      <t>Because this profile specifies that clients <bcp14>SHOULD NOT</bcp14> include a
requestExtensions structure in OCSPRequests (see <xref target="req-profile"/>),
clients <bcp14>MUST</bcp14> be able to determine OCSPResponse freshness based on an
accurate source of time. Clients that opt to include a nonce in the
request <bcp14>SHOULD NOT</bcp14> reject a corresponding OCSPResponse solely on the
basis of the nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to
validating the OCSPResponse based on time.</t>
      <t>Clients that do not include a nonce in the request <bcp14>MUST</bcp14> ignore any
nonce that may be present in the response.</t>
      <t>Clients <bcp14>MUST</bcp14> check for the existence of the nextUpdate field and <bcp14>MUST</bcp14>
ensure the current time, expressed in GMT time as described in
<xref target="times"/>, falls between the thisUpdate and nextUpdate times. If
the nextUpdate field is absent, the client <bcp14>MUST</bcp14> reject the response.</t>
      <t>If the nextUpdate field is present, the client <bcp14>MUST</bcp14> ensure that it is
not earlier than the current time. If the current time on the client
is later than the time specified in the nextUpdate field, the client
<bcp14>MUST</bcp14> reject the response as stale. Clients <bcp14>MAY</bcp14> allow configuration
of a small tolerance period for acceptance of responses after
nextUpdate to handle minor clock differences relative to responders
and caches. This tolerance period should be chosen based on the
accuracy and precision of time synchronization technology available
to the calling application environment. For example, Internet peers
with low latency connections typically expect NTP time
synchronization to keep them accurate within parts of a second;
higher latency environments or where an NTP analogue is not available
may have to be more liberal in their tolerance
(e.g. allow one day difference).</t>
      <t>See the security considerations in <xref target="sec-cons"/> for additional details
on replay and man-in-the-middle attacks.</t>
    </section>
    <section anchor="transport">
      <name>Transport Profile</name>
      <t>OCSP clients can send HTTP-based OCSP requests using either the GET
or POST method.
The OCSP responder <bcp14>MUST</bcp14> support requests and responses over HTTP.
When sending requests that are less than or equal to 255 bytes in
total (after encoding) including the scheme and delimiters (http://),
server name and base64-encoded OCSPRequest structure, clients <bcp14>MUST</bcp14>
use the GET method (to enable OCSP response caching). OCSP requests
larger than 255 bytes <bcp14>SHOULD</bcp14> be submitted using the POST method. In
all cases, clients <bcp14>MUST</bcp14> follow the descriptions in A.1 of <xref target="RFC6960"/>
when constructing these messages.</t>
      <t>When constructing a GET message, OCSP clients <bcp14>MUST</bcp14> base64-encode the
OCSPRequest structure according to <xref target="RFC4648"/>, section 4. Clients
<bcp14>MUST NOT</bcp14> include whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string. Clients
<bcp14>MUST</bcp14> properly URL-encode the base64-encoded OCSPRequest according to
<xref target="RFC3986"/>. OCSP clients <bcp14>MUST</bcp14> append the base64-encoded OCSPRequest
to the URI specified in the AIA extension <xref target="RFC5280"/>. For example:</t>
      <artwork><![CDATA[
   http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dA
   deGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D
]]></artwork>
      <t>In response to properly formatted OCSPRequests that are cachable
(i.e., responses that contain a nextUpdate value), the responder will
include the binary value of the DER encoding of the OCSPResponse
preceded by the following HTTP <xref target="RFC9110"/> and <xref target="RFC9111"/> headers.</t>
      <artwork><![CDATA[
   Content-type: application/ocsp-response
   Content-length: < OCSP response length >
   Last-modified: < producedAt HTTP-date >
   ETag: "< strong validator >"
   Expires: < nextUpdate HTTP-date >
   Cache-control: max-age=< n >, public, no-transform, must-revalidate
   Date: < current HTTP-date >
]]></artwork>
      <t>See <xref target="http-proxies"/> for details on the use of these headers.</t>
    </section>
    <section anchor="cache-recs">
      <name>Caching Recommendations</name>
      <t>The ability to cache OCSP responses throughout the network is an
important factor in high volume OCSP deployments. This section
discusses the recommended caching behavior of OCSP clients and HTTP
proxies and the steps that should be taken to minimize the number of
times that OCSP clients "hit the wire". In addition, the concept of
including OCSP responses in protocol exchanges (aka stapling or
piggybacking), such as has been defined in TLS, is also discussed.</t>
      <section anchor="caching-at-the-client">
        <name>Caching at the Client</name>
        <t>To minimize bandwidth usage, clients <bcp14>MUST</bcp14> locally cache authoritative
OCSP responses (i.e., a response with a signature that has been
successfully validated and that indicate an OCSPResponseStatus of
'successful').</t>
        <t>Most OCSP clients will send OCSPRequests at or near the nextUpdate
time (when a cached response expires). To avoid large spikes in
responder load that might occur when many clients refresh cached
responses for a popular certificate, responders <bcp14>MAY</bcp14> indicate when the
client should fetch an updated OCSP response by using the cache-
control:max-age directive. Clients <bcp14>SHOULD</bcp14> fetch the updated OCSP
Response on or after the max-age time. To ensure that clients
receive an updated OCSP response, OCSP responders <bcp14>MUST</bcp14> refresh the
OCSP response before the max-age time.</t>
      </section>
      <section anchor="http-proxies">
        <name>HTTP Proxies</name>
        <t>The responder <bcp14>SHOULD</bcp14> set the HTTP headers of the OCSP response in
such a way as to allow for the intelligent use of intermediate HTTP
proxy servers. See <xref target="RFC9110"/> and <xref target="RFC9111"/> for the full definition
of these headers and the proper format of any date and time values.</t>
