<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-07" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-07"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="07"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 <xref target="RFC3709"/> and RFC 6170 <xref target="RFC6170"/>.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709 and RFC 6170.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information and operational technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in B2B, B2C, and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are authorization
decisions.  Automatic processing will make some authorization decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
authorization decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).  Certificate issuers may include more than one community
logotype to indicate participation in more than one global community.</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>Image and audio data for logotypes can be provided by reference by including
a URI that identifies the location to the logotype data and a one-way hash
of the referenced data in the certificate.  The privacy-related properties
for remote logotype data depend on four parties: the certificate relying
parties that use the information in the certificate extension to fetch
the logotype data, the certificate issuers that populate the certificate
extension, certificate subscribers that request certificates that include
the certificate extension, and server operators that provide the logotype
data.</t>
      <t>Alternatively, embedding the logotype data  in the certificate with direct
addressing (as defined in <xref target="embedded-image"/>) provides improved privacy
properties and depends upon fewer parties.  However, this approach can
significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.
At least one of the image objects representing a logotype <bcp14>SHOULD</bcp14>
contain an image with a width between of 60 pixels and 200 pixels and a
height between 45 pixels and 150 pixels.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> provide text-based
audio data suitable for processing by text-to-speech software.</t>
      <t>A typical use of text based audio data is inclusion in web applications where the
audio text is placed as the "alt" atttribute value of an html image (img) element
and the language value obtained from LogotypeAudioInfo is included as the "lang"
attribute of that image.</t>
      <t>If a logotype of a certain type (as defined in <xref target="logotypes"/>) is
represented by more than one image object, then each image object <bcp14>MUST</bcp14>
contain variants of roughly the same visual content.  Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  When more than one image object or more than
one audio object  for the same logotype type is included in the certificate,
the certificate issuer is responsible for ensuring that the objects contain
roughly the same content.  Compliant applications <bcp14>MUST NOT</bcp14> display more than
one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the audio object
for any logotype type (see <xref target="logotypes"/>) at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>SHOULD</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Multiple
URIs <bcp14>MAY</bcp14> be included for locations for obtaining the same logotype object.
Multiple hash values <bcp14>MAY</bcp14> be included, each computed with a different
one-way hash function.  Direct addressing supports cases where just
one or a few alternative images and audio objects are referenced.</t>
        <t>The indirect addressing includes one or more references to an external
hashed data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same logotype data.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use the HTTPS scheme (https://...)
or the HTTP scheme (http://...) or the DATA scheme (data://...) <xref target="RFC3986"/>.
However, the "data" URI scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.
Clients <bcp14>MUST</bcp14> support retrieval of referenced LogoTypeData with the
HTTP <xref target="RFC9110"/> and the HTTP with TLS <xref target="RFC8446"/>, or subsequent versions of
these protocols.  Client applications <bcp14>SHOULD</bcp14> also support the "data" URI
scheme <xref target="RFC2397"/> for direct addressing with embedded logotype data
within the extension.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified,
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a resource that contains
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>MUST</bcp14> use the
one-way hash function that is associated with the certificate signature to
compute one hash value, and CAs <bcp14>MAY</bcp14> include other hash values.  Clients
<bcp14>MUST</bcp14> compute a one-way hash value using one of the identified functions,
and clients <bcp14>MUST</bcp14> discard the logotype data if the computed hash value does
not match the hash value in the certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC6838"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
          <t>If more than one loyalty logotype is present, they <bcp14>MUST</bcp14> be
placed in order of preferred appearance.  Some clients <bcp14>MAY</bcp14> choose
to display a subset of the present loyalty logotype data; therefore the
placement within the sequence aids the client selection.  The most
preferred loyalty logotype data <bcp14>MUST</bcp14> be first in the sequence, and the
least preferred loyalty logotype data <bcp14>MUST</bcp14> be last in the sequence.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-certImage object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate image logotype.</t>
          <t>Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image as the only visual
representation of a certificate; however, the certificate user <bcp14>SHOULD</bcp14>
be able to easily obtain the details of the certificate content.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however, the
relying party <bcp14>MUST NOT</bcp14> use the logotypes as part of certification path
validation or automated trust decision.  The sole purpose of logotypes is
to enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many common image formats and their
corresponding MIME type.  The table also indicates the support
requirements for these image formats.  The filename extensions
commonly used for each of these formats is also
provided.  Implementations <bcp14>MAY</bcp14> support other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">.ext</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml+gzip</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC8118"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the
client will receive a response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
a response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>. Implementations <bcp14>SHOULD</bcp14> support
text-based audio data with a MIME type of "text/plain;charset=UTF-8".
