<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-08" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-08"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="29"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 <xref target="RFC3709"/> and RFC 6170 <xref target="RFC6170"/>.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709 and RFC 6170.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information and operational technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in business-to-business (B2B), business-to-consumer (B2C), and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are authorization
decisions.  Automatic processing will make some authorization decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
authorization decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).  Certificate issuers may include more than one community
logotype to indicate participation in more than one global community.</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>Image and audio data for logotypes can be provided by reference by including
a URI that identifies the location to the logotype data and a one-way hash
of the referenced data in the certificate.  The privacy-related properties
for remote logotype data depend on four parties: the certificate relying
parties that use the information in the certificate extension to fetch
the logotype data, the certificate issuers that populate the certificate
extension, certificate subscribers that request certificates that include
the certificate extension, and server operators that provide the logotype
data.</t>
      <t>Alternatively, embedding the logotype data  in the certificate with direct
addressing (as defined in <xref target="embedded-image"/>) provides improved privacy
properties and depends upon fewer parties.  However, this approach can
significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.  At
least one of the image objects representing a logotype <bcp14>SHOULD</bcp14> contain an
image with a width between 60 pixels and 200 pixels and a height between
45 pixels and 150 pixels.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> provide text-based
audio data suitable for processing by text-to-speech software.</t>
      <t>A typical use of text based audio data is inclusion in web applications where the
audio text is placed as the "alt" atttribute value of an html image (img) element
and the language value obtained from LogotypeAudioInfo is included as the "lang"
attribute of that image.</t>
      <t>If a logotype of a certain type (as defined in <xref target="logotypes"/>) is
represented by more than one image object, then each image object <bcp14>MUST</bcp14>
contain variants of roughly the same visual content.  Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  When more than one image object or more than
one audio object  for the same logotype type is included in the certificate,
the certificate issuer is responsible for ensuring that the objects contain
roughly the same content.  Compliant applications <bcp14>MUST NOT</bcp14> display more than
one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the audio objects
for any logotype type (see <xref target="logotypes"/>) at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>SHOULD</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Multiple
URIs <bcp14>MAY</bcp14> be included for locations for obtaining the same logotype object.
Multiple hash values <bcp14>MAY</bcp14> be included, each computed with a different
one-way hash function.  Direct addressing supports cases where just
one or a few alternative images and audio objects are referenced.</t>
        <t>The indirect addressing includes one or more references to an external
hashed data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same logotype data.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use the HTTPS scheme (https://...)
or the HTTP scheme (http://...) or the DATA scheme (data://...) <xref target="RFC3986"/>.
However, the "data" URI scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.
Clients <bcp14>MUST</bcp14> support retrieval of referenced LogoTypeData with the
HTTP <xref target="RFC9110"/> and the HTTP with TLS <xref target="RFC8446"/>, or subsequent versions of
these protocols.  Client applications <bcp14>SHOULD</bcp14> also support the "data" URI
scheme <xref target="RFC2397"/> for direct addressing with embedded logotype data
within the extension.</t>
        <t>Note that the HTTPS scheme (https://...) requires the validation of other
certificates to establish a secure connection.  For this reason, the
HTTP scheme (http://...) may be easier for a client to handle.  Also, the
hash of the logotype data provides data integrity.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified,
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a resource that contains
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>MUST</bcp14> use the
one-way hash function that is associated with the certificate signature to
compute one hash value, and CAs <bcp14>MAY</bcp14> include other hash values.  Clients
<bcp14>MUST</bcp14> compute a one-way hash value using one of the identified functions,
and clients <bcp14>MUST</bcp14> discard the logotype data if the computed hash value does
not match the hash value in the certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC6838"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
          <t>If more than one loyalty logotype is present, they <bcp14>MUST</bcp14> be
placed in order of preferred appearance.  Some clients <bcp14>MAY</bcp14> choose
to display a subset of the present loyalty logotype data; therefore the
placement within the sequence aids the client selection.  The most
preferred loyalty logotype data <bcp14>MUST</bcp14> be first in the sequence, and the
least preferred loyalty logotype data <bcp14>MUST</bcp14> be last in the sequence.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-certImage object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate image logotype.</t>
          <t>Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image as the only visual
representation of a certificate; however, the certificate user <bcp14>SHOULD</bcp14>
be able to easily obtain the details of the certificate content.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however, the
relying party <bcp14>MUST NOT</bcp14> use the logotypes as part of certification path
validation or automated trust decision.  The sole purpose of logotypes is
to enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many common image formats and their
corresponding MIME type.  The table also indicates the support
requirements for these image formats.  The filename extensions
commonly used for each of these formats is also
provided.  Implementations <bcp14>MAY</bcp14> support other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">Extension</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml+gzip</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC8118"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the
client will receive a response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
a response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>. Implementations <bcp14>SHOULD</bcp14> support
text-based audio data with a MIME type of "text/plain;charset=UTF-8".