        <table anchor="http-headers">
          <name>HTTP Headers</name>
          <thead>
            <tr>
              <th align="left">HTTP Header</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Date</td>
              <td align="left">The date and time at which the OCSP server generated the HTTP response.</td>
            </tr>
            <tr>
              <td align="left">Last-Modified</td>
              <td align="left">This value specifies the date and time at which the OCSP responder last modified the response. This date and time will be the same as the thisUpdate timestamp in the request itself.</td>
            </tr>
            <tr>
              <td align="left">Expires</td>
              <td align="left">Specifies how long the response is considered fresh. This date and time will be the same as the nextUpdate timestamp in the OCSP response itself.</td>
            </tr>
            <tr>
              <td align="left">ETag</td>
              <td align="left">A string that identifies a particular version of the associated data. This profile RECOMMENDS that the ETag value be the ASCII HEX representation of the SHA-256 hash of the OCSPResponse structure.</td>
            </tr>
            <tr>
              <td align="left">Cache-Control</td>
              <td align="left">Contains a number of caching directives. <br/> * max-age = &lt; n &gt; -where n is a time value later than thisUpdate but earlier than nextUpdate. <br/> * public -makes normally uncachable response cachable by both shared and nonshared caches. <br/> * no-transform -specifies that a proxy cache cannot change the type, length, or encoding of the object content. <br/> * must-revalidate -prevents caches from intentionally returning stale responses.</td>
            </tr>
          </tbody>
        </table>
        <t>OCSP responders <bcp14>MUST NOT</bcp14> include a "Pragma: no-cache", "Cache-
Control: no-cache", or "Cache-Control: no-store" header in
authoritative OCSP responses.</t>
        <t>OCSP responders <bcp14>SHOULD</bcp14> include one or more of these headers in non-
authoritative OCSP responses.</t>
        <t>For example, assume that an OCSP response has the following timestamp
values:</t>
        <artwork><![CDATA[
   thisUpdate = March 19, 2023 01:00:00 GMT
   nextUpdate = March 21, 2023 01:00:00 GMT
   productedAt = March 19, 2023 01:00:00 GMT
]]></artwork>
        <t>and that an OCSP client requests the response on March 20, 2023 01:00:00
GMT. In this scenario, the HTTP response may look like this:</t>
        <artwork><![CDATA[
   Content-Type: application/ocsp-response
   Content-Length: 1000
   Date: Mon, 20 Mar 2023 01:00:00 GMT
   Last-Modified: Sun, 19 Mar 2023 01:00:00 GMT
   ETag: "97df3588b5a3f24babc3851b372f0ba7
         1a9dcdded43b14b9d06961bfc1707d9d"
   Expires: Tue, 21 Mar 2023 01:00:00 GMT
   Cache-Control: max-age=86000,public,no-transform,must-revalidate
   <...>
]]></artwork>
        <t>OCSP clients <bcp14>MUST NOT</bcp14> include a no-cache header in OCSP request
messages, unless the client encounters an expired response which may
be a result of an intermediate proxy caching stale data. In this
situation, clients <bcp14>SHOULD</bcp14> resend the request specifying that proxies
should be bypassed by including an appropriate HTTP header in the
request (i.e., Pragma: no-cache or Cache-Control: no-cache).</t>
      </section>
      <section anchor="caching-at-servers">
        <name>Caching at Servers</name>
        <t>In some scenarios, it is advantageous to include OCSP response
information within the protocol being utilized between the client and
server. Including OCSP responses in this manner has a few attractive
effects.</t>
        <t>First, it allows for the caching of OCSP responses on the server,
thus lowering the number of hits to the OCSP responder.</t>
        <t>Second, it enables certificate validation in the event the client is
not connected to a network and thus eliminates the need for clients
to establish a new HTTP session with the responder.</t>
        <t>Third, it reduces the number of round trips the client needs to make
in order to complete a handshake.</t>
        <t>Fourth, it simplifies the client-side OCSP implementation by enabling
a situation where the client need only the ability to parse and
recognize OCSP responses.</t>
        <t>This functionality has been specified as an extension to the TLS
<xref target="I-D.ietf-tls-rfc8446bis"/> protocol in
<xref section="4.4.2" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>,
but can be applied to any client-server protocol.</t>
        <t>This profile RECOMMENDS that both TLS clients and servers implement
the certificate status request extension mechanism for TLS.</t>
        <t>Further information regarding caching issues can be obtained
from <xref target="RFC3143"/>.</t>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The following considerations apply in addition to the security
considerations addressed in <xref section="5" sectionFormat="of" target="RFC6960"/>.</t>
      <section anchor="replay-attacks">
        <name>Replay Attacks</name>
        <t>Because the use of nonces in this profile is optional, there is a
possibility that an out of date OCSP response could be replayed, thus
causing a client to accept a good response when in fact there is a
more up-to-date response that specifies the status of revoked. In
order to mitigate this attack, clients <bcp14>MUST</bcp14> have access to an
accurate source of time and ensure that the OCSP responses they
receive are sufficiently fresh.</t>
        <t>Clients that do not have an accurate source of date and time are
vulnerable to service disruption. For example, a client with a
sufficiently fast clock may reject a fresh OCSP response. Similarly
a client with a sufficiently slow clock may incorrectly accept
expired valid responses for certificates that may in fact be revoked.</t>
        <t>Future versions of the OCSP protocol may provide a way for the client
to know whether the server supports nonces or does not support
nonces. If a client can determine that the server supports nonces,
it <bcp14>MUST</bcp14> reject a reply that does not contain an expected nonce.
