<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-03" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-03"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="23"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 <xref target="RFC3709"/> and RFC 6170 <xref target="RFC6170"/>.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709 and RFC 6170.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in B2B, B2C, and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are authorization
decisions.  Automatic processing will make some authorization decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
authorization decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).  Certificate issuers may include more than one community
logotype to indicate participation in more than one global community.</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>Image and audio data for logotypes can be remote by including a
URI that identifies the location to the logotype data and a one-way hash
of the referenced data in the certificate.  The privacy-related properties
for remote logotype data depend on four parties: the certificate relying
parties that use the information in the certificate extension to fetch
the logotype data, the certificate issuers that populate the certificate
extension, certificate subscribers that request certificates that include
the certificate extension, and server operators that provides the logotype
data.</t>
      <t>Alternatively, embedding the logotype data  in the certificate with direct
addressing (as defined in <xref target="embedded-image"/>) provides improved privacy
properties and depends upon fewer parties.  However, this approach can
significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.
At least one of the image objects representing a logotype <bcp14>SHOULD</bcp14>
contain an image with a width between of 60 pixels and 200 pixels and a
height between 45 pixels and 150 pixels.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> provide text-based
audio data suitable for processing by text-to-speech software.</t>
      <t>A typical use of text based audio data is inclusion in web applications where the
audio text is placed as the "alt" atttribute value of an html image (img) element
and the language value obtained from LogotypeAudioInfo is included as the "lang"
attribute of that image.</t>
      <t>If a logotype of a certain type (as defined in <xref target="logotypes"/>) is
represented by more than one image object, then each image objects <bcp14>MUST</bcp14>
contain variants of roughly the same visual content. Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  Compliant applications <bcp14>MUST NOT</bcp14> display
more than one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the
audio object for any logotype type (see <xref target="logotypes"/>) at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>SHOULD</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Direct
addressing supports cases where just one or a few alternative images and
audio objects are referenced.</t>
        <t>The indirect addressing includes one reference to an external hashed
data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same logotype data.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use either the
HTTP scheme (http://...) or the HTTPS scheme (https://...) or the
DATA scheme (data://...) <xref target="RFC3986"/>.  However, the "data" URI
scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.  Clients <bcp14>MUST</bcp14>
support retrieval of referenced LogoTypeData with the
HTTP <xref target="I-D.ietf-httpbis-semantics"/> and the HTTP with TLS <xref target="RFC8446"/>, or
subsequent versions of these protocols.  Client applications <bcp14>SHOULD</bcp14> also
support the "data" URI scheme <xref target="RFC2397"/> for direct addressing with embedded
logotype data within the extension.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified,
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a resource that contains
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>SHOULD</bcp14> include
a hash value that computed with the one-way hash function associated
with the certificate signature, and CAs <bcp14>MAY</bcp14> include other hash
values.  Clients <bcp14>MUST</bcp14> compute a one-way hash value using one of the
identified functions, and clients <bcp14>MUST</bcp14> discard the logotype data if
the computed hash value does not match the hash value in the
certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC6838"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
          <t>If more than one loyalty logotype is present, they <bcp14>MUST</bcp14> be
placed in order of preferred appearance.  Some clients <bcp14>MAY</bcp14> choose
to display a subset of the present loyalty logotype data; therefore the
placement within the sequence aids the client selection.  The most
preferred loyalty logotype data <bcp14>MUST</bcp14> be first in the sequence, and the
least preferred loyalty logotype data <bcp14>MUST</bcp14> be last in the sequence.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-certImage object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate image logotype.</t>
          <t>Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image as the only visual
representation of a certificate; however, the certificate user <bcp14>SHOULD</bcp14>
be able to easily obtain the details of the certificate content.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however, the
relying party <bcp14>MUST NOT</bcp14> use the logotypes as part of certification path
validation or automated trust decision.  The sole purpose of logotypes is
to enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many commons image formats and their
corresponding MIME type.  The table also indicates the support
requirements these image formats.  The filename extensions commonly used
for each of these formats is also provided.  Implementations <bcp14>MAY</bcp14> support
other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">.ext</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml+gzip</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC8118"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the
client will receive response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>. Implementations <bcp14>SHOULD</bcp14> support
text-based audio data with a MIME type of "text/plain;charset=UTF-8".
