<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bonnell-rfc5019bis-00" category="std" consensus="true" submissionType="IETF" updates="5019" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="RFC5019bis">Updates Lightweight OCSP Profile for High Volume Environments</title>
    <seriesInfo name="Internet-Draft" value="draft-bonnell-rfc5019bis-00"/>
    <author fullname="Corey Bonnell">
      <organization>Digicert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Clint Wilson">
      <organization>Apple, Inc.</organization>
      <address>
        <email>clintw@apple.com</email>
      </address>
    </author>
    <author fullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="02"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document updates RFC5019, and allows OCSP client to use SHA-256.
An RFC5019 compliant OCSP client is still able to use SHA-1, but it might be obsolete in the future.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Online Certificate Status Protocol <xref target="RFC6960"/> specifies a mechanism
used to determine the status of digital certificates, in lieu of
using Certificate Revocation Lists (CRLs).  Since its definition in
1999, it has been deployed in a variety of environments and has
proven to be a useful certificate status checking mechanism.  (For
brevity we refer to OCSP as being used to verify certificate status,
but only the revocation status of a certificate is checked via this
protocol.)</t>
      <t>To date, many OCSP deployments have been used to ensure timely and
secure certificate status information for high-value electronic
transactions or highly sensitive information, such as in the banking
and financial environments.  As such, the requirement for an OCSP
responder to respond in "real time" (i.e., generating a new OCSP
response for each OCSP request) has been important.  In addition,
these deployments have operated in environments where bandwidth usage
is not an issue, and have run on client and server systems where
processing power is not constrained.</t>
      <t>As the use of PKI continues to grow and move into diverse
environments, so does the need for a scalable and cost-effective
certificate status mechanism.  Although OCSP as currently defined and
deployed meets the need of small to medium-sized PKIs that operate on
powerful systems on wired networks, there is a limit as to how these
OCSP deployments scale from both an efficiency and cost perspective.
Mobile environments, where network bandwidth may be at a premium and
client-side devices are constrained from a processing point of view,
require the careful use of OCSP to minimize bandwidth usage and
client-side processing complexity. [OCSPMP]</t>
      <t>PKI continues to be deployed into environments where millions if not
hundreds of millions of certificates have been issued.  In many of
these environments, an even larger number of users (also known as
relying parties) have the need to ensure that the certificate they
are relying upon has not been revoked.  As such, it is important that
OCSP is used in such a way that ensures the load on OCSP responders
and the network infrastructure required to host those responders are
kept to a minimum.</t>
      <t>This document addresses the scalability issues inherent when using
OCSP in PKI environments described above by defining a message
profile and clarifying OCSP client and responder behavior that will
permit:</t>
      <ol spacing="normal" type="1"><li>OCSP response pre-production and distribution.</li>
        <li>Reduced OCSP message size to lower bandwidth usage.</li>
        <li>Response message caching both in the network and on the client.</li>
      </ol>
      <t>It is intended that the normative requirements defined in this
profile will be adopted by OCSP clients and OCSP responders operating
in very large-scale (high-volume) PKI environments or PKI
environments that require a lightweight solution to minimize
bandwidth and client-side processing power (or both), as described
above.  As OCSP does not have the means to signal responder
capabilities within the protocol, clients needing to differentiate
between OCSP responses produced by responders conformant with this
profile and those that are not need to rely on out-of-band mechanisms
to determine when a responder operates according to this profile and,
as such, when the requirements of this profile apply.  In the case
where out-of-band mechanisms may not be available, this profile
ensures that interoperability will still occur between a fully
conformant OCSP 6960 client and a responder that is operating in a
mode as described in this specification.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="ocsp-message-profile">
      <name>OCSP Message Profile</name>
      <t>This section defines a subset of OCSPRequest and OCSPResponse
functionality as defined in <xref target="RFC6960"/>.</t>
      <section anchor="ocsp-request-profile">