Otherwise, clients that opt to include a nonce in the request <bcp14>SHOULD
NOT</bcp14> reject a corresponding OCSPResponse solely on the basis of the
nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to validating the
OCSPResponse based on time.</t>
      </section>
      <section anchor="man-in-the-middle-attacks">
        <name>Man-in-the-Middle Attacks</name>
        <t>To mitigate risk associated with this class of attack, the client
must properly validate the signature on the response.</t>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of the OCSP responder and to verify that it is authorized to
sign responses on the CA's behalf.</t>
        <t>Clients <bcp14>MUST</bcp14> ensure that they are communicating with an authorized
responder by the rules described in <xref section="4.2.2.2" sectionFormat="of" target="RFC6960"/>.</t>
      </section>
      <section anchor="impersonation-attacks">
        <name>Impersonation Attacks</name>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of OCSP responder.</t>
        <t>As detailed in <xref target="RFC6960"/>, clients must properly validate the signature
of the OCSP response and the signature on the OCSP response signer
certificate to ensure an authorized responder created it.</t>
      </section>
      <section anchor="denial-of-service-attacks">
        <name>Denial-of-Service Attacks</name>
        <t>OCSP responders should take measures to prevent or mitigate denial-
of-service attacks. As this profile specifies the use of unsigned
OCSPRequests, access to the responder may be implicitly given to
everyone who can send a request to a responder, and thus the ability
to mount a denial-of-service attack via a flood of requests may be
greater. For example, a responder could limit the rate of incoming
requests from a particular IP address if questionable behavior is
detected.</t>
      </section>
      <section anchor="modification-of-http-headers">
        <name>Modification of HTTP Headers</name>
        <t>Values included in HTTP headers, as described in <xref target="transport"/>
and <xref target="cache-recs"/>,
are not cryptographically protected; they may be manipulated by an
attacker. Clients <bcp14>SHOULD</bcp14> use these values for caching guidance only
and ultimately <bcp14>SHOULD</bcp14> rely only on the values present in the signed
OCSPResponse. Clients <bcp14>SHOULD NOT</bcp14> rely on cached responses beyond the
nextUpdate time.</t>
      </section>
      <section anchor="request-authentication-and-authorization">
        <name>Request Authentication and Authorization</name>
        <t>The suggested use of unsigned requests in this environment removes an
option that allows the responder to determine the authenticity of
incoming request. Thus, access to the responder may be implicitly
given to everyone who can send a request to a responder.
Environments where explicit authorization to access the OCSP
responder is necessary can utilize other mechanisms to authenticate
requestors or restrict or meter service.</t>
      </section>
      <section anchor="sha1-sec">
        <name>Use of SHA-1 for the calculation of CertID field values</name>
        <t>Although the use of SHA-1 for the calculation of CertID field values is
not of concern from a cryptographic security standpoint, the continued
use of SHA-1 in an ecosystem requires that software that interoperates
with the ecosystem maintain support for SHA-1. This increases
implementation complexity and potential attack surface for the software
in question. Thus, the continued use of SHA-1 in an ecosystem to
maintain interoperability with legacy software must be weighed against
the increased implementation complexity and potential attack surface.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC5019">
          <front>
            <title>The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments</title>
            <author fullname="A. Deacon" initials="A." surname="Deacon"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This specification defines a profile of the Online Certificate Status Protocol (OCSP) that addresses the scalability issues inherent when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) environments and/or in PKI environments that require a lightweight solution to minimize communication bandwidth and client-side processing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5019"/>
          <seriesInfo name="DOI" value="10.17487/RFC5019"/>
        </reference>
        <reference anchor="RFC3174">
          <front>
            <title>US Secure Hash Algorithm 1 (SHA1)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="P. Jones" initials="P." surname="Jones"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3174"/>
          <seriesInfo name="DOI" value="10.17487/RFC3174"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
        </reference>
        <reference anchor="RFC9500">
          <front>
            <title>Standard Public Key Cryptography (PKC) Test Keys</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
            <author fullname="C. Bonnell" initials="C." surname="Bonnell"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>This document provides a set of standard Public Key Cryptography (PKC) test keys that may be used wherever pre-generated keys and associated operations like digital signatures are required. Like the European Institute for Computer Antivirus Research (EICAR) virus test and the Generic Test for Unsolicited Bulk Email (GTUBE) spam test files, these publicly known test keys can be detected and recognised by applications consuming them as being purely for testing purposes without assigning any security properties to them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9500"/>
