<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-06" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-06"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="14"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 <xref target="RFC3709"/> and RFC 6170 <xref target="RFC6170"/>.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709 and RFC 6170.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information and operational technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in B2B, B2C, and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are authorization
decisions.  Automatic processing will make some authorization decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
authorization decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).  Certificate issuers may include more than one community
logotype to indicate participation in more than one global community.</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>Image and audio data for logotypes can be provided by reference by including
a URI that identifies the location to the logotype data and a one-way hash
of the referenced data in the certificate.  The privacy-related properties
for remote logotype data depend on four parties: the certificate relying
parties that use the information in the certificate extension to fetch
the logotype data, the certificate issuers that populate the certificate
extension, certificate subscribers that request certificates that include
the certificate extension, and server operators that provides the logotype
data.</t>
      <t>Alternatively, embedding the logotype data  in the certificate with direct
addressing (as defined in <xref target="embedded-image"/>) provides improved privacy
properties and depends upon fewer parties.  However, this approach can
significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.
At least one of the image objects representing a logotype <bcp14>SHOULD</bcp14>
contain an image with a width between of 60 pixels and 200 pixels and a
height between 45 pixels and 150 pixels.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> provide text-based
audio data suitable for processing by text-to-speech software.</t>
      <t>A typical use of text based audio data is inclusion in web applications where the
audio text is placed as the "alt" atttribute value of an html image (img) element
and the language value obtained from LogotypeAudioInfo is included as the "lang"
attribute of that image.</t>
      <t>If a logotype of a certain type (as defined in <xref target="logotypes"/>) is
represented by more than one image object, then each image objects <bcp14>MUST</bcp14>
contain variants of roughly the same visual content.  Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  When more than one image object or more than
one audio object  for the same logotype type is included in the certificate,
the certificate issuer is responsible for ensuring that the objects contain
roughly the same content.  Compliant applications <bcp14>MUST NOT</bcp14> display more than
one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the audio object
for any logotype type (see <xref target="logotypes"/>) at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>SHOULD</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Multiple
URIs <bcp14>MAY</bcp14> be included for locations for obtaining the same logotype object.
Multiple hash values <bcp14>MAY</bcp14> be included, each computed with a different
one-way hash function.  Direct addressing supports cases where just
one or a few alternative images and audio objects are referenced.</t>
        <t>The indirect addressing includes one or more references to an external
hashed data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same logotype data.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use the HTTPS scheme (https://...)
or the HTTP scheme (http://...) or the DATA scheme (data://...) <xref target="RFC3986"/>.
However, the "data" URI scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.
Clients <bcp14>MUST</bcp14> support retrieval of referenced LogoTypeData with the
HTTP <xref target="I-D.ietf-httpbis-semantics"/> and the HTTP with TLS <xref target="RFC8446"/>, or
subsequent versions of these protocols.  Client applications <bcp14>SHOULD</bcp14> also
support the "data" URI scheme <xref target="RFC2397"/> for direct addressing with embedded
logotype data within the extension.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified,
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a resource that contains
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>SHOULD</bcp14> use the
one-way hash function that is associated with the certificate signature to
compute the hash value, and CAs <bcp14>MAY</bcp14> include other hash values.  Clients
<bcp14>MUST</bcp14> compute a one-way hash value using one of the identified functions,
and clients <bcp14>MUST</bcp14> discard the logotype data if the computed hash value does
not match the hash value in the certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC6838"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
          <t>If more than one loyalty logotype is present, they <bcp14>MUST</bcp14> be
placed in order of preferred appearance.  Some clients <bcp14>MAY</bcp14> choose
to display a subset of the present loyalty logotype data; therefore the
placement within the sequence aids the client selection.  The most
preferred loyalty logotype data <bcp14>MUST</bcp14> be first in the sequence, and the
least preferred loyalty logotype data <bcp14>MUST</bcp14> be last in the sequence.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-certImage object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate image logotype.</t>
          <t>Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image as the only visual
representation of a certificate; however, the certificate user <bcp14>SHOULD</bcp14>
be able to easily obtain the details of the certificate content.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however, the
relying party <bcp14>MUST NOT</bcp14> use the logotypes as part of certification path
validation or automated trust decision.  The sole purpose of logotypes is
to enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many commons image formats and their
corresponding MIME type.  The table also indicates the support
requirements these image formats.  The filename extensions commonly used
for each of these formats is also provided.  Implementations <bcp14>MAY</bcp14> support
other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">.ext</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml+gzip</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC8118"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the
client will receive response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>. Implementations <bcp14>SHOULD</bcp14> support
text-based audio data with a MIME type of "text/plain;charset=UTF-8".