        <name>OCSP Request Profile</name>
        <section anchor="ocsprequest-structure">
          <name>OCSPRequest Structure</name>
          <t>OCSPRequests conformant to this profile <bcp14>MUST</bcp14> include only one Request
in the OCSPRequest.RequestList structure.</t>
          <t>Older OCSP Clients which provide backward compatibility with <xref target="RFC5019"/>
            <bcp14>MUST</bcp14> use SHA-1 as the hashing algorithm for the
CertID.issuerNameHash and the CertID.issuerKeyHash values.</t>
          <t>Newer OCSP Clients that support this document <bcp14>MUST</bcp14>
use SHA-256 as the hashing algorithm for the
CertID.issuerNameHash and the CertID.issuerKeyHash values.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> include the singleRequestExtensions structure.</t>
          <t>Clients <bcp14>SHOULD NOT</bcp14> include the requestExtensions structure.  If a
requestExtensions structure is included, this profile RECOMMENDS that
it contain only the nonce extension (id-pkix-ocsp-nonce).  See
Section 4 for issues concerning the use of a nonce in high-volume
OCSP environments.</t>
        </section>
        <section anchor="signed-ocsprequests">
          <name>Signed OCSPRequests</name>
          <t>Clients <bcp14>SHOULD NOT</bcp14> send signed OCSPRequests.  Responders <bcp14>MAY</bcp14> ignore
the signature on OCSPRequests.</t>
          <t>If the OCSPRequest is signed, the client <bcp14>SHALL</bcp14> specify its name in
the OCSPRequest.requestorName field; otherwise, clients <bcp14>SHOULD NOT</bcp14>
include the requestorName field in the OCSPRequest.  OCSP servers
<bcp14>MUST</bcp14> be prepared to receive unsigned OCSP requests that contain the
requestorName field, but must realize that the provided value is not
authenticated.</t>
        </section>
      </section>
      <section anchor="ocsp-response-profile">
        <name>OCSP Response Profile</name>
        <section anchor="ocspresponse-structure">
          <name>OCSPResponse Structure</name>
          <t>Responders <bcp14>MUST</bcp14> generate a BasicOCSPResponse as identified by the
id-pkix-ocsp-basic OID.  Clients <bcp14>MUST</bcp14> be able to parse and accept a
BasicOCSPResponse.  OCSPResponses conformant to this profile <bcp14>SHOULD</bcp14>
include only one SingleResponse in the ResponseData.responses
structure, but <bcp14>MAY</bcp14> include additional SingleResponse elements if
necessary to improve response pre-generation performance or cache
efficiency.</t>
          <t>The responder <bcp14>SHOULD NOT</bcp14> include responseExtensions.  As specified in
<xref target="RFC6960"/>, clients <bcp14>MUST</bcp14> ignore unrecognized non-critical
responseExtensions in the response.</t>
          <t>In the case where a responder does not have the ability to respond to
an OCSP request containing an option not supported by the server, it
<bcp14>SHOULD</bcp14> return the most complete response it can.  For example, in the
case where a responder only supports pre-produced responses and does
not have the ability to respond to an OCSP request containing a
nonce, it <bcp14>SHOULD</bcp14> return a response that does not include a nonce.</t>
          <t>Clients <bcp14>SHOULD</bcp14> attempt to process a response even if the response
does not include a nonce.  See Section 4 for details on validating
responses that do not contain a nonce.  See also Section 7 for
relevant security considerations.</t>
          <t>Responders that do not have the ability to respond to OCSP requests
that contain an unsupported option such as a nonce <bcp14>MAY</bcp14> forward the
request to an OCSP responder capable of doing so.</t>
          <t>The responder <bcp14>MAY</bcp14> include the singleResponse.singleResponse
extensions structure.</t>
        </section>
        <section anchor="signed-ocspresponses">
          <name>Signed OCSPResponses</name>
          <t>Clients <bcp14>MUST</bcp14> validate the signature on the returned OCSPResponse.</t>
          <t>If the response is signed by a delegate of the issuing certification
authority (CA), a valid responder certificate <bcp14>MUST</bcp14> be referenced in
the BasicOCSPResponse.certs structure.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> that the OCSP responder's certificate contain the
id-pkix-ocsp-nocheck extension, as defined in <xref target="RFC6960"/>, to indicate to
the client that it need not check the certificate's status.  In
addition, it is <bcp14>RECOMMENDED</bcp14> that neither an OCSP authorityInfoAccess
(AIA) extension nor cRLDistributionPoints (CRLDP) extension be
included in the OCSP responder's certificate.  Accordingly, the
responder's signing certificate <bcp14>SHOULD</bcp14> be relatively short-lived and
renewed regularly.</t>
          <t>Clients <bcp14>MUST</bcp14> be able to identify OCSP responder certificates using
both the byName and byKey ResponseData.ResponderID choices.