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
      <t>Text-based audio data using the MIME type of "text/plain;charset=UTF-8" is
intended to be used by text-to-speech software. When this audio type is used,
the following requirements apply:</t>
      <ul spacing="normal">
        <li>LogotypeAudioInfo <bcp14>MUST</bcp14> be present and specify the language of the text.</li>
        <li>The fileSize, playTime, and channels elements of LogotypeAudioInfo <bcp14>MUST</bcp14> have the value of 0.</li>
        <li>The sampleRate element of LogotypeAudioInfo <bcp14>MUST</bcp14> be absent.</li>
      </ul>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format of the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.  Implementers should review the guidance
in <xref section="7" sectionFormat="of" target="RFC3986"/>.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks.  In such a case, the
accepted image may contain data that could help an attacker to obtain
colliding certificates with identical certificate signatures.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A parent CA can
constrain certification path validation such that subordinate CAs cannot
issue valid certificates to end-entities outside a limited name space or
outside specific certificate polices.  A malicious CA can comply with
these name and policy requirements and still include inappropriate
logotypes in the certificates that it issues.  These certificates will
pass the certification path validation algorithm, which means the client
will trust the logotypes in the certificates.  Since there is no
technical mechanism to prevent or control subordinate CAs from including
the logotype extension or its contents, where appropriate, a parent CA
could employ a legal agreement to impose a suitable restriction on the
subordinate CA.  This situation is not unique to the logotype extension.</t>
      <t>When a relying party fetches remote logotype data, a mismatch between the
media type provided in the mediaType field of the LogotypeDetails and the
Content-Type HTTP header of the retrieved object <bcp14>MUST</bcp14> be treated as a
failure and the fetched logotype data should not be presented to the
user.  However, if more than one location for the remote logotype data is
provided in the certificate extension, the relying party <bcp14>MAY</bcp14> try to fetch
the remote logotype data from an alternate location to resolve the failure.</t>
      <t>When a subscriber requests the inclusion of remote logotype data in a
certificate, the CA cannot be sure that any logotype data will be
available at the provided URI for the entire validity period of the
certificate.  To mitigate this concern, the CA may provide the logotype
data from a server under its control, rather than a subscriber-controlled
server.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and follow the behavior of
subordinate CAs, including Certificate Transparency <xref target="RFC9162"/>.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>Certificates are commonly public objects, so the inclusion of
privacy-sensitive information in certificates should be avoided.  The more
information that is included in a certificate, the greater the likelihood
that the certificate will reveal privacy-sensitive information.  The
inclusion of logotype data needs to be considered in this context.</t>
      <t>Logotype data might be fetched from a server when it is needed.  By
watching activity on the network, an observer can determine which clients
are making use of certificates that contain particular logotype data.
Since clients are expected to locally cache logotype data, network
traffic to the server containing the logotype data will not be generated
every time the certificate is used.  Further, when logotype data is not
cached, activity on the network would reveal certificate usage frequency.
Even when logotype data is cached, regardless of whether direct or
indirect addressing is employed, network traffic monitoring could reveal
when logotype data is fetched for the first time.  Implementations <bcp14>MAY</bcp14>
encrypt fetches of logotype data using HTTPS and pad them to a common size
to reduce visibility into the data that is being fetched.  Likewise, servers
<bcp14>MAY</bcp14> reduce visibility into the data that is being returned by encrypting with
HTTPS and padding to a few common sizes.</t>
      <t>Similarly, when fetching logotype data from a server, the server operator
can determine which clients are making use of certificates that contain
particular logotype data.  As above, locally caching logotype data will
eliminate the need to fetch the logotype data each time the certificate
is used, and lack of caching would reveal usage frequency.  Even when
implementations cache logotype data, regardless of whether direct or
indirect addressing is employed, the server operator could observe when
logotype data is fetched for the first time.</t>
      <t>In addition, the use of an encrypted DNS mechanism, such as DoT <xref target="RFC7858"/>
or DoH <xref target="RFC9230"/>, hide the name resolution traffic associated fetching
remote logotype objects.</t>
      <t>When the "data" URI scheme is used with direct addressing, there is no
network traffic to fetch logotype data, which avoids the observations of
network traffic or server operations described above.  To obtain this
benefit, the certificate will be larger than one that contains a URL.