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
      <t>Text-based audio data using the MIME type of "text/plain;charset=UTF-8" is
intended to be used by text-to-speech software. When this audio type is used,
the following requirements apply:</t>
      <ul spacing="normal">
        <li>LogotypeAudioInfo <bcp14>MUST</bcp14> be present and specify the language of the text.</li>
        <li>The fileSize, playTime, and channels elements of LogotypeAudioInfo <bcp14>MUST</bcp14> have the value of 0.</li>
        <li>The sampleRate element of LogotypeAudioInfo <bcp14>MUST</bcp14> be absent.</li>
      </ul>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format if the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.  Implementers should review the guidance
in <xref section="7" sectionFormat="of" target="RFC3986"/>.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks.  In such a case, the
accepted image may contain data that could help an attacker to obtain
colliding certificates with identical certificate signatures.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A parent CA can
constrain certification path validation such that subordinate CAs cannot
issue valid certificates to end-entities outside a limited name space or
outside specific certificate polices.  A malicious CA can comply with
these name and policy requirements and still include inappropriate
logotypes in the certificates that it issues.  These certificates will
pass the certification path validation algorithm, which means the client
will trust the logotypes in the certificates.  Since there is no
technical mechanism to prevent or control subordinate CAs from including
the logotype extension or its contents, where appropriate, a parent CA
could employ a legal agreement to impose a suitable restriction on the
subordinate CA.  This situation is not unique to the logotype extension.</t>
      <t>When a relying party fetches remote logotype data, a mismatch between the
media type provided in the mediaType field of the LogotypeDetails and the
Content-Type HTTP header of the retrieved object <bcp14>MUST</bcp14> be treated as a
failure and the fetched logotype data should not be presented to the
user.  However, if more than one location for the remote logotype data is
provided in the certificate extension, the relying party <bcp14>MAY</bcp14> try to fetch
the remote logotype data from an alternate location to resolve the failure.</t>
      <t>When a subscriber requests the inclusion of remote logotype data in a
certificate, the CA cannot be sure that any logotype data will be
available at the provided URI for the entire validity period of the
certificate.  To mitigate this concern, the CA may provide the logotype
data from a server under its control, rather than a subscriber-controlled
server.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and follow the behavior of
subordinate CAs, including Certificate Transparency <xref target="RFC9162"/>.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>Certificates are commonly public objects, so the inclusion of
privacy-sensitive information in certificates should be avoided.  The more
information that is included in a certificate, the greater the likelihood
that the certificate will reveal privacy-sensitive information.  The
inclusion of logotype data needs to be considered in this context.</t>
      <t>Logotype data might be fetched from a server when it is needed.  By
watching activity on the network, an observer can determine which clients
are making use of certificates that contain particular logotype data.
Since clients are expected to locally cache logotype data, network
traffic to the server containing the logotype data will not be generated
every time the certificate is used.  Further, when logotype data is not
cached, activity on the network would reveal certificate usage frequency.
Even when logotype data is cached, regardless of whether direct or
indirect addressing is employed, network traffic monitoring could reveal
when logotype data is fetched for the first time.  Implementations <bcp14>MAY</bcp14>
encrypt fetches of logotype data using HTTPS and pad them to a common size
to reduce visibility into the data that is being fetched.  Likewise, servers
<bcp14>MAY</bcp14> reduce visibility into the data that is being returned by encrypting with
HTTPS and padding to a few common sizes.</t>
      <t>Similarly, when fetching logotype data from a server, the server operator
can determine which clients are making use of certificates that contain
particular logotype data.  As above, locally caching logotype data will
eliminate the need to fetch the logotype data each time the certificate
is used, and lack of caching would reveal usage frequency.  Even when
implementations cache logotype data is cached, regardless of whether
direct or indirect addressing is employed, the server operator could
observe when logotype data is fetched for the first time.</t>
      <t>In addition, the use of an encrypted DNS mechanism, such as DoT <xref target="RFC7858"/>
or DoH <xref target="RFC9230"/>, hide the name resolution traffic associated fetching
remote logotype objects.</t>
      <t>When the "data" URI scheme is used with direct addressing, there is no
network traffic to fetch logotype data, which avoids the observations of
network traffic or server operations described above.  To obtain this
benefit, the certificate will be larger than one that contains a URL.