Responders <bcp14>SHOULD</bcp14> use byKey to further reduce the size of the
response in scenarios where reducing bandwidth is an issue.</t>
        </section>
        <section anchor="ocspresponsestatus-values">
          <name>OCSPResponseStatus Values</name>
          <t>As long as the OCSP infrastructure has authoritative records for a
particular certificate, an OCSPResponseStatus of "successful" will be
returned.  When access to authoritative records for a particular
certificate is not available, the responder <bcp14>MUST</bcp14> return an
OCSPResponseStatus of "unauthorized".  As such, this profile extends
the RFC 6960 <xref target="RFC6960"/> definition of "unauthorized" as follows:</t>
          <t>The response "unauthorized" is returned in cases where the client
is not authorized to make this query to this server or the server
is not capable of responding authoritatively.</t>
          <t>For example, OCSP responders that do not have access to authoritative
records for a requested certificate, such as those that generate and
distribute OCSP responses in advance and thus do not have the ability
to properly respond with a signed "successful" yet "unknown"
response, will respond with an OCSPResponseStatus of "unauthorized".
Also, in order to ensure the database of revocation information does
not grow unbounded over time, the responder <bcp14>MAY</bcp14> remove the status
records of expired certificates.  Requests from clients for
  certificates whose record has been removed will result in an
  OCSPResponseStatus of "unauthorized".</t>
          <t>Security considerations regarding the use of unsigned responses are
discussed in <xref target="RFC6960"/>.</t>
        </section>
        <section anchor="thisupdate-nextupdate-and-producedat">
          <name>thisUpdate, nextUpdate, and producedAt</name>
          <t>When pre-producing OCSPResponse messages, the responder <bcp14>MUST</bcp14> set the
thisUpdate, nextUpdate, and producedAt times as follows:</t>
          <t>thisUpdate    The time at which the status being indicated is known to be correct.</t>
          <t>nextUpdate    The time at or before which newer information will be
available about the status of the certificate.
Responders <bcp14>MUST</bcp14> always include this value to aid in
response caching.  See Section 6 for additional
information on caching.</t>
          <t>producedAt    The time at which the OCSP response was signed.</t>
          <t>Note: In many cases the value of thisUpdate and producedAt will be
the same.</t>
          <t>For the purposes of this profile, ASN.1-encoded GeneralizedTime
values such as thisUpdate, nextUpdate, and producedAt <bcp14>MUST</bcp14> be
expressed Greenwich Mean Time (Zulu) and <bcp14>MUST</bcp14> include seconds (i.e.,
times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values <bcp14>MUST NOT</bcp14> include fractional seconds.</t>
        </section>
      </section>
    </section>
    <section anchor="client-behavior">
      <name>Client Behavior</name>
      <section anchor="ocsp-responder-discovery">
        <name>OCSP Responder Discovery</name>
        <t>Clients <bcp14>MUST</bcp14> support the authorityInfoAccess extension as defined in
<xref target="RFC5280"/> and <bcp14>MUST</bcp14> recognize the id-ad-ocsp access method.  This enables
CAs to inform clients how they can contact the OCSP service.</t>
        <t>In the case where a client is checking the status of a certificate
that contains both an authorityInformationAccess (AIA) extension
pointing to an OCSP responder and a cRLDistributionPoints extension
pointing to a CRL, the client <bcp14>SHOULD</bcp14> attempt to contact the OCSP
responder first.  Clients <bcp14>MAY</bcp14> attempt to retrieve the CRL if no
OCSPResponse is received from the responder after a locally