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
      <t>Text-based audio data using the MIME type of "text/plain;charset=UTF-8" is
intended to be used by text-to-speech software. When this audio type is used,
the following requirements apply:</t>
      <ul spacing="normal">
        <li>LogotypeAudioInfo <bcp14>MUST</bcp14> be present and specify the language of the text.</li>
        <li>The fileSize, playTime, and channels elements of LogotypeAudioInfo <bcp14>MUST</bcp14> have the value of 0.</li>
        <li>The sampleRate element of LogotypeAudioInfo <bcp14>MUST</bcp14> be absent.</li>
      </ul>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format of the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.  Implementers should review the guidance
in <xref section="7" sectionFormat="of" target="RFC3986"/>.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks such as <xref target="RFC6151"/>.  In
such a case, the accepted image may contain data that could help an
attacker to obtain colliding certificates with identical certificate
signatures.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A parent CA can
constrain certification path validation such that subordinate CAs cannot
issue valid certificates to end-entities outside a limited name space or
outside specific certificate polices.  A malicious CA can comply with
these name and policy requirements and still include inappropriate
logotypes in the certificates that it issues.  These certificates will
pass the certification path validation algorithm, which means the client
will trust the logotypes in the certificates.  Since there is no
technical mechanism to prevent or control subordinate CAs from including
the logotype extension or its contents, where appropriate, a parent CA
could employ a legal agreement to impose a suitable restriction on the
subordinate CA.  This situation is not unique to the logotype extension.</t>
      <t>When a relying party fetches remote logotype data, a mismatch between the
media type provided in the mediaType field of the LogotypeDetails and the
Content-Type HTTP header of the retrieved object <bcp14>MUST</bcp14> be treated as a
failure and the fetched logotype data should not be presented to the
user.  However, if more than one location for the remote logotype data is
provided in the certificate extension, the relying party <bcp14>MAY</bcp14> try to fetch
the remote logotype data from an alternate location to resolve the failure.</t>
      <t>When a subscriber requests the inclusion of remote logotype data in a
certificate, the CA cannot be sure that any logotype data will be
available at the provided URI for the entire validity period of the
certificate.  To mitigate this concern, the CA may provide the logotype
data from a server under its control, rather than a subscriber-controlled
server.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and follow the behavior of
subordinate CAs, including Certificate Transparency <xref target="RFC9162"/>.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>Certificates are commonly public objects, so the inclusion of
privacy-sensitive information in certificates should be avoided.  The more
information that is included in a certificate, the greater the likelihood
that the certificate will reveal privacy-sensitive information.  The
inclusion of logotype data needs to be considered in this context.</t>
      <t>Logotype data might be fetched from a server when it is needed.  By
watching activity on the network, an observer can determine which clients
are making use of certificates that contain particular logotype data.
Since clients are expected to locally cache logotype data, network
traffic to the server containing the logotype data will not be generated
every time the certificate is used.  Further, when logotype data is not
cached, activity on the network would reveal certificate usage frequency.
Even when logotype data is cached, regardless of whether direct or
indirect addressing is employed, network traffic monitoring could reveal
when logotype data is fetched for the first time.  Implementations <bcp14>MAY</bcp14>
encrypt fetches of logotype data using HTTPS and pad them to a common size
to reduce visibility into the data that is being fetched.  Likewise, servers
<bcp14>MAY</bcp14> reduce visibility into the data that is being returned by encrypting with
HTTPS and padding to a few common sizes.</t>
      <t>Similarly, when fetching logotype data from a server, the server operator
can determine which clients are making use of certificates that contain
particular logotype data.  As above, locally caching logotype data will
eliminate the need to fetch the logotype data each time the certificate
is used, and lack of caching would reveal usage frequency.  Even when
implementations cache logotype data, regardless of whether direct or
indirect addressing is employed, the server operator could observe when
logotype data is fetched for the first time.</t>
      <t>In addition, the use of an encrypted DNS mechanism, such as DoT <xref target="RFC7858"/>
or DoH <xref target="RFC9230"/>, hides the name resolution traffic associated fetching
remote logotype objects.</t>
      <t>When the "data" URI scheme is used with direct addressing, there is no
network traffic to fetch logotype data, which avoids the observations of
network traffic or server operations described above.  To obtain this
benefit, the certificate will be larger than one that contains a URL.