          <seriesInfo name="DOI" value="10.17487/RFC9500"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="OCSPMP">
          <front>
            <title>OCSP Mobile Profile V1.0</title>
            <author>
              <organization>Open Mobile Alliance</organization>
            </author>
            <date/>
          </front>
          <seriesInfo name="www.openmobilealliance.org" value=""/>
        </reference>
        <reference anchor="RFC3143">
          <front>
            <title>Known HTTP Proxy/Caching Problems</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="J. Dilley" initials="J." surname="Dilley"/>
            <date month="June" year="2001"/>
            <abstract>
              <t>This document catalogs a number of known problems with World Wide Web (WWW) (caching) proxies and cache servers. The goal of the document is to provide a discussion of the problems and proposed workarounds, and ultimately to improve conditions by illustrating problems. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3143"/>
          <seriesInfo name="DOI" value="10.17487/RFC3143"/>
        </reference>
      </references>
    </references>
    <?line 719?>

<section anchor="differences-from-rfc-5019">
      <name>Differences from RFC 5019</name>
      <t>This document obsoletes <xref target="RFC5019"/>. <xref target="RFC5019"/> defines a lightweight
profile for OCSP that makes the protocol more suitable for use in
high-volume environments. The lightweight profile specifies the
mandatory use of SHA-1 when calculating the values of several fields in
OCSP requests and responses. In recent years, weaknesses have been
demonstrated with the SHA-1 algorithm. As a result, SHA-1 is
increasingly falling out of use even for non-security relevant
use cases. This document obsoletes the lightweight profile as specified
in RFC 5019 to instead recommend the use of SHA-256 where SHA-1 was
previously required. An <xref target="RFC5019"/>-compliant OCSP client is still able
to use SHA-1, but the use of SHA-1 may become obsolete in the future.</t>
      <t>Substantive changes to RFC 5019:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="certid"/> requires new OCSP clients to use SHA-256 to
support migration for OCSP clients.</t>
        </li>
        <li>
          <t><xref target="byKey"/> requires new OCSP responders to use the byKey field,
and support migration from byName fields.</t>
        </li>
        <li>
          <t><xref target="transport"/> clarifies that OCSP clients <bcp14>MUST NOT</bcp14> include
whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string.</t>
        </li>
      </ul>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="root-certification-authority-certificate">
        <name>Root Certification Authority Certificate</name>
        <t>This is a self-signed certificate for the certification authority that
issued the end-entity certificate and OCSP delegated responder
example certificates below.</t>
        <t>The the key pair for the certification authority is the "testECCP521"
key from <xref target="RFC9500"/>, section 2.3.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 552: SEQUENCE {
  4 394:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 1
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 28  56:     SEQUENCE {
 30  11:       SET {
 32   9:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 39   2:           PrintableString 'XX'
       :           }
       :         }
 43  20:       SET {
 45  18:         SEQUENCE {
 47   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 52  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 65  19:       SET {
 67  17:         SEQUENCE {
 69   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 74  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 86  30:     SEQUENCE {
 88  13:       UTCTime 02/04/2024 12:37:47 GMT
103  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
118  56:     SEQUENCE {
120  11:       SET {
122   9:         SEQUENCE {
124   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
129   2:           PrintableString 'XX'
       :           }
       :         }
133  20:       SET {
135  18:         SEQUENCE {
137   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
142  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
155  19:       SET {
157  17:         SEQUENCE {
159   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
164  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
176 155:     SEQUENCE {
179  16:       SEQUENCE {
181   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
190   5:         OBJECT IDENTIFIER secp521r1 (1 3 132 0 35)
       :         }
197 134:       BIT STRING
       :         04 01 D0 FD 72 57 A8 4C 74 7F 56 25 75 C0 73 85
       :         DB EB F2 F5 2B EA 58 08 3D B8 2F DD 15 31 D8 AA
       :         E3 CC 87 5F F0 2F F7 FA 2D A2 60 D8 EB 62 D6 D2
       :         F5 D6 49 27 8E 32 17 36 A0 62 8C BB B3 03 08 B6
       :         E6 18 DB 00 F6 2A D2 04 C6 46 03 59 BC 81 8A B8
       :         96 1B F0 F0 FC 0E C5 AA E8 A4 28 17 3C E5 6F 00
       :         DE 9B 15 7C 1E 5C 82 C6 4F 56 2F CA DE FC 4A 4C
       :         28 F6 D3 42 CF 3E F6 16 FC 82 D3 3B 72 85 C9 21
       :         F2 BF 36 FD D8
       :       }
334  66:     [3] {
336  64:       SEQUENCE {
338  29:         SEQUENCE {
340   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
345  22:           OCTET STRING, encapsulates {
347  20:             OCTET STRING
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :             }
       :           }
369  15:         SEQUENCE {
371   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
376   1:           BOOLEAN TRUE
379   5:           OCTET STRING, encapsulates {
381   3:             SEQUENCE {
383   1:               BOOLEAN TRUE
       :               }
       :             }