configured timeout and number of retries.</t>
      </section>
      <section anchor="sending-an-ocsp-request">
        <name>Sending an OCSP Request</name>
        <t>To avoid needless network traffic, applications <bcp14>MUST</bcp14> verify the
signature of signed data before asking an OCSP client to check the
status of certificates used to verify the data.  If the signature is
invalid or the application is not able to verify it, an OCSP check
<bcp14>MUST NOT</bcp14> be requested.</t>
        <t>Similarly, an application <bcp14>MUST</bcp14> validate the signature on certificates
in a chain, before asking an OCSP client to check the status of the
certificate.  If the certificate signature is invalid or the
application is not able to verify it, an OCSP check <bcp14>MUST NOT</bcp14> be
requested.  Clients <bcp14>SHOULD NOT</bcp14> make a request to check the status of
expired certificates.</t>
      </section>
    </section>
    <section anchor="ensuring-an-ocspresponse-is-fresh">
      <name>Ensuring an OCSPResponse Is Fresh</name>
      <t>In order to ensure that a client does not accept an out-of-date
response that indicates a 'good' status when in fact there is a more
up-to-date response that specifies the status of 'revoked', a client
must ensure the responses they receive are fresh.</t>
      <t>In general, two mechanisms are available to clients to ensure a
response is fresh.  The first uses nonces, and the second is based on
time.  In order for time-based mechanisms to work, both clients and
responders <bcp14>MUST</bcp14> have access to an accurate source of time.</t>
      <t>Because this profile specifies that clients <bcp14>SHOULD NOT</bcp14> include a
requestExtensions structure in OCSPRequests (see Section 2.1),
clients <bcp14>MUST</bcp14> be able to determine OCSPResponse freshness based on an
accurate source of time.  Clients that opt to include a nonce in the
request <bcp14>SHOULD NOT</bcp14> reject a corresponding OCSPResponse solely on the
basis of the nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to
validating the OCSPResponse based on time.</t>
      <t>Clients that do not include a nonce in the request <bcp14>MUST</bcp14> ignore any
nonce that may be present in the response.</t>
      <t>Clients <bcp14>MUST</bcp14> check for the existence of the nextUpdate field and <bcp14>MUST</bcp14>
ensure the current time, expressed in GMT time as described in
Section 2.2.4, falls between the thisUpdate and nextUpdate times.  If
the nextUpdate field is absent, the client <bcp14>MUST</bcp14> reject the response.</t>
      <t>If the nextUpdate field is present, the client <bcp14>MUST</bcp14> ensure that it is
not earlier than the current time.  If the current time on the client
is later than the time specified in the nextUpdate field, the client
<bcp14>MUST</bcp14> reject the response as stale.  Clients <bcp14>MAY</bcp14> allow configuration
of a small tolerance period for acceptance of responses after
nextUpdate to handle minor clock differences relative to responders
and caches.  This tolerance period should be chosen based on the
accuracy and precision of time synchronization technology available
to the calling application environment.  For example, Internet peers
with low latency connections typically expect NTP time
synchronization to keep them accurate within parts of a second;
higher latency environments or where an NTP analogue is not available
may have to be more liberal in their tolerance.</t>
      <t>See the security considerations in Section 7 for additional details on
replay and man-in-the-middle attacks.</t>
    </section>
    <section anchor="transport-profile">
      <name>Transport Profile</name>
      <t>The OCSP responder <bcp14>MUST</bcp14> support requests and responses over HTTP.
