<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-5g-nftypes-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="5G NFType in X.509 Certificates">X.509 Certificate Extension for 5G Network Function Types</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-5g-nftypes-06"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <postal>
          <city>Washington, DC</city>
          <country>US</country>
        </postal>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <city>Kista</city>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <city>Saint Laurent, QC</city>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="19"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies the certificate extension for including
Network Function Types (NFTypes) for the 5G System in X.509v3 public
key certificates as profiled in RFC 5280.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>The 3rd Generation Partnership Project (3GPP) has specified several
Network Functions (NFs) as part of the service-based architecture within
the 5G System.  There are 49 NF Types defined in for 3GPP Release 17; they
are listed in Table 6.1.6.3.3-1 of <xref target="TS29.510"/>, and each NF type is
identified by a short ASCII string.</t>
      <t>Operators of 5G systems make use of an internal PKI to identify
interface instances in the NFs in a 5G system.  X.509v3 public key
certificates <xref target="RFC5280"/> are used, and the primary function of a
certificate is to bind a public key to the identity of an entity that
holds the corresponding private key, known as the certificate subject.
The certificate subject and the subjectAltName certificate extension can
be used to support identity-based access control decisions.</t>
      <t>This document specifies the NFTypes certificate extension to support
role-based access control decisions by providing a list of NF Types
associated with the certificate subject.  The NFTypes certificate
extension can be used by operators of 5G systems or later.</t>
    </section>
    <section anchor="terms">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="extn">
      <name>Network Functions Certificate Extension</name>
      <t>This section specifies the NFTypes certificate extension, which provides
a list of NF Types associated with the certificate subject.</t>
      <t>The NFTypes certificate extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/>.  The NFTypes certificate extension <bcp14>MUST</bcp14> be identified by the
following object identifier:</t>
      <artwork><![CDATA[
  id-pe-nftypes  OBJECT IDENTIFIER  ::=
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-pe(1) 34 }
]]></artwork>
      <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
      <t>The NFTypes extension <bcp14>MUST</bcp14> have the following syntax:</t>
      <artwork><![CDATA[
  NFTypes ::= SEQUENCE SIZE (1..MAX) OF NFType

  NFType ::= IA5String (SIZE (1..32))
]]></artwork>
      <t>The NFTypes <bcp14>MUST</bcp14> contain at least one NFType.</t>
      <t>The NFTypes <bcp14>MUST NOT</bcp14> contain the same NFType more than once.</t>
      <t>Each NFType <bcp14>MUST</bcp14> contain only an ASCII string; however, the
string <bcp14>MUST NOT</bcp14> include control characters (values 0 through 31),
the space character (value 32), or the delete character (value 127).</t>
      <t>Each NFType <bcp14>MUST</bcp14> contain at least one ASCII character and
<bcp14>MUST NOT</bcp14> contain more than 32 ASCII characters.</t>
      <t>The NFType uses the IA5String type to permit inclusion of the underscore
character ('_'), which is not part of the PrintableString character set.</t>
    </section>
    <section anchor="asn1-mod">
      <name>ASN.1 Module</name>
      <t>This section provides an ASN.1 module <xref target="X.680"/> for the NFTypes
certificate extension, and it follows the conventions established
in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
      <sourcecode type="asn.1" markers="true"><![CDATA[
  NFTypeCertExtn
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-nftype(106) }

  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  IMPORTS
    EXTENSION
    FROM PKIX-CommonTypes-2009  -- RFC 5912
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-mod(0)
        id-mod-pkixCommon-02(57) } ;


  -- NFTypes Certificate Extension

  ext-NFType EXTENSION ::= {
    SYNTAX NFTypes
    IDENTIFIED BY id-pe-nftype }

  -- NFTypes Certificate Extension OID

  id-pe-nftype  OBJECT IDENTIFIER  ::=
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-pe(1) 34 }

  -- NFTypes Certificate Extension Syntax

  NFTypes ::= SEQUENCE SIZE (1..MAX) OF NFType

  NFType ::= IA5String (SIZE (1..32))
 