       :           }
386  14:         SEQUENCE {
388   3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
393   1:           BOOLEAN TRUE
396   4:           OCTET STRING, encapsulates {
398   2:             BIT STRING 2 unused bits
       :               '100000'B (bit 5)
       :             }
       :           }
       :         }
       :       }
       :     }
402  10:   SEQUENCE {
404   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
414 139:   BIT STRING, encapsulates {
418 135:     SEQUENCE {
421  65:       INTEGER
       :         6E BF F5 48 98 87 0A 05 C6 10 9E D1 FB 77 AB D4
       :         B7 56 AA B7 59 1E 0B 42 C3 24 FB FB 01 41 20 99
       :         95 B3 01 22 A2 6D 8B 1A 1F E8 32 EB B9 98 3F AE
       :         FF EA 35 9B 4E EF 9A 66 63 FF E8 A9 1A 9F 13 23
       :         09
488  66:       INTEGER
       :         00 A8 67 86 C7 B5 EE 97 90 59 BB 85 45 DA B1 C2
       :         CD EE F9 2F EE A2 B0 5F 24 EC 0A F2 03 A4 40 D3
       :         44 25 FC 75 41 5E EF 78 C6 79 B8 AD 92 E9 91 1E
       :         35 61 94 12 4B A3 B9 F7 14 C2 6B 14 73 68 79 B9
       :         4C 6F
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="end-entity-certificate">
        <name>End-entity Certificate</name>
        <t>This is an end-entity certificate whose status is requested and
returned in the OCSP request and response examples below.</t>
        <t>The the key pair for the end-entity certificate is the "testECCP256"
key from <xref target="RFC9500"/>, section 2.3.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIB2zCCATygAwIBAgIEAarwDTAKBggqhkjOPQQDBDA4MQswCQYDVQQGEwJYWDEU
MBIGA1UECgwLQ2VydHMgJ3IgVXMxEzARBgNVBAMMCklzc3VpbmcgQ0EwHhcNMjQw
NDAyMTIzNzQ3WhcNMjUwNDAyMTIzNzQ3WjAcMRowGAYDVQQDDBF4bi0tMThqNGQu
ZXhhbXBsZTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEIlSPiPt4L/teyjdERS
xyoeVY+9b3O+XkjpMjLMRcWxbEzRDEy41bihcTnpSILImSVymTQl9BQZq36QpCpJ
QnKjUDBOMB0GA1UdDgQWBBRbcKeYF/ef9jfS9+PcRGwhCde71DAfBgNVHSMEGDAW
gBSOwhQJYHbqkDjpOa4bbVLEF32fvjAMBgNVHRMBAf8EAjAAMAoGCCqGSM49BAME
A4GMADCBiAJCAIot8SYNFkScrcsY5T81HSmNzhP/0GC87N3WI849CN0qmNa0nMXW
8HnDKGR5nv/D9x+T8uLMBlpFUWmHQmXAJPN8AkIBW8A0XsiyPJyZfaZieODmtnoI
obZP+eTLNWkGUFL6uCtLtQmYtrXpLAJfvkE6WYVqCUl495Kx9l6M9TBLK5X6V3w=
-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 475: SEQUENCE {
  4 316:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   4:     INTEGER 27979789
 19  10:     SEQUENCE {
 21   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 31  56:     SEQUENCE {
 33  11:       SET {
 35   9:         SEQUENCE {
 37   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 42   2:           PrintableString 'XX'
       :           }
       :         }
 46  20:       SET {
 48  18:         SEQUENCE {
 50   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 55  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 68  19:       SET {
 70  17:         SEQUENCE {
 72   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 77  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 89  30:     SEQUENCE {
 91  13:       UTCTime 02/04/2024 12:37:47 GMT
106  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
121  28:     SEQUENCE {
123  26:       SET {
125  24:         SEQUENCE {
127   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
132  17:           UTF8String 'xn--18j4d.example'
       :           }
       :         }
       :       }
151  89:     SEQUENCE {
153  19:       SEQUENCE {
155   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
164   8:         OBJECT IDENTIFIER prime256v1 (1 2 840 10045 3 1 7)
       :         }
174  66:       BIT STRING
       :         04 42 25 48 F8 8F B7 82 FF B5 EC A3 74 44 52 C7
       :         2A 1E 55 8F BD 6F 73 BE 5E 48 E9 32 32 CC 45 C5
       :         B1 6C 4C D1 0C 4C B8 D5 B8 A1 71 39 E9 48 82 C8
       :         99 25 72 99 34 25 F4 14 19 AB 7E 90 A4 2A 49 42
       :         72
       :       }
242  80:     [3] {
244  78:       SEQUENCE {
246  29:         SEQUENCE {
248   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
253  22:           OCTET STRING, encapsulates {
255  20:             OCTET STRING
       :               5B 70 A7 98 17 F7 9F F6 37 D2 F7 E3 DC 44 6C 21
       :               09 D7 BB D4
       :             }
       :           }
277  31:         SEQUENCE {
279   3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
284  24:           OCTET STRING, encapsulates {
286  22:             SEQUENCE {
288  20:               [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :               }
       :             }
       :           }
310  12:         SEQUENCE {
312   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
317   1:           BOOLEAN TRUE
320   2:           OCTET STRING, encapsulates {
322   0:             SEQUENCE {}
       :             }
       :           }
       :         }
       :       }
       :     }
324  10:   SEQUENCE {
326   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
336 140:   BIT STRING, encapsulates {
340 136:     SEQUENCE {
343  66:       INTEGER
       :         00 8A 2D F1 26 0D 16 44 9C AD CB 18 E5 3F 35 1D
       :         29 8D CE 13 FF D0 60 BC EC DD D6 23 CE 3D 08 DD
       :         2A 98 D6 B4 9C C5 D6 F0 79 C3 28 64 79 9E FF C3
       :         F7 1F 93 F2 E2 CC 06 5A 45 51 69 87 42 65 C0 24
       :         F3 7C
411  66:       INTEGER
       :         01 5B C0 34 5E C8 B2 3C 9C 99 7D A6 62 78 E0 E6
       :         B6 7A 08 A1 B6 4F F9 E4 CB 35 69 06 50 52 FA B8
       :         2B 4B B5 09 98 B6 B5 E9 2C 02 5F BE 41 3A 59 85
       :         6A 09 49 78 F7 92 B1 F6 5E 8C F5 30 4B 2B 95 FA
       :         57 7C
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-responder-certificate">
        <name>OCSP Responder Certificate</name>
        <t>This is a certificate for the OCSP delegated response that signed the