When sending requests that are less than or equal to 255 bytes in
total (after encoding) including the scheme and delimiters (http://),
server name and base64-encoded OCSPRequest structure, clients <bcp14>MUST</bcp14>
use the GET method (to enable OCSP response caching).  OCSP requests
larger than 255 bytes <bcp14>SHOULD</bcp14> be submitted using the POST method.  In
all cases, clients <bcp14>MUST</bcp14> follow the descriptions in A.1.1 of <xref target="RFC6960"/>
when constructing these messages.</t>
      <t>When constructing a GET message, OCSP clients <bcp14>MUST</bcp14> base64 encode the
OCSPRequest structure and append it to the URI specified in the AIA
extension <xref target="RFC5280"/>.  Clients <bcp14>MUST NOT</bcp14> include CR or LF characters in
the base64-encoded string.  Clients <bcp14>MUST</bcp14> properly URL-encode the
base64 encoded OCSPRequest.  For example:</t>
      <t><eref target="http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dAdeGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D">http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dAdeGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D</eref></t>
      <t>In response to properly formatted OCSPRequests that are cachable
(i.e., responses that contain a nextUpdate value), the responder will
include the binary value of the DER encoding of the OCSPResponse
preceded by the following HTTP <xref target="RFC9110"/> headers.</t>
      <t>content-type: application/ocsp-response
content-length: &lt; OCSP response length &gt;
last-modified: &lt; producedAt <xref target="RFC9110"/> date &gt;
ETag: "&lt; strong validator &gt;"
expires: &lt; nextUpdate <xref target="RFC9110"/> date&gt;
cache-control: max-age=&lt; n &gt;, public, no-transform, must-revalidate
date: &lt; current <xref target="RFC9110"/> date &gt;</t>
      <t>See Section 6.2 for details on the use of these headers.</t>
    </section>
    <section anchor="caching-recommendations">
      <name>Caching Recommendations</name>
      <t>The ability to cache OCSP responses throughout the network is an
important factor in high volume OCSP deployments.  This section
discusses the recommended caching behavior of OCSP clients and HTTP
proxies and the steps that should be taken to minimize the number of
times that OCSP clients "hit the wire".  In addition, the concept of
including OCSP responses in protocol exchanges (aka stapling or
piggybacking), such as has been defined in TLS, is also discussed.</t>
      <section anchor="caching-at-the-client">
        <name>Caching at the Client</name>
        <t>To minimize bandwidth usage, clients <bcp14>MUST</bcp14> locally cache authoritative
OCSP responses (i.e., a response with a signature that has been
successfully validated and that indicate an OCSPResponseStatus of
'successful').</t>
        <t>Most OCSP clients will send OCSPRequests at or near the nextUpdate
time (when a cached response expires).  To avoid large spikes in
responder load that might occur when many clients refresh cached
responses for a popular certificate, responders <bcp14>MAY</bcp14> indicate when the
client should fetch an updated OCSP response by using the cache-
control:max-age directive.  Clients <bcp14>SHOULD</bcp14> fetch the updated OCSP
Response on or after the max-age time.  To ensure that clients
receive an updated OCSP response, OCSP responders <bcp14>MUST</bcp14> refresh the
OCSP response before the max-age time.</t>
      </section>
      <section anchor="http-proxies">
        <name>HTTP Proxies</name>
        <t>The responder <bcp14>SHOULD</bcp14> set the HTTP headers of the OCSP response in
such a way as to allow for the intelligent use of intermediate HTTP
proxy servers.  See <xref target="RFC9110"/>for the full definition of these headers
and the proper format of any date and time values.</t>
        <t>HTTP Header     Description
===========    ====================================================
date            The date and time at which the OCSP server generated
the HTTP response.</t>
        <t>last-modified   This value specifies the date and time at which the
OCSP responder last modified the response.  This date
and time will be the same as the thisUpdate timestamp
in the request itself.</t>
        <t>expires         Specifies how long the response is considered fresh.