Due to the improved privacy posture, the "data" URI scheme with direct
addressing will be the only one that is supported by some CAs.
Privacy-aware certificate subscribers <bcp14>MAY</bcp14> wish to insist on their
logotype data being embedded in the certificate with the "data" URI
scheme with direct addressing.</t>
      <t>In cases where logotype data is cached by the relying party, the cache
index should include the hash values of the associated logotype data with the
goal of fetching the logotype data only once, even when it is referenced by
multiple URIs.  The index should include hash values for all supported
hash algorithms.  The cached data should include the media type as well as
the logotype data.  Implementations should give preference to logotype data
that is already in the cache when multiple alternatives are offered in the
LogotypeExtn certificate extension.</t>
      <t>When the "data" URI scheme is used, the relying party <bcp14>MAY</bcp14> add the embedded
logotype data to the local cache, which could avoid the need to fetch the
logotype data if it is referenced by a URL in another certificate.</t>
      <t>When fetching remote logotype data, relying parties should use the most
privacy-preserving options that are available to minimize the opportunities
for servers to "fingerprint" clients. For example, avoid cookies, e-tags, and
client certificates.</t>
      <t>When a relying party encounters a new certificate, the lack of network traffic
to fetch logotype data might indicate that a certificate with references to the
same logotype data has been previously processed and cached.</t>
      <t>TLS 1.3 <xref target="RFC8446"/> includes the ability to encrypt the server's certificate
in the TLS handshake, which helps hide the server's identity from anyone that
is watching activity on the network.  If the server's certificate includes
remote logotype data, the client fetching that data might disclose the
otherwise protected server identity.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Alexey Melnikov for his guidance on media types.  We extend a special
thanks to Tim Geiser for his careful checking of the new examples in
Appendix B.4 and B.5.  We extend a special thanks to Corey Bonnell,
Daniel Kahn Gillmor, Roman Danyliw, Paul Kyzivat, Shuping Peng,
Sheng Jiang for their careful review and helpful comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8118" target="https://www.rfc-editor.org/info/rfc8118">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="M. Hardy" initials="M." surname="Hardy">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="D. Markovic" initials="D." surname="Markovic">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="M. Bailey" initials="M." surname="Bailey">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>The Portable Document Format (PDF) is an ISO standard (ISO 32000-1:2008) defining a final-form document representation language in use for document exchange, including on the Internet, since 1993. This document provides an overview of the PDF format and updates the media type registration of "application/pdf".  It obsoletes RFC 3778.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8118"/>
          <seriesInfo name="DOI" value="10.17487/RFC8118"/>
        </reference>
        <reference anchor="RFC3709" target="https://www.rfc-editor.org/info/rfc3709">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Freeman" initials="T." surname="Freeman">
              <organization/>
            </author>
            <date month="February" year="2004"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3709"/>
          <seriesInfo name="DOI" value="10.17487/RFC3709"/>
        </reference>
        <reference anchor="RFC6170" target="https://www.rfc-editor.org/info/rfc6170">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Image</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Bajaj" initials="S." surname="Bajaj">
              <organization/>
            </author>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6170"/>
          <seriesInfo name="DOI" value="10.17487/RFC6170"/>
        </reference>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9216" target="https://www.rfc-editor.org/info/rfc9216">
          <front>
            <title>S/MIME Example Keys and Certificates</title>
            <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9216"/>
          <seriesInfo name="DOI" value="10.17487/RFC9216"/>
        </reference>
        <reference anchor="RFC9230" target="https://www.rfc-editor.org/info/rfc9230">
          <front>
            <title>Oblivious DNS over HTTPS</title>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="T. Pauly" initials="T." surname="Pauly">
              <organization/>
            </author>
            <author fullname="T. Verma" initials="T." surname="Verma">
              <organization/>
            </author>
            <author fullname="C.A. Wood" initials="C.A." surname="Wood">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
              <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9230"/>
          <seriesInfo name="DOI" value="10.17487/RFC9230"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified, 
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 2002 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <t>Note that <xref target="NEW-ASN1"/> was published in 2021, and all of the features
used in this module are backward compatible with the specification
that was published in 2002.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one image component MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2914: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2900:  OCTET STRING, encapsulates {
30 2896:   SEQUENCE {
A3 2892:    [3] {
30 2888:     SEQUENCE {
30 2884:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2870:       [0] {
30 2866:        SEQUENCE {
30 2862:         SEQUENCE {
30 2858:          SEQUENCE {
16   24:           IA5String 'image/svg+xml-compressed'
30   49:           SEQUENCE {
30   47:            SEQUENCE {
30   11:             SEQUENCE {
06    9:              OBJECT IDENTIFIER
       :               sha-256 (2 16 840 1 101 3 4 2 1)
       :               }
04   32:             OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :              }
       :             }
30 2777:           SEQUENCE {
16 2773:            IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :             }
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-full-cert">
        <name>Full Certificate Example</name>
        <t>The following example contains a certificate for Alice; it is
essentially a renewal of the certificate that appears in <xref target="RFC9216"/>.