Due to the improved privacy posture, the "data" URI scheme with direct
addressing will be the only one that is supported by some CAs.
Privacy-aware certificate subscribers <bcp14>MAY</bcp14> wish to insist on their
logotype data being embedded in the certificate with the "data" URI
scheme with direct addressing.</t>
      <t>In cases where logotype data is cached by the relying party, the cache
index should include the hash values of the associated logotype data with the
goal of fetching the logotype data only once, even when it is referenced by
multiple URIs.  The index should include hash values for all supported
hash algorithms.  The cached data should include the media type as well as
the logotype data.  Implementations should give preference to logotype data
that is already in the cache when multiple alternatives are offered in the
LogotypeExtn certificate extension.</t>
      <t>When the "data" URI scheme is used, the relying party <bcp14>MAY</bcp14> add the embedded
logotype data to the local cache, which could avoid the need to fetch the
logotype data if it is referenced by a URL in another certificate.</t>
      <t>When fetching remote logotype data, relying parties should use the most
privacy-preserving options that are available to minimize the opportunities
for servers to "fingerprint" clients. For example, avoid cookies, e-tags, and
client certificates.</t>
      <t>When a relying party encounters a new certificate, the lack of network traffic
to fetch logotype data might indicate that a certificate with references to the
same logotype data has been previously processed and cached.</t>
      <t>TLS 1.3 <xref target="RFC8446"/> includes the ability to encrypt the server's certificate
in the TLS handshake, which helps hide the server's identity from anyone that
is watching activity on the network.  If the server's certificate includes
remote logotype data, the client fetching that data might disclose the
otherwise protected server identity.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Alexey Melnikov for his guidance on media types.  We extend a special
thanks to Tim Geiser for his careful checking of the new examples in
Appendix B.4 and B.5.  We extend a special thanks to Corey Bonnell,
Daniel Kahn Gillmor, and Roman Danyliw for their careful review and
comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-semantics" target="https://www.ietf.org/archive/id/draft-ietf-httpbis-semantics-19.txt">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding" initials="R. T." surname="Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham" initials="M." surname="Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke" initials="J." surname="Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.

 This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8118" target="https://www.rfc-editor.org/info/rfc8118">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="M. Hardy" initials="M." surname="Hardy">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="D. Markovic" initials="D." surname="Markovic">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="M. Bailey" initials="M." surname="Bailey">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>The Portable Document Format (PDF) is an ISO standard (ISO 32000-1:2008) defining a final-form document representation language in use for document exchange, including on the Internet, since 1993. This document provides an overview of the PDF format and updates the media type registration of "application/pdf".  It obsoletes RFC 3778.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8118"/>
          <seriesInfo name="DOI" value="10.17487/RFC8118"/>
        </reference>
        <reference anchor="RFC3709" target="https://www.rfc-editor.org/info/rfc3709">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Freeman" initials="T." surname="Freeman">
              <organization/>
            </author>
            <date month="February" year="2004"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3709"/>
          <seriesInfo name="DOI" value="10.17487/RFC3709"/>
        </reference>
        <reference anchor="RFC6170" target="https://www.rfc-editor.org/info/rfc6170">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Image</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Bajaj" initials="S." surname="Bajaj">
              <organization/>
            </author>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6170"/>
          <seriesInfo name="DOI" value="10.17487/RFC6170"/>
        </reference>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9216" target="https://www.rfc-editor.org/info/rfc9216">
          <front>
            <title>S/MIME Example Keys and Certificates</title>
            <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9216"/>
          <seriesInfo name="DOI" value="10.17487/RFC9216"/>
        </reference>
        <reference anchor="RFC9230" target="https://www.rfc-editor.org/info/rfc9230">
          <front>
            <title>Oblivious DNS over HTTPS</title>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="T. Pauly" initials="T." surname="Pauly">
              <organization/>
            </author>
            <author fullname="T. Verma" initials="T." surname="Verma">
              <organization/>
            </author>
            <author fullname="C.A. Wood" initials="C.A." surname="Wood">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
              <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9230"/>
          <seriesInfo name="DOI" value="10.17487/RFC9230"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified, 
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 2002 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <t>Note that <xref target="NEW-ASN1"/> was published in 2021, and all of the features
used in this module are backward compatible with the specification
that was published in 2002.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one image component MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2914: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2900:  OCTET STRING, encapsulates {
30 2896:   SEQUENCE {
A3 2892:    [3] {
30 2888:     SEQUENCE {
30 2884:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2870:       [0] {
30 2866:        SEQUENCE {
30 2862:         SEQUENCE {
30 2858:          SEQUENCE {
16   24:           IA5String 'image/svg+xml-compressed'
30   49:           SEQUENCE {
30   47:            SEQUENCE {
30   11:             SEQUENCE {
06    9:              OBJECT IDENTIFIER
       :               sha-256 (2 16 840 1 101 3 4 2 1)
       :               }
04   32:             OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :              }
       :             }
30 2777:           SEQUENCE {
16 2773:            IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :             }
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-full-cert">
        <name>Full Certificate Example</name>
        <t>The following example contains a certificate for Alice; it is
essentially a renewal of the certificate that appears in <xref target="RFC9216"/>.