This date and time will be the same as the nextUpdate
timestamp in the OCSP response itself.</t>
        <t>ETag            A string that identifies a particular version of the
associated data.  This profile RECOMMENDS that the
ETag value be the ASCII HEX representation of the
SHA-256 hash of the OCSPResponse structure.</t>
        <t>cache-control   Contains a number of caching directives.</t>
        <ul spacing="normal">
          <li>max-age = &lt; n &gt;     -where n is a time value later than
thisUpdate but earlier than
nextUpdate.</li>
          <li>public          -makes normally uncachable response
cachable by both shared and nonshared
caches.</li>
          <li>no-transform    -specifies that a proxy cache cannot
change the type, length, or encoding
of the object content.</li>
          <li>must-revalidate -prevents caches from intentionally
returning stale responses.</li>
        </ul>
        <t>OCSP responders <bcp14>MUST NOT</bcp14> include a "Pragma: no-cache", "Cache-
Control: no-cache", or "Cache-Control: no-store" header in
authoritative OCSP responses.</t>
        <t>OCSP responders <bcp14>SHOULD</bcp14> include one or more of these headers in non-
authoritative OCSP responses.</t>
        <t>For example, assume that an OCSP response has the following timestamp
values:</t>
        <t>thisUpdate = May 1, 2005  01:00:00 GMT</t>
        <t>nextUpdate = May 3, 2005 01:00:00 GMT</t>
        <t>productedAt = May 1, 2005 01:00:00 GMT</t>
        <t>and that an OCSP client requests the response on May 2, 2005 01:00:00
GMT.  In this scenario, the HTTP response may look like this:</t>
        <t>content-type: application/ocsp-response</t>
        <t>content-length: 1000</t>
        <t>date: Fri, 02 May 2005 01:00:00 GMT</t>
        <t>last-modified: Thu, 01 May 2005 01:00:00 GMT</t>
        <t>ETag: "c66c0341abd7b9346321d5470fd0ec7cc4dae713"</t>
        <t>expires: Sat, 03 May 2005 01:00:00 GMT</t>
        <t>cache-control: max-age=86000,public,no-transform,must-revalidate</t>
        <t>&lt;...&gt;</t>
        <t>OCSP clients <bcp14>MUST NOT</bcp14> include a no-cache header in OCSP request
messages, unless the client encounters an expired response which may
be a result of an intermediate proxy caching stale data.  In this
situation, clients <bcp14>SHOULD</bcp14> resend the request specifying that proxies
should be bypassed by including an appropriate HTTP header in the
request (i.e., Pragma: no-cache or Cache-Control: no-cache).</t>
      </section>
      <section anchor="caching-at-servers">
        <name>Caching at Servers</name>
        <t>In some scenarios, it is advantageous to include OCSP response
information within the protocol being utilized between the client and
server.  Including OCSP responses in this manner has a few attractive
effects.</t>
        <t>First, it allows for the caching of OCSP responses on the server,
thus lowering the number of hits to the OCSP responder.</t>
        <t>Second, it enables certificate validation in the event the client is
not connected to a network and thus eliminates the need for clients
to establish a new HTTP session with the responder.</t>
        <t>Third, it reduces the number of round trips the client needs to make
in order to complete a handshake.</t>
        <t>Fourth, it simplifies the client-side OCSP implementation by enabling
a situation where the client need only the ability to parse and
recognize OCSP responses.</t>
        <t>This functionality has been specified as an extension to the TLS
<xref target="I-D.ietf-tls-rfc8446bis"/> protocol in Section 4.4.2.1 <xref target="I-D.ietf-tls-rfc8446bis"/>, but can be applied to any
client-server protocol.</t>
        <t>This profile RECOMMENDS that both TLS clients and servers implement
the certificate status request extension mechanism for TLS.</t>
        <t>Further information regarding caching issues can be obtained from <xref target="RFC3143"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The following considerations apply in addition to the security
considerations addressed in Section 5 of <xref target="RFC6960"/>.</t>
      <section anchor="replay-attacks">
        <name>Replay Attacks</name>
        <t>Because the use of nonces in this profile is optional, there is a
possibility that an out of date OCSP response could be replayed, thus
causing a client to accept a good response when in fact there is a
more up-to-date response that specifies the status of revoked.  In
order to mitigate this attack, clients <bcp14>MUST</bcp14> have access to an
accurate source of time and ensure that the OCSP responses they
receive are sufficiently fresh.</t>
        <t>Clients that do not have an accurate source of date and time are
vulnerable to service disruption.  For example, a client with a
sufficiently fast clock may reject a fresh OCSP response.  Similarly
a client with a sufficiently slow clock may incorrectly accept
expired valid responses for certificates that may in fact be revoked.</t>
        <t>Future versions of the OCSP protocol may provide a way for the client
to know whether the server supports nonces or does not support
nonces.  If a client can determine that the server supports nonces,
it <bcp14>MUST</bcp14> reject a reply that does not contain an expected nonce.