  END
]]></sourcecode>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document.</t>
      <t>Some of the ASCII strings that specify the NF Types are standard.  See
Appendix A for values defined in 3GPP.  Additionally, an operator <bcp14>MAY</bcp14>
assign its own NF Types for use in their own network.  Since the NF Type
is used for role-based access control decisions, an operator-assigned
NF Type <bcp14>MUST NOT</bcp14> overlap with a value already defined in the commonly
defined set.  Use of the same ASCII string by two different operators
for different roles could lead to confusion or incorrect access control
decisions.  The mechanism for an operator to determine whether an ASCII
string associated with a NF Type is unique across operators is outside
the scope of this document.</t>
      <t>The certificate extension supports many different forms of role-based
access control to support the diversity of activities that NFs are
trusted to perform in the overall system.  Different levels of confidence
that the NFTypes are proper assigned might be needed to contribute to the
overall security of the 5G system.  For example, more confidence might be
needed to make access control decisions related to a scarce resource than
implementation of filtering policies.  As a result, different operators
might have different trust models for NFTypes certificate extension.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>In some security protocols, such as TLS 1.2 <xref target="RFC5246"/>, certificates are
exchanged in the clear.  In other security protocols, such as TLS 1.3 <xref target="RFC8446"/>,
the certificates are encrypted.  The inclusion of NFType certificate extension
can help an observer determine which systems are of most interest based on
the plaintext certificate transmission.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the NFType certificate extension in <xref target="extn"/>, IANA is requested
to assign an object identifier (OID) for the certificate extension.  The
OID for the certificate extension should be allocated in the "SMI Security
for PKIX Certificate Extension" registry (1.3.6.1.5.5.7.1).</t>
      <t>For the ASN.1 Module in <xref target="asn1-mod"/>, IANA is requested to assign an
object identifier (OID) for the module identifier. The OID for the module
should be allocated in the "SMI Security for PKIX Module Identifier"
registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Ben Smeets, Michael Li, Tim Hollebeek, and Roman Danyliw
for their review, comments, and assistance.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="TS29.510" target="https://www.3gpp.org/ftp/Specs/archive/29_series/29.510/29510-h50.zip">
          <front>
            <title>5G System; Network Function Repository Services; Stage 3 (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:29.510 V17.5.0" value=""/>
        </reference>
        <reference anchor="TS33.310" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-h20.zip">
          <front>
            <title>Network Domain Security (NDS); Authentication Framework (AF) (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:33.310 V17.2.0" value=""/>
        </reference>
        <reference anchor="TS23.003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-h50.zip">
          <front>
            <title>Technical Specification Group Core Network and Terminals; Numbering, addressing and identification (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:23.003 V17.5.0" value=""/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TS29.571" target="https://www.3gpp.org/ftp/Specs/archive/29_series/29.571/29571-h50.zip">
          <front>
            <title>5G System; Common Data Types for Service Based Interfaces; Stage 3 (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:29.571 V17.5.0" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="nftypes">
      <name>NFType Strings</name>
      <t>Table 6.1.6.3.3-1 of <xref target="TS29.510"/> defines the ASCII strings for the
NF Types specified in 3GPP documents, which are listed below in
alphabetical order.  This list is not exhaustive.</t>
      <artwork><![CDATA[
    "5G_DDNMF"        "ICSCF"           "SCEF"
    "5G_EIR"          "IMS_AS"          "SCP"
    "AANF"            "LMF"             "SCSAS"
    "ADRF"            "MB-SMF"          "SCSCF"
    "AF"              "MB-UPF"          "SEPP"
    "AMF"             "MFAF"            "SMF"
    "AUSF"            "MME"             "SMSF"
    "BSF"             "N3IWF"           "SOR_AF"
    "CBCF"            "NEF"             "SPAF"
    "CEF"             "NRF"             "TSCTSF"
    "CHF"             "NSACF"           "UCMF"
    "DCCF"            "NSSAAF"          "UDM"
    "DRA"             "NSSF"            "UDR"
    "EASDF"           "NSWOF"           "UDSF"
    "GBA_BSF"         "NWDAF"           "UPF"
    "GMLC"            "PCF"
    "HSS"             "PCSCF"
]]></artwork>
    </section>
    <section anchor="example">
      <name>Example Certificate Containing a NFTypes Extension</name>
      <t>The example certificate conformes to certificate profile in
Table 6.1.3c.3-1 of <xref target="TS33.310"/>.  In addition, the NFTypes
certificate is included with only one NFType, and it is "AMF".  The