Due to the improved privacy posture, the "data" URI scheme with direct
addressing will be the only one that is supported by some CAs.
Privacy-aware certificate subscribers <bcp14>MAY</bcp14> wish to insist on their
logotype data being embedded in the certificate with the "data" URI
scheme with direct addressing.</t>
      <t>In cases where logotype data is cached by the relying party, the cache
index should include the hash values of the associated logotype data with the
goal of fetching the logotype data only once, even when it is referenced by
multiple URIs.  The index should include hash values for all supported
hash algorithms.  The cached data should include the media type as well as
the logotype data.  Implementations should give preference to logotype data
that is already in the cache when multiple alternatives are offered in the
LogotypeExtn certificate extension.</t>
      <t>When the "data" URI scheme is used, the relying party <bcp14>MAY</bcp14> add the embedded
logotype data to the local cache, which could avoid the need to fetch the
logotype data if it is referenced by a URL in another certificate.</t>
      <t>When fetching remote logotype data, relying parties should use the most
privacy-preserving options that are available to minimize the opportunities
for servers to "fingerprint" clients. For example, avoid cookies, e-tags, and
client certificates.</t>
      <t>When a relying party encounters a new certificate, the lack of network traffic
to fetch logotype data might indicate that a certificate with references to the
same logotype data has been previously processed and cached.</t>
      <t>TLS 1.3 <xref target="RFC8446"/> includes the ability to encrypt the server's certificate
in the TLS handshake, which helps hide the server's identity from anyone that
is watching activity on the network.  If the server's certificate includes
remote logotype data, the client fetching that data might disclose the
otherwise protected server identity.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Alexey Melnikov for his guidance on media types.  We extend a special
thanks to Tim Geiser for his careful checking of the new examples in
Appendix B.4 and B.5.  We extend a special thanks to Corey Bonnell,
Daniel Kahn Gillmor, Roman Danyliw, Paul Kyzivat, Shuping Peng,
Sheng Jiang, Rob Wilton, Eric Vyncke, and Donald Eastlake
for their careful review and helpful comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6151" target="https://www.rfc-editor.org/info/rfc6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="L. Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm.  It also updates the security considerations for HMAC-MD5.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8118" target="https://www.rfc-editor.org/info/rfc8118">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="M. Hardy" initials="M." surname="Hardy">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="D. Markovic" initials="D." surname="Markovic">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="M. Bailey" initials="M." surname="Bailey">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>The Portable Document Format (PDF) is an ISO standard (ISO 32000-1:2008) defining a final-form document representation language in use for document exchange, including on the Internet, since 1993. This document provides an overview of the PDF format and updates the media type registration of "application/pdf".  It obsoletes RFC 3778.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8118"/>
          <seriesInfo name="DOI" value="10.17487/RFC8118"/>
        </reference>
        <reference anchor="RFC3709" target="https://www.rfc-editor.org/info/rfc3709">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Freeman" initials="T." surname="Freeman">
              <organization/>
            </author>
            <date month="February" year="2004"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3709"/>
          <seriesInfo name="DOI" value="10.17487/RFC3709"/>
        </reference>
        <reference anchor="RFC6170" target="https://www.rfc-editor.org/info/rfc6170">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Image</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Bajaj" initials="S." surname="Bajaj">
              <organization/>
            </author>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6170"/>
          <seriesInfo name="DOI" value="10.17487/RFC6170"/>
        </reference>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9216" target="https://www.rfc-editor.org/info/rfc9216">
          <front>
            <title>S/MIME Example Keys and Certificates</title>
            <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9216"/>
          <seriesInfo name="DOI" value="10.17487/RFC9216"/>
        </reference>
        <reference anchor="RFC9230" target="https://www.rfc-editor.org/info/rfc9230">
          <front>
            <title>Oblivious DNS over HTTPS</title>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="T. Pauly" initials="T." surname="Pauly">
              <organization/>
            </author>
            <author fullname="T. Verma" initials="T." surname="Verma">
              <organization/>
            </author>
            <author fullname="C.A. Wood" initials="C.A." surname="Wood">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
              <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9230"/>
          <seriesInfo name="DOI" value="10.17487/RFC9230"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified, 
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 2002 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <t>Note that <xref target="NEW-ASN1"/> was published in 2021, and all of the features
used in this module are backward compatible with the specification
that was published in 2002.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one image component MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2914: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2900:  OCTET STRING, encapsulates {
30 2896:   SEQUENCE {
A3 2892:    [3] {
30 2888:     SEQUENCE {
30 2884:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2870:       [0] {
30 2866:        SEQUENCE {
30 2862:         SEQUENCE {
30 2858:          SEQUENCE {
16   24:           IA5String 'image/svg+xml-compressed'
30   49:           SEQUENCE {
30   47:            SEQUENCE {
30   11:             SEQUENCE {
06    9:              OBJECT IDENTIFIER
       :               sha-256 (2 16 840 1 101 3 4 2 1)
       :               }
04   32:             OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :              }
       :             }
30 2777:           SEQUENCE {
16 2773:            IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :             }
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-full-cert">
        <name>Full Certificate Example</name>
        <t>The following example contains a certificate for Alice; it is
essentially a renewal of the certificate that appears in <xref target="RFC9216"/>.