OCSP response example below.</t>
        <t>The the key pair for the OCSP Responder certificate is the "testECCP384"
key from <xref target="RFC9500"/>, section 2.3.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIICSzCCAa6gAwIBAgIBATAKBggqhkjOPQQDBDA4MQswCQYDVQQGEwJYWDEUMBIG
A1UECgwLQ2VydHMgJ3IgVXMxEzARBgNVBAMMCklzc3VpbmcgQ0EwHhcNMjQwNDAy
MTIzNzQ3WhcNMjUwNDAyMTIzNzQ3WjA8MQswCQYDVQQGEwJYWDEUMBIGA1UECgwL
Q2VydHMgJ3IgVXMxFzAVBgNVBAMMDk9DU1AgUmVzcG9uZGVyMHYwEAYHKoZIzj0C
AQYFK4EEACIDYgAEWwkBuIUjKW65GdUP+hqcs3S8TUCVhigr/soRsdla27VHNK9X
C/grcijPImvPTCXdvP47GjrTlDDv92Ph1o0uFR2Rcgt3lbWNprNGOWE6j7m1qNpI
xnRxF/mRnoQk837Io4GHMIGEMB0GA1UdDgQWBBQK46D+ndQldpi163Lrygznvz31
8TAfBgNVHSMEGDAWgBSOwhQJYHbqkDjpOa4bbVLEF32fvjAMBgNVHRMBAf8EAjAA
MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDCTAPBgkrBgEFBQcw
AQUEAgUAMAoGCCqGSM49BAMEA4GKADCBhgJBFCqM1gpsZcd0Zd8RW8H/+L4OIbTa
GtpT2QY0pd6JBw91lFqNCxj+F1k9XJrKSQAVVAa/b3JaZOsRrH6vihlO3MYCQUkL
C0mmLubTRDH2v+6A1aycIVKIpR3G6+PuaD2Um3PSF7FElkoU4NYkbl1SH/8FzbDy
/LCBhih25e7hAtyg/XsI
-----END CERTIFICATE-----
]]></artwork>
        <artwork><![CDATA[
0 587: SEQUENCE {
  4 430:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 1
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :       }
 28  56:     SEQUENCE {
 30  11:       SET {
 32   9:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
 39   2:           PrintableString 'XX'
       :           }
       :         }
 43  20:       SET {
 45  18:         SEQUENCE {
 47   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
 52  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
 65  19:       SET {
 67  17:         SEQUENCE {
 69   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 74  10:           UTF8String 'Issuing CA'
       :           }
       :         }
       :       }
 86  30:     SEQUENCE {
 88  13:       UTCTime 02/04/2024 12:37:47 GMT
103  13:       UTCTime 02/04/2025 12:37:47 GMT
       :       }
118  60:     SEQUENCE {
120  11:       SET {
122   9:         SEQUENCE {
124   3:           OBJECT IDENTIFIER countryName (2 5 4 6)
129   2:           PrintableString 'XX'
       :           }
       :         }
133  20:       SET {
135  18:         SEQUENCE {
137   3:           OBJECT IDENTIFIER organizationName (2 5 4 10)
142  11:           UTF8String 'Certs 'r Us'
       :           }
       :         }
155  23:       SET {
157  21:         SEQUENCE {
159   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
164  14:           UTF8String 'OCSP Responder'
       :           }
       :         }
       :       }
180 118:     SEQUENCE {
182  16:       SEQUENCE {
184   7:         OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
193   5:         OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
       :         }
200  98:       BIT STRING
       :         04 5B 09 01 B8 85 23 29 6E B9 19 D5 0F FA 1A 9C
       :         B3 74 BC 4D 40 95 86 28 2B FE CA 11 B1 D9 5A DB
       :         B5 47 34 AF 57 0B F8 2B 72 28 CF 22 6B CF 4C 25
       :         DD BC FE 3B 1A 3A D3 94 30 EF F7 63 E1 D6 8D 2E
       :         15 1D 91 72 0B 77 95 B5 8D A6 B3 46 39 61 3A 8F
       :         B9 B5 A8 DA 48 C6 74 71 17 F9 91 9E 84 24 F3 7E
       :         C8
       :       }
300 135:     [3] {
303 132:       SEQUENCE {
306  29:         SEQUENCE {
308   3:           OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
313  22:           OCTET STRING, encapsulates {
315  20:             OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :             }
       :           }
337  31:         SEQUENCE {
339   3:           OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
344  24:           OCTET STRING, encapsulates {
346  22:             SEQUENCE {
348  20:               [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :               }
       :             }
       :           }
370  12:         SEQUENCE {
372   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
377   1:           BOOLEAN TRUE
380   2:           OCTET STRING, encapsulates {
382   0:             SEQUENCE {}
       :             }
       :           }
384  14:         SEQUENCE {
386   3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
391   1:           BOOLEAN TRUE
394   4:           OCTET STRING, encapsulates {
396   2:             BIT STRING 7 unused bits
       :               '1'B (bit 0)
       :             }
       :           }
400  19:         SEQUENCE {
402   3:           OBJECT IDENTIFIER extKeyUsage (2 5 29 37)
407  12:           OCTET STRING, encapsulates {
409  10:             SEQUENCE {
411   8:               OBJECT IDENTIFIER ocspSigning (1 3 6 1 5 5 7 3 9)
       :               }
       :             }
       :           }
421  15:         SEQUENCE {
423   9:           OBJECT IDENTIFIER ocspNoCheck (1 3 6 1 5 5 7 48 1 5)
434   2:           OCTET STRING, encapsulates {
436   0:             NULL
       :             }
       :           }
       :         }
       :       }
       :     }
438  10:   SEQUENCE {
440   8:     OBJECT IDENTIFIER ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :     }
450 138:   BIT STRING, encapsulates {
454 134:     SEQUENCE {
457  65:       INTEGER
       :         14 2A 8C D6 0A 6C 65 C7 74 65 DF 11 5B C1 FF F8
       :         BE 0E 21 B4 DA 1A DA 53 D9 06 34 A5 DE 89 07 0F
       :         75 94 5A 8D 0B 18 FE 17 59 3D 5C 9A CA 49 00 15
       :         54 06 BF 6F 72 5A 64 EB 11 AC 7E AF 8A 19 4E DC
       :         C6
524  65:       INTEGER
       :         49 0B 0B 49 A6 2E E6 D3 44 31 F6 BF EE 80 D5 AC
       :         9C 21 52 88 A5 1D C6 EB E3 EE 68 3D 94 9B 73 D2
       :         17 B1 44 96 4A 14 E0 D6 24 6E 5D 52 1F FF 05 CD
       :         B0 F2 FC B0 81 86 28 76 E5 EE E1 02 DC A0 FD 7B
       :         08
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-request">