Otherwise, clients that opt to include a nonce in the request <bcp14>SHOULD
NOT</bcp14> reject a corresponding OCSPResponse solely on the basis of the
nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to validating the
OCSPResponse based on time.</t>
      </section>
      <section anchor="man-in-the-middle-attacks">
        <name>Man-in-the-Middle Attacks</name>
        <t>To mitigate risk associated with this class of attack, the client
must properly validate the signature on the response.</t>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of the OCSP responder and to verify that it is authorized to
sign responses on the CA's behalf.</t>
        <t>Clients <bcp14>MUST</bcp14> ensure that they are communicating with an authorized
responder by the rules described in <xref target="RFC6960"/>, Section 4.2.2.2.</t>
      </section>
      <section anchor="impersonation-attacks">
        <name>Impersonation Attacks</name>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of OCSP responder.</t>
        <t>As detailed in <xref target="RFC6960"/>, clients must properly validate the signature
of the OCSP response and the signature on the OCSP response signer
certificate to ensure an authorized responder created it.</t>
      </section>
      <section anchor="denial-of-service-attacks">
        <name>Denial-of-Service Attacks</name>
        <t>OCSP responders should take measures to prevent or mitigate denial-
of-service attacks.  As this profile specifies the use of unsigned
OCSPRequests, access to the responder may be implicitly given to
everyone who can send a request to a responder, and thus the ability
to mount a denial-of-service attack via a flood of requests may be
greater.  For example, a responder could limit the rate of incoming
requests from a particular IP address if questionable behavior is
detected.</t>
      </section>
      <section anchor="modification-of-http-headers">
        <name>Modification of HTTP Headers</name>
        <t>Values included in HTTP headers, as described in Sections 5 and 6,
are not cryptographically protected; they may be manipulated by an
attacker.  Clients <bcp14>SHOULD</bcp14> use these values for caching guidance only
and ultimately <bcp14>SHOULD</bcp14> rely only on the values present in the signed
OCSPResponse.  Clients <bcp14>SHOULD NOT</bcp14> rely on cached responses beyond the
nextUpdate time.</t>
      </section>
      <section anchor="request-authentication-and-authorization">
        <name>Request Authentication and Authorization</name>
        <t>The suggested use of unsigned requests in this environment removes an
option that allows the responder to determine the authenticity of
incoming request.  Thus, access to the responder may be implicitly
given to everyone who can send a request to a responder.
Environments where explicit authorization to access the OCSP
responder is necessary can utilize other mechanisms to authenticate
requestors or restrict or meter service.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="M. Myers" initials="M." surname="Myers">
              <organization/>
            </author>
            <author fullname="R. Ankney" initials="R." surname="Ankney">
              <organization/>
            </author>
            <author fullname="A. Malpani" initials="A." surname="Malpani">
              <organization/>
            </author>
            <author fullname="S. Galperin" initials="S." surname="Galperin">
              <organization/>
            </author>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents.  This document obsoletes RFCs 2560 and 6277.  It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5019">
          <front>
            <title>The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments</title>
            <author fullname="A. Deacon" initials="A." surname="Deacon">
              <organization/>
            </author>
            <author fullname="R. Hurst" initials="R." surname="Hurst">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>This specification defines a profile of the Online Certificate Status Protocol (OCSP) that addresses the scalability issues inherent when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) environments and/or in PKI environments that require a lightweight solution to minimize communication bandwidth and client-side processing.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5019"/>
          <seriesInfo name="DOI" value="10.17487/RFC5019"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-05"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3143">
          <front>
            <title>Known HTTP Proxy/Caching Problems</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper">
              <organization/>
            </author>
            <author fullname="J. Dilley" initials="J." surname="Dilley">
              <organization/>
            </author>
            <date month="June" year="2001"/>
            <abstract>
              <t>This document catalogs a number of known problems with World Wide Web (WWW) (caching) proxies and cache servers.  The goal of the document is to provide a discussion of the problems and proposed workarounds, and ultimately to improve conditions by illustrating problems.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3143"/>
          <seriesInfo name="DOI" value="10.17487/RFC3143"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this version of the document wish to thank Alex Deacon
and Ryan Hurst for all of their work to produce the original version
of the OCSP protocol.</t>
      <t>The authors wish to thank Magnus Nystrom of RSA Security, Inc.,
Jagjeet Sondh of Vodafone Group R&amp;D, and David Engberg of CoreStreet,
Ltd. for their contributions to the original <xref target="RFC5019"/> specification.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