Of course, the serial number and issue dates are different.  In
addition, Alice's certificate now has a logotype extension.  The
extension contains URLs for two community logotype images, both at
fictional URLs.  The extension also contains URLs for two subject
logotype images, both at fictional URLs.  An implementation would
display at most three of these images, both of the community logotype
images and one of the subject logotype images.  Direct addressing is
used for all of the images, and the images are hashed by SHA-256.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIFpTCCBI2gAwIBAgITN0EFee11f0Kpolw69Phqzpqx1zANBgkqhkiG9w0BAQ0F
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0yMjA2
MTUxODE4MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G
A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtPSJ6Fg4Fj5Nmn9PkrYo0jTkfCv4TfA/
pdO/KLpZbJOAEr0sI7AjaO7B1GuMUFJeSTulamNfCwDcDkY63PQWl+DILs7GxVwX
urhYdZlaV5hcUqVAckPvedDBc/3rz4D/esFfs+E7QMFtmd+K04s+A8TCNO12DRVB
DpbP4JFD9hsc8prDtpGmFk7rd0q8gqnhxBW2RZAeLqzJOMayCQtws1q7ktkNBR2w
ZX5ICjecF1YJFhX4jrnHwp/iELGqqaNXd3/Y0pG7QFecN7836IPPdfTMSiPR+peC
rhJZwLSewbWXLJe3VMvbvQjoBMpEYlaJBUIKkO1zQ1Pq90njlsJLOwIDAQABo4IC
hDCCAoAwDAYDVR0TAQH/BAIwADAXBgNVHSAEEDAOMAwGCmCGSAFlAwIBMAEwHgYD
VR0RBBcwFYETYWxpY2VAc21pbWUuZXhhbXBsZTATBgNVHSUEDDAKBggrBgEFBQcD
BDAOBgNVHQ8BAf8EBAMCBsAwHQYDVR0OBBYEFLv2zLItHQYSHJeuKWqQENMgZmZz
MB8GA1UdIwQYMBaAFJEwjnwHFwyn8QkoZTYaZxxodvRZMIIB0AYIKwYBBQUHAQwE
ggHCMIIBvqCB4zCB4KBvMG0wazBpFgppbWFnZS9qcGVnMDEwLzALBglghkgBZQME
AgEEIK/8EBZGy1YltJl95Yk+rjqEb1oC04LW2o7U7vh8vR3tMCgWJmh0dHA6Ly93
d3cuZXhhbXBsZS5uZXQvaW1hZ2VzL2xvZ28uanBnoG0wazBpMGcWCWltYWdlL2dp
ZjAxMC8wCwYJYIZIAWUDBAIBBCCIkIGBrftmri9m0EmgTY6g7E6oZEI4WzZKvyyL
0unpZjAnFiVodHRwOi8vd3d3LmV4YW1wbGUub3JnL2xvZ28taW1hZ2UuZ2lmooHV
oIHSMIHPMGUwYxYJaW1hZ2UvZ2lmMDEwLzALBglghkgBZQMEAgEEIGpYUC5ZZ/nd
0Yr+vQ2x/mClExvfD7K+8LVzRVC6G78ZMCMWIWh0dHA6Ly93d3cuc21pbWUuZXhh
bXBsZS9sb2dvLmdpZjBmMGQWCmltYWdlL2pwZWcwMTAvMAsGCWCGSAFlAwQCAQQg
vct7dXJtjBszpCzerHly2krZ8nmEClhYas4vAoDq16UwIxYhaHR0cDovL3d3dy5z
bWltZS5leGFtcGxlL2xvZ28uanBnMA0GCSqGSIb3DQEBDQUAA4IBAQBbjdCNVFA/
emCc5uKX5WSPrdvRFZSs57SEhE0odxvhTrOs13VM8Om0TxhNJ0Pl6d9CJdbUxtFw
SSnSu9fnghDO7OZDJnPiIYLNY5eTTzY6sx85mde9TLaBTE7RZf0W7NV0hqDqcfM+
9HnQrU4TtPSvtPS5rr5SvqkaMM0k89bpbkgZlh9HH14+x+DIeT0dLythiXJvkVod
qEfyZTcdplQHQ4szWO7lsjmvHrUIbS1tdAJnah8AZRZfqiJEFeiUp06hvAWnPc3y
1TMwYI8onfwPIVzyT6YLgjiT6PuLwSB/wtlhI+vWfdINaHdotegjawLm/3jZ+ceN
tu39FvbV0uKJ
-----END CERTIFICATE-----
]]></artwork>
        <t>The following  displays the logotype extension from Alice's
certificate.  The values on the left are the ASN.1 tag (in hexadecimal)
and the length (in decimal).</t>
        <artwork><![CDATA[
30 464: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 450:  OCTET STRING, encapsulates {
30 446:   SEQUENCE {
A0 227:    [0] {
30 224:     SEQUENCE {
A0 111:      [0] {
30 109:       SEQUENCE {
30 107:        SEQUENCE {
30 105:         SEQUENCE {
16  10:          IA5String 'image/jpeg'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            AF FC 10 16 46 CB 56 25 B4 99 7D E5 89 3E AE 3A