        <name>OCSP Request</name>
        <t>This is a base64-encoded OCSP request for the end-entity certificate
above.</t>
        <artwork><![CDATA[
MGEwXzBdMFswWTANBglghkgBZQMEAgEFAAQgOplGd1aAc6cHv95QGGNF5M1hNNsI
Xrqh0QQl8DtvCOoEIEdKbKMB8j3J9/cHhwThx/X8lucWdfbtiC56tlw/WEVDAgQB
qvAN
]]></artwork>
        <artwork><![CDATA[
0  97: SEQUENCE {
  2  95:   SEQUENCE {
  4  93:     SEQUENCE {
  6  91:       SEQUENCE {
  8  89:         SEQUENCE {
 10  13:           SEQUENCE {
 12   9:             OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
 23   0:             NULL
       :             }
 25  32:           OCTET STRING
       :             3A 99 46 77 56 80 73 A7 07 BF DE 50 18 63 45 E4
       :             CD 61 34 DB 08 5E BA A1 D1 04 25 F0 3B 6F 08 EA
 59  32:           OCTET STRING
       :             47 4A 6C A3 01 F2 3D C9 F7 F7 07 87 04 E1 C7 F5
       :             FC 96 E7 16 75 F6 ED 88 2E 7A B6 5C 3F 58 45 43
 93   4:           INTEGER 27979789
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="ocsp-response">
        <name>OCSP Response</name>
        <t>This is a base64-encoded OCSP response for the end-entity certificate
above.</t>
        <artwork><![CDATA[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]]></artwork>
        <artwork><![CDATA[
0 927: SEQUENCE {
  4   1:   ENUMERATED 0
  7 920:   [0] {
 11 916:     SEQUENCE {
 15   9:       OBJECT IDENTIFIER ocspBasic (1 3 6 1 5 5 7 48 1 1)
 26 901:       OCTET STRING, encapsulates {
 30 897:         SEQUENCE {
 34 176:           SEQUENCE {
 37  22:             [2] {
 39  20:               OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :               }
 61  15:             GeneralizedTime 02/04/2024 12:37:47 GMT
 78 132:             SEQUENCE {
 81 129:               SEQUENCE {
 84  89:                 SEQUENCE {
 86  13:                   SEQUENCE {
 88   9:                     OBJECT IDENTIFIER
       :                       sha-256 (2 16 840 1 101 3 4 2 1)
 99   0:                     NULL
       :                     }
101  32:                   OCTET STRING
       :               3A 99 46 77 56 80 73 A7 07 BF DE 50 18 63 45 E4
       :               CD 61 34 DB 08 5E BA A1 D1 04 25 F0 3B 6F 08 EA
135  32:                   OCTET STRING
       :               47 4A 6C A3 01 F2 3D C9 F7 F7 07 87 04 E1 C7 F5
       :               FC 96 E7 16 75 F6 ED 88 2E 7A B6 5C 3F 58 45 43
169   4:                   INTEGER 27979789
       :                   }
175   0:                 [0]
177  15:                 GeneralizedTime 03/04/2024 12:37:47 GMT
194  17:                 [0] {
196  15:                   GeneralizedTime 10/04/2024 12:37:47 GMT
       :                   }
       :                 }
       :               }
       :             }
213  10:           SEQUENCE {
215   8:             OBJECT IDENTIFIER
       :               ecdsaWithSHA384 (1 2 840 10045 4 3 3)
       :             }
225 105:           BIT STRING, encapsulates {
228 102:             SEQUENCE {
230  49:               INTEGER
       :               00 D1 99 59 A2 21 BE 03 9B DC 84 5E 2B F6 5E DA
       :               1E 42 2E 9F B6 98 CB 9A 50 6A A9 12 22 FB 78 6D
       :               7C 5F CE CA 37 47 9C 5B A1 DF C7 10 29 8A AA AD
       :               66
281  49:               INTEGER
       :               00 CA 88 F7 2D 56 EE D2 42 CE 7C ED DD 99 04 41
       :               D0 1F 6D 23 E4 01 62 18 6B 1B 23 56 F7 F8 2F 59
       :               2B A3 48 CE 00 FA 0E 75 A5 0F 0A 52 7E 29 44 6A
       :               B3
       :               }
       :             }
332 595:           [0] {
336 591:             SEQUENCE {
340 587:               SEQUENCE {
344 430:                 SEQUENCE {
348   3:                   [0] {
350   1:                     INTEGER 2
       :                     }
353   1:                   INTEGER 1
356  10:                   SEQUENCE {
358   8:                     OBJECT IDENTIFIER
       :                       ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :                     }
368  56:                   SEQUENCE {
370  11:                     SET {
372   9:                       SEQUENCE {
374   3:                         OBJECT IDENTIFIER countryName (2 5 4 6)
379   2:                         PrintableString 'XX'
       :                         }
       :                       }
383  20:                     SET {
385  18:                       SEQUENCE {
387   3:                         OBJECT IDENTIFIER
       :                           organizationName (2 5 4 10)
392  11:                         UTF8String 'Certs 'r Us'
       :                         }
       :                       }
405  19:                     SET {
407  17:                       SEQUENCE {
409   3:                         OBJECT IDENTIFIER commonName (2 5 4 3)
414  10:                         UTF8String 'Issuing CA'
       :                         }
       :                       }
       :                     }
426  30:                   SEQUENCE {
428  13:                     UTCTime 02/04/2024 12:37:47 GMT
443  13:                     UTCTime 02/04/2025 12:37:47 GMT
       :                     }
458  60:                   SEQUENCE {
460  11:                     SET {
462   9:                       SEQUENCE {
464   3:                         OBJECT IDENTIFIER countryName (2 5 4 6)
469   2:                         PrintableString 'XX'
       :                         }
       :                       }
473  20:                     SET {
475  18:                       SEQUENCE {
477   3:                         OBJECT IDENTIFIER
       :                           organizationName (2 5 4 10)
482  11:                         UTF8String 'Certs 'r Us'
       :                         }
       :                       }