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
      <t>Text-based audio data using the MIME type of "text/plain;charset=UTF-8" is
intended to be used by text-to-speech software. When this audio type is used,
the following requirements apply:</t>
      <ul spacing="normal">
        <li>LogotypeAudioInfo <bcp14>MUST</bcp14> be present and specify the language of the text.</li>
        <li>The fileSize, playTime, and channels elements of LogotypeAudioInfo <bcp14>MUST</bcp14> have the value of 0.</li>
        <li>The sampleRate element of LogotypeAudioInfo <bcp14>MUST</bcp14> be absent.</li>
      </ul>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format if the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks.  In such a case, the
accepted image may contain data that could help an attacker to obtain
colliding certificates with identical certificate signatures.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A parent CA can
constrain certification path validation such that subordinate CAs cannot
issue valid certificates to end-entities outside a limited name space or
outside specific certificate polices.  A malicious CA can comply with
these name and policy requirements and still include inappropriate
logotypes in the certificates that it issues.  These certificates will
pass the certification path validation algorithm, which means the client
will trust the logotypes in the certificates.  Since there is no
technical mechanism to prevent or control subordinate CAs from including
the logotype extension or its contents, where appropriate, a parent CA
could employ a legal agreement to impose a suitable restriction on the
subordinate CA.  This situation is not unique to the logotype extension.</t>
      <t>When a relying party fetches remote logotype data, a mismatch between the
media type provided in the mediaType field of the LogotypeDetails and the
Content-Type HTTP header of the retrieved object <bcp14>MUST</bcp14> be treated as a
failure and the fetched logotype data should not be presented to the
user.  However, if more than one location for the remote logotype data is
provided in the certificate extension, the relying party <bcp14>MAY</bcp14> try to fetch
the remote logotype data from an alternate location to resolve the failure.</t>
      <t>When a subscriber requests the inclusion of remote logotype data in a
certificate, the CA cannot be sure that any logotype data will be
available at the provided URI for the entire validity period of the
certificate.  To mitigate this concern, the CA may provide the logotype
data from a server under its control, rather than a subscriber-controlled
server.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and follow the behavior of
subordinate CAs, including Certificate Transparency <xref target="RFC9162"/>.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>Certificates are commonly public objects, so the inclusion of
privacy-sensitive information in certificates should be avoided.  The more
information that is included in a certificate, the greater the likelihood
that the certificate will reveal privacy-sensitive information.  The
inclusion of logotype data needs to be considered in this context.</t>
      <t>Logotype data might be fetched from a server when it is needed.  By
watching activity on the network, an observer can determine which clients
are making use of certificates that contain particular logotype data.
Since clients are expected to locally cache logotype data, network
traffic to the server containing the logotype data will not be generated
every time the certificate is used.  Further, when logotype data is not
cached, activity on the network would reveal certificate usage frequency.
Even when logotype data is cached, regardless of whether direct or
indirect addressing is employed, network traffic monitoring could reveal
when logotype data is fetched for the first time.  Implementations <bcp14>MAY</bcp14>
encrypt fetches of logotype data using HTTPS and pad them to a common size
to reduce visibility into the data that is being fetched.  Likewise, servers
<bcp14>MAY</bcp14> reduce visibility into the data that is being returned by encrypting with
HTTPS and padding to a few common sizes.</t>
      <t>Similarly, when fetching logotype data from a server, the server operator
can determine which clients are making use of certificates that contain
particular logotype data.  As above, locally caching logotype data will
eliminate the need to fetch the logotype data each time the certificate
is used, and lack of caching would reveal usage frequency.  Even when
implementations cache logotype data is cached, regardless of whether
direct or indirect addressing is employed, the server operator could
observe when logotype data is fetched for the first time.</t>
      <t>When the "data" URI scheme is used with direct addressing, there is no
network traffic to fetch logotype data, which avoids the observations of
network traffic or server operations described above.  To obtain this
benefit, the certificate will be larger than one that contains a URL.
Due to the improved privacy posture, the "data" URI scheme with direct
addressing will be the only one that is supported by some CAs.