      :            84 6F 5A 02 D3 82 D6 DA 8E D4 EE F8 7C BD 1D ED
      :             }
      :            }
30  40:          SEQUENCE {
16  38:           IA5String 'http://www.example.net/images/logo.jpg'
      :            }
      :           }
      :          }
      :         }
      :        }
A0 109:      [0] {
30 107:       SEQUENCE {
30 105:        SEQUENCE {
30 103:         SEQUENCE {
16   9:          IA5String 'image/gif'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            88 90 81 81 AD FB 66 AE 2F 66 D0 49 A0 4D 8E A0
      :            EC 4E A8 64 42 38 5B 36 4A BF 2C 8B D2 E9 E9 66
      :             }
      :            }
30  39:          SEQUENCE {
16  37:           IA5String 'http://www.example.org/logo-image.gif'
      :            }
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
A2 213:    [2] {
A0 210:     [0] {
30 207:      SEQUENCE {
30 101:       SEQUENCE {
30  99:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            6A 58 50 2E 59 67 F9 DD D1 8A FE BD 0D B1 FE 60
      :            A5 13 1B DF 0F B2 BE F0 B5 73 45 50 BA 1B BF 19
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.gif'
      :           }
      :          }
      :         }
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            BD CB 7B 75 72 6D 8C 1B 33 A4 2C DE AC 79 72 DA
      :            4A D9 F2 79 84 0A 58 58 6A CE 2F 02 80 EA D7 A5
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.jpg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709 and RFC 6170</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>RFC 3709 required client applications to support both direct and indirect
addressing.  This requirement is changed to <bcp14>SHOULD</bcp14> support both direct and
indirect addressing to allow implementations to be more privacy preserving.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>Update the reference for the URI Generic Syntax to be RFC 3986 instead
of the now obsolete RFC 2396.</li>
        <li>Update the reference for the application/pdf media type to be RFC 8118
instead of the now obsolete RFC 3778.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml+gzip media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC6838"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Encourage, instead of requiring, each logotype to be represented by
at least one image.</li>
        <li>Encourage the inclusion of text-based audio data suitable for
processing by a text-to-speech software using the MIME type of
"text/plain;charset=UTF-8".</li>
        <li>Require that the logotype extension not contain more than one certificate
image logotype.</li>
        <li>Privacy-related topics that were previously discussed in the Security
Considerations section are now covered in a separate Privacy Considerations
section.  Additional topics are covered in both sections.</li>
        <li>Provide ASN.1 modules for both the older syntax <xref target="OLD-ASN1"/> and the most
recent ASN.1 syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
        <li>Several editorial changes to improve clarity.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