495  23:                     SET {
497  21:                       SEQUENCE {
499   3:                         OBJECT IDENTIFIER commonName (2 5 4 3)
504  14:                         UTF8String 'OCSP Responder'
       :                         }
       :                       }
       :                     }
520 118:                   SEQUENCE {
522  16:                     SEQUENCE {
524   7:                       OBJECT IDENTIFIER
       :                         ecPublicKey (1 2 840 10045 2 1)
533   5:                       OBJECT IDENTIFIER
       :                         secp384r1 (1 3 132 0 34)
       :                       }
540  98:                     BIT STRING
       :               04 5B 09 01 B8 85 23 29 6E B9 19 D5 0F FA 1A 9C
       :               B3 74 BC 4D 40 95 86 28 2B FE CA 11 B1 D9 5A DB
       :               B5 47 34 AF 57 0B F8 2B 72 28 CF 22 6B CF 4C 25
       :               DD BC FE 3B 1A 3A D3 94 30 EF F7 63 E1 D6 8D 2E
       :               15 1D 91 72 0B 77 95 B5 8D A6 B3 46 39 61 3A 8F
       :               B9 B5 A8 DA 48 C6 74 71 17 F9 91 9E 84 24 F3 7E
       :               C8
       :                     }
640 135:                   [3] {
643 132:                     SEQUENCE {
646  29:                       SEQUENCE {
648   3:                         OBJECT IDENTIFIER
       :                           subjectKeyIdentifier (2 5 29 14)
653  22:                         OCTET STRING, encapsulates {
655  20:                           OCTET STRING
       :               0A E3 A0 FE 9D D4 25 76 98 B5 EB 72 EB CA 0C E7
       :               BF 3D F5 F1
       :                           }
       :                         }
677  31:                       SEQUENCE {
679   3:                         OBJECT IDENTIFIER
       :                           authorityKeyIdentifier (2 5 29 35)
684  24:                         OCTET STRING, encapsulates {
686  22:                           SEQUENCE {
688  20:                             [0]
       :               8E C2 14 09 60 76 EA 90 38 E9 39 AE 1B 6D 52 C4
       :               17 7D 9F BE
       :                             }
       :                           }
       :                         }
710  12:                       SEQUENCE {
712   3:                         OBJECT IDENTIFIER
       :                           basicConstraints (2 5 29 19)
717   1:                         BOOLEAN TRUE
720   2:                         OCTET STRING, encapsulates {
722   0:                           SEQUENCE {}
       :                           }
       :                         }
724  14:                       SEQUENCE {
726   3:                         OBJECT IDENTIFIER keyUsage (2 5 29 15)
731   1:                         BOOLEAN TRUE
734   4:                         OCTET STRING, encapsulates {
736   2:                           BIT STRING 7 unused bits
       :                             '1'B (bit 0)
       :                           }
       :                         }
740  19:                       SEQUENCE {
742   3:                         OBJECT IDENTIFIER
       :                           extKeyUsage (2 5 29 37)
747  12:                         OCTET STRING, encapsulates {
749  10:                           SEQUENCE {
751   8:                             OBJECT IDENTIFIER
       :                               ocspSigning (1 3 6 1 5 5 7 3 9)
       :                             }
       :                           }
       :                         }
761  15:                       SEQUENCE {
763   9:                         OBJECT IDENTIFIER
       :                           ocspNoCheck (1 3 6 1 5 5 7 48 1 5)
774   2:                         OCTET STRING, encapsulates {
776   0:                           NULL
       :                           }
       :                         }
       :                       }
       :                     }
       :                   }
778  10:                 SEQUENCE {
780   8:                   OBJECT IDENTIFIER
       :                     ecdsaWithSHA512 (1 2 840 10045 4 3 4)
       :                   }
790 138:                 BIT STRING, encapsulates {
794 134:                   SEQUENCE {
797  65:                     INTEGER
       :               14 2A 8C D6 0A 6C 65 C7 74 65 DF 11 5B C1 FF F8
       :               BE 0E 21 B4 DA 1A DA 53 D9 06 34 A5 DE 89 07 0F
       :               75 94 5A 8D 0B 18 FE 17 59 3D 5C 9A CA 49 00 15
       :               54 06 BF 6F 72 5A 64 EB 11 AC 7E AF 8A 19 4E DC
       :               C6
864  65:                     INTEGER
       :               49 0B 0B 49 A6 2E E6 D3 44 31 F6 BF EE 80 D5 AC
       :               9C 21 52 88 A5 1D C6 EB E3 EE 68 3D 94 9B 73 D2
       :               17 B1 44 96 4A 14 E0 D6 24 6E 5D 52 1F FF 05 CD
       :               B0 F2 FC B0 81 86 28 76 E5 EE E1 02 DC A0 FD 7B
       :               08
       :                     }
       :                   }
       :                 }
       :               }
       :             }
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this version of the document wish to thank Alex Deacon
and Ryan Hurst for their work to produce the original version
of the lightweight profile for the OCSP protocol.</t>
      <t>The authors of this version of the document wish to thank
Paul Kyzivat, Russ Housley, Rob Stradling, Roman Danyliw, and
Wendy Brown for their reviews, feedback, and suggestions.</t>
      <t>The authors wish to thank Magnus Nystrom of RSA Security, Inc.,
Jagjeet Sondh of Vodafone Group R&amp;D, and David Engberg of CoreStreet,
Ltd. for their contributions to the original <xref target="RFC5019"/> specification.
Listed organizational affiliations reflect the author’s affiliation
at the time of RFC5019 was published.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