Privacy-aware certificate subscribers <bcp14>MAY</bcp14> wish to insist on their
logotype data being embedded in the certificate with the "data" URI
scheme with direct addressing.</t>
      <t>In cases where logotype data is cached by the relying party, the cache
index should include the hash values of the associated logotype data with the
goal of fetching the logotype data only once, even when it is referenced by
multiple URIs.  The index should include hash values for all supported
hash algorithms.  The cached data should include the media type as well as
the logotype data.  Implementations should give preference to logotype data
that is already in the cache when multiple alternatives are offered in the
LogotypeExtn certificate extension.</t>
      <t>When the "data" URI scheme is used, the relying party <bcp14>MAY</bcp14> add the embedded
logotype data to the local cache, which could avoid the need to fetch the
logotype data if it is referenced by a URL in another certificate.</t>
      <t>When fetching remote logotype data, relying parties should use the most
privacy-preserving options that are available to minimize the opportunities
for servers to "fingerprint" clients. For example, avoid cookies, e-tags, and
client certificates.</t>
      <t>When a relying party encounters a new certificate, the lack of network traffic
to fetch logotype data might indicate that a certificate with references to the
same logotype data has been previously processed and cached.</t>
      <t>TLS 1.3 <xref target="RFC8446"/> includes the ability to encrypt the server's certificate
in the TLS handshake, which helps hide the server's identity from anyone that
is watching activity on the network.  If the server's certificate includes
remote logotype data, the client fetching that data might disclose the
otherwise protected server identity.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Alexey Melnikov for his guidance on media types.  We extend a special
thanks to Corey Bonnell and Daniel Kahn Gillmor for their careful review
and comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-semantics" target="https://www.ietf.org/archive/id/draft-ietf-httpbis-semantics-19.txt">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.

 This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8118" target="https://www.rfc-editor.org/info/rfc8118">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="M. Hardy" initials="M." surname="Hardy">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="D. Markovic" initials="D." surname="Markovic">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="M. Bailey" initials="M." surname="Bailey">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>The Portable Document Format (PDF) is an ISO standard (ISO 32000-1:2008) defining a final-form document representation language in use for document exchange, including on the Internet, since 1993. This document provides an overview of the PDF format and updates the media type registration of "application/pdf".  It obsoletes RFC 3778.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8118"/>
          <seriesInfo name="DOI" value="10.17487/RFC8118"/>
        </reference>
        <reference anchor="RFC3709" target="https://www.rfc-editor.org/info/rfc3709">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Freeman" initials="T." surname="Freeman">
              <organization/>
            </author>
            <date month="February" year="2004"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3709"/>
          <seriesInfo name="DOI" value="10.17487/RFC3709"/>
        </reference>
        <reference anchor="RFC6170" target="https://www.rfc-editor.org/info/rfc6170">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Image</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Bajaj" initials="S." surname="Bajaj">
              <organization/>
            </author>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6170"/>
          <seriesInfo name="DOI" value="10.17487/RFC6170"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9216" target="https://www.rfc-editor.org/info/rfc9216">
          <front>
            <title>S/MIME Example Keys and Certificates</title>
            <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9216"/>
          <seriesInfo name="DOI" value="10.17487/RFC9216"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified, 
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 2002 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <t>Note that <xref target="NEW-ASN1"/> was published in 2021, and all of the features
used in this module are backward compatible with the specification
that was published in 2002.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one image component MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2910: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2896:  OCTET STRING, encapsulates {
30 2892:   SEQUENCE {
A3 2888:    [3] {
30 2884:     SEQUENCE {
30 2880:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2866:       [0] {
30 2862:        SEQUENCE {
30 2858:         SEQUENCE {
16   24:          IA5String 'image/svg+xml-compressed'
30   49:          SEQUENCE {
30   47:           SEQUENCE {
30   11:            SEQUENCE {
06    9:             OBJECT IDENTIFIER
       :              sha-256 (2 16 840 1 101 3 4 2 1)
       :              }
04   32:            OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :             }
       :            }
30 2777:          SEQUENCE {
16 2773:           IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-full-cert">
        <name>Full Certificate Example</name>
        <t>The following example contains a certificate for Alice; it is
essentially a renewal of the certificate that appears in <xref target="RFC9216"/>.