Of course, the serial number and issue dates are different.  In
addition, Alice's certificate now has a logotype extension.  The
extension contains URLs for two community logotype images, both at
fictional URLs.  The extension also contains URLs for two subject
logotype images, both at fictional URLs.  An implementation would
display at most three of these images, both of the community logotype
images and one of the subject logotype images.  Direct addressing is
used for all of the images, and the images are hashed by SHA-256.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The following  displays the logotype extension from Alice's
certificate.  The values on the left are the ASN.1 tag (in hexadecimal)
and the length (in decimal).</t>
        <artwork><![CDATA[
30 464: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 450:  OCTET STRING, encapsulates {
30 446:   SEQUENCE {
A0 227:    [0] {
30 224:     SEQUENCE {
A0 111:      [0] {
30 109:       SEQUENCE {
30 107:        SEQUENCE {
30 105:         SEQUENCE {
16  10:          IA5String 'image/jpeg'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            AF FC 10 16 46 CB 56 25 B4 99 7D E5 89 3E AE 3A
      :            84 6F 5A 02 D3 82 D6 DA 8E D4 EE F8 7C BD 1D ED
      :             }
      :            }
30  40:          SEQUENCE {
16  38:           IA5String 'http://www.example.net/images/logo.jpg'
      :            }
      :           }
      :          }
      :         }
      :        }
A0 109:      [0] {
30 107:       SEQUENCE {
30 105:        SEQUENCE {
30 103:         SEQUENCE {
16   9:          IA5String 'image/gif'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            88 90 81 81 AD FB 66 AE 2F 66 D0 49 A0 4D 8E A0
      :            EC 4E A8 64 42 38 5B 36 4A BF 2C 8B D2 E9 E9 66
      :             }
      :            }
30  39:          SEQUENCE {
16  37:           IA5String 'http://www.example.org/logo-image.gif'
      :            }
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
A2 213:    [2] {
A0 210:     [0] {
30 207:      SEQUENCE {
30 101:       SEQUENCE {
30  99:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            6A 58 50 2E 59 67 F9 DD D1 8A FE BD 0D B1 FE 60
      :            A5 13 1B DF 0F B2 BE F0 B5 73 45 50 BA 1B BF 19
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.gif'
      :           }
      :          }
      :         }
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            BD CB 7B 75 72 6D 8C 1B 33 A4 2C DE AC 79 72 DA
      :            4A D9 F2 79 84 0A 58 58 6A CE 2F 02 80 EA D7 A5
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.jpg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709 and RFC 6170</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>RFC 3709 required client applications to support both direct and indirect
addressing.  This requirement is changed to <bcp14>SHOULD</bcp14> support both direct and
indirect addressing to allow implementations to be more privacy preserving.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>Update the reference for the URI Generic Syntax to be RFC 3986 instead
of the now obsolete RFC 2396.</li>
        <li>Update the reference for the application/pdf media type to be RFC 8118
instead of the now obsolete RFC 3778.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml+gzip media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC6838"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Encourage, instead of requiring, each logotype to be represented by
at least one image.</li>
        <li>Encourage the inclusion of text-based audio data suitable for
processing by a text-to-speech software using the MIME type of
"text/plain;charset=UTF-8".</li>
        <li>Require that the logotype extension not contain more than one certificate
image logotype.</li>
        <li>Privacy-related topics that were previously discussed in the Security
Considerations section are now covered in a separate Privacy Considerations
section.  Additional topics are covered in both sections.</li>
        <li>Provide ASN.1 modules for both the older syntax <xref target="OLD-ASN1"/> and the most
recent ASN.1 syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
        <li>Several editorial changes to improve clarity.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