SubjectAltName certificate extension contains a fully qualified domain
names (FQDN) and a uniformResourceIdentifier, which carries the
NF Instance ID as specified in Clause 5.3.2 of <xref target="TS29.571"/>.</t>
      <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      <t>The following shows the example certificate.  The values on the left
are the ASN.1 tag (in hexadecimal) and the length (in decimal).</t>
      <artwork><![CDATA[
30 720: SEQUENCE {
30 598:  SEQUENCE {
A0   3:   [0] {
02   1:    INTEGER 2
      :     }
02  20:   INTEGER
      :    6D 9A 18 F7 6D F3 38 4D 3E 64 89 23 1B 87 A1 84
      :    21 A8 55 76
30  10:   SEQUENCE {
06   8:    OBJECT IDENTIFIER ecdsaWithSHA384 (1 2 840 10045 4 3 3)
      :     }
30  21:   SEQUENCE {
31  19:    SET {
30  17:     SEQUENCE {
06   3:      OBJECT IDENTIFIER organizationName (2 5 4 10)
0C  10:      UTF8String 'Example CA'
      :       }
      :      }
      :     }
30  30:   SEQUENCE {
17  13:    UTCTime 19/10/2022 16:32:36 GMT
17  13:    UTCTime 19/10/2023 16:32:36 GMT
      :     }
30  57:   SEQUENCE {
31  11:    SET {
30   9:     SEQUENCE {
06   3:      OBJECT IDENTIFIER countryName (2 5 4 6)
13   2:      PrintableString 'US'
      :       }
      :      }
31  42:    SET {
30  40:     SEQUENCE {
06   3:      OBJECT IDENTIFIER organizationName (2 5 4 10)
13  33:      PrintableString '5gc.mnc400.mcc311.3gppnetwork.org'
      :       }
      :      }
      :     }
30 118:   SEQUENCE {
30  16:    SEQUENCE {
06   7:     OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
06   5:     OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
      :      }
03  98:    BIT STRING
      :     04 C9 E8 81 47 23 AF 37 AB F2 49 8E C2 54 7C 48
      :     91 16 A1 90 EA E2 83 18 9D 28 A8 33 FA C0 48 51
      :     02 EB F2 13 2C F9 A6 04 66 CF FE CC CD ED 7E B3
      :     5A 9C 9C F5 3D 9A 8D 6F AC 85 BD AE 32 A1 6F F1
      :     E6 F0 7F 53 3E F9 CC 43 00 91 0A D2 AF 08 3F 74
      :     32 45 AF 73 F1 BC AB 20 81 A4 29 AC DF 33 4E 24
      :     E8
      :     }
A3 321:   [3] {
30 317:    SEQUENCE {
30  19:     SEQUENCE {
06   8:      OBJECT IDENTIFIER nfTypes (1 3 6 1 5 5 7 1 34)
04   7:      OCTET STRING, encapsulates {
30   5:       SEQUENCE {
16   3:        IA5String 'AMF'
      :         }
      :        }
      :       }
30  23:     SEQUENCE {
06   3:      OBJECT IDENTIFIER certificatePolicies (2 5 29 32)
04  16:      OCTET STRING, encapsulates {
30  14:       SEQUENCE {
30  12:        SEQUENCE {
06  10:         OBJECT IDENTIFIER '2 16 840 1 101 3 2 1 48 48'
      :          }
      :         }
      :        }
      :       }
30  14:     SEQUENCE {
06   3:      OBJECT IDENTIFIER keyUsage (2 5 29 15)
01   1:      BOOLEAN TRUE
04   4:      OCTET STRING, encapsulates {
03   2:       BIT STRING 7 unused bits
      :        '1'B (bit 0)
      :        }
      :       }
30  19:     SEQUENCE {
06   3:      OBJECT IDENTIFIER extKeyUsage (2 5 29 37)
04  12:      OCTET STRING, encapsulates {
30  10:       SEQUENCE {
06   8:        OBJECT IDENTIFIER serverAuth (1 3 6 1 5 5 7 3 1)
      :         }
      :        }
      :       }
30  29:     SEQUENCE {
06   3:      OBJECT IDENTIFIER subjectKeyIdentifier (2 5 29 14)
04  22:      OCTET STRING, encapsulates {
04  20:       OCTET STRING
      :        4C 67 92 A0 C1 89 58 9F CF 39 98 A2 03 E7 96 5C
      :        13 39 C8 07
      :        }
      :       }
30  31:     SEQUENCE {
06   3:      OBJECT IDENTIFIER authorityKeyIdentifier (2 5 29 35)
04  24:      OCTET STRING, encapsulates {
30  22:       SEQUENCE {
80  20:        [0]
      :        88 7F A2 04 E9 0B 6A 8D 74 76 FA 9F F1 0A D4 61
      :        E0 FA B3 35
      :         }
      :        }
      :       }
30  49:     SEQUENCE {
06   3:      OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
04  42:      OCTET STRING, encapsulates {
30  40:       SEQUENCE {
30  38:        SEQUENCE {
A0  36:         [0] {
A0  34:          [0] {
86  32:           [6] 'http://example.com/exampleca.crl'
      :            }
      :           }
      :          }
      :         }
      :        }
      :       }
30 117:     SEQUENCE {
06   3:      OBJECT IDENTIFIER subjectAltName (2 5 29 17)
01   1:      BOOLEAN TRUE
04 107:      OCTET STRING, encapsulates {
30 105:       SEQUENCE {
82  56:        [2]
      :         'amf1.cluster1.net2.amf.5gc.mnc400.mcc311.3gppnet'
      :         'work.org'
86  45:        [6]
      :         'urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6'
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
30  10:  SEQUENCE {
06   8:   OBJECT IDENTIFIER ecdsaWithSHA384 (1 2 840 10045 4 3 3)
      :    }
03 104:  BIT STRING, encapsulates {
30 101:   SEQUENCE {
02  49:    INTEGER
      :     00 C2 06 9E 05 6F FD 7F 7D F6 46 11 50 D6 77 1D
      :     57 78 58 E0 D4 A1 26 7E 70 46 90 D0 BE 18 7B 5A
      :     9F 58 1B 9C 19 C3 21 F0 F5 30 3D 1C B5 65 9F FF
      :     34
02  48:    INTEGER
      :     35 26 00 09 36 80 CD D0 A2 17 D5 B1 F8 46 40 19
      :     B5 37 68 51 CF 7E 28 1D 27 E1 20 7F 84 24 55 B5
      :     AD 22 06 FF DD EB DB B8 F4 F7 1E 42 48 6F 1E D2
      :     }
      :    }
      :   }
]]></artwork>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