Of course, the serial number and issue dates are different.  In
addition, Alice's certificate now has a logotype extension.  The
extension contains URLs for two community logotype images, both at
fictional URLs.  The extension also contains URLs for two subject
logotype images, both at fictional URLs.  An implementation would
display at most three of these images, both of the community logotype
images and one of the subject logotype images.  Direct addressing is
used for all of the images, and the images are hashed by SHA-256.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The following  displays the logotype extension from Alice's
certificate.  The values on the left are the ASN.1 tag (in hexadecimal)
and the length (in decimal).</t>
        <artwork><![CDATA[
30 438: SEQUENCE {
A0 223:  [0] {
30 220:   SEQUENCE {
A0 109:    [0] {
30 107:     SEQUENCE {
30 105:      SEQUENCE {
16  10:       IA5String 'image/jpeg'
30  49:       SEQUENCE {
30  47:        SEQUENCE {
30  11:         SEQUENCE {
06   9:          OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
      :           }
04  32:         OCTET STRING
      :          AF FC 10 16 46 CB 56 25 B4 99 7D E5 89 3E AE 3A
      :          84 6F 5A 02 D3 82 D6 DA 8E D4 EE F8 7C BD 1D ED
      :          }
      :         }
30  40:       SEQUENCE {
16  38:        IA5String 'http://www.example.net/images/logo.jpg'
      :         }
      :        }
      :       }
      :      }
A0 107:    [0] {
30 105:     SEQUENCE {
30 103:      SEQUENCE {
16   9:       IA5String 'image/gif'
30  49:       SEQUENCE {
30  47:        SEQUENCE {
30  11:         SEQUENCE {
06   9:          OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
      :           }
04  32:         OCTET STRING
      :          88 90 81 81 AD FB 66 AE 2F 66 D0 49 A0 4D 8E A0
      :          EC 4E A8 64 42 38 5B 36 4A BF 2C 8B D2 E9 E9 66
      :          }
      :         }
30  39:       SEQUENCE {
16  37:        IA5String 'http://www.example.org/logo-image.gif'
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
A2 209:  [2] {
A0 206:   [0] {
30 203:    SEQUENCE {
30  99:     SEQUENCE {
16   9:      IA5String 'image/gif'
30  49:      SEQUENCE {
30  47:       SEQUENCE {
30  11:        SEQUENCE {
06   9:         OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
      :          }
04  32:        OCTET STRING
      :         6A 58 50 2E 59 67 F9 DD D1 8A FE BD 0D B1 FE 60
      :         A5 13 1B DF 0F B2 BE F0 B5 73 45 50 BA 1B BF 19
      :         }
      :        }
30  35:      SEQUENCE {
16  33:       IA5String 'http://www.smime.example/logo.gif'
      :        }
      :       }
30 100:     SEQUENCE {
16  10:      IA5String 'image/jpeg'
30  49:      SEQUENCE {
30  47:       SEQUENCE {
30  11:        SEQUENCE {
06   9:         OBJECT IDENTIFIER sha-256 (2 16 840 1 101 3 4 2 1)
      :          }
04  32:        OCTET STRING
      :         BD CB 7B 75 72 6D 8C 1B 33 A4 2C DE AC 79 72 DA
      :         4A D9 F2 79 84 0A 58 58 6A CE 2F 02 80 EA D7 A5
      :         }
      :        }
30  35:      SEQUENCE {
16  33:       IA5String 'http://www.smime.example/logo.jpg'
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709 and RFC 6170</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>RFC 3709 required client applications to support both direct and indirect
addressing.  This requirement is changed to <bcp14>SHOULD</bcp14> support both direct and
indirect addressing to allow implementations to be more privacy preserving.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>Update the reference for the URI Generic Syntax to be RFC 3986 instead
of the now obsolete RFC 2396.</li>
        <li>Update the reference for the application/pdf media type to be RFC 8118
instead of the now obsolete RFC 3778.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml+gzip media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC6838"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Encourage, instead of requiring, each logotype to be represented by
at least one image.</li>
        <li>Encourage the inclusion of text-based audio data suitable for
processing by a text-to-speech software using the MIME type of
"text/plain;charset=UTF-8".</li>
        <li>Require that the logotype extension not contain more than one certificate
image logotype.</li>
        <li>Privacy-related topics that were previously discussed in the Security
Considerations section are now covered in a separate Privacy Considerations
section.  Additional topics are covered in both sections.</li>
        <li>Provide ASN.1 modules for both the older syntax <xref target="OLD-ASN1"/> and the most
recent ASN.1 syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
        <li>Several editorial changes to improve clarity.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