Of course, the serial number and issue dates are different.  In
addition, Alice's certificate now has a logotype extension.  The
extension contains URLs for two community logotype images, both at
fictional URLs.  The extension also contains URLs for two subject
logotype images, both at fictional URLs.  An implementation would
display at most three of these images, both of the community logotype
images and one of the subject logotype images.  Direct addressing is
used for all of the images, and the images are hashed by SHA-256.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The following  displays the logotype extension from Alice's
certificate.  The values on the left are the ASN.1 tag (in hexadecimal)
and the length (in decimal).</t>
        <artwork><![CDATA[
30 464: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 450:  OCTET STRING, encapsulates {
30 446:   SEQUENCE {
A0 227:    [0] {
30 224:     SEQUENCE {
A0 111:      [0] {
30 109:       SEQUENCE {
30 107:        SEQUENCE {
30 105:         SEQUENCE {
16  10:          IA5String 'image/jpeg'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            AF FC 10 16 46 CB 56 25 B4 99 7D E5 89 3E AE 3A
      :            84 6F 5A 02 D3 82 D6 DA 8E D4 EE F8 7C BD 1D ED
      :             }
      :            }
30  40:          SEQUENCE {
16  38:           IA5String 'http://www.example.net/images/logo.jpg'
      :            }
      :           }
      :          }
      :         }
      :        }
A0 109:      [0] {
30 107:       SEQUENCE {
30 105:        SEQUENCE {
30 103:         SEQUENCE {
16   9:          IA5String 'image/gif'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            88 90 81 81 AD FB 66 AE 2F 66 D0 49 A0 4D 8E A0
      :            EC 4E A8 64 42 38 5B 36 4A BF 2C 8B D2 E9 E9 66
      :             }
      :            }
30  39:          SEQUENCE {
16  37:           IA5String 'http://www.example.org/logo-image.gif'
      :            }
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
A2 213:    [2] {
A0 210:     [0] {
30 207:      SEQUENCE {
30 101:       SEQUENCE {
30  99:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            6A 58 50 2E 59 67 F9 DD D1 8A FE BD 0D B1 FE 60
      :            A5 13 1B DF 0F B2 BE F0 B5 73 45 50 BA 1B BF 19
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.gif'
      :           }
      :          }
      :         }
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            BD CB 7B 75 72 6D 8C 1B 33 A4 2C DE AC 79 72 DA
      :            4A D9 F2 79 84 0A 58 58 6A CE 2F 02 80 EA D7 A5
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.jpg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709 and RFC 6170</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>RFC 3709 required client applications to support both direct and indirect
addressing.  This requirement is changed to <bcp14>SHOULD</bcp14> support both direct and
indirect addressing to allow implementations to be more privacy preserving.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>Update the reference for the URI Generic Syntax to be RFC 3986 instead
of the now obsolete RFC 2396.</li>
        <li>Update the reference for the application/pdf media type to be RFC 8118
instead of the now obsolete RFC 3778.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml+gzip media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC6838"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Encourage, instead of requiring, each logotype to be represented by
at least one image.</li>
        <li>Encourage the inclusion of text-based audio data suitable for
processing by a text-to-speech software using the MIME type of
"text/plain;charset=UTF-8".</li>
        <li>Require that the logotype extension not contain more than one certificate
image logotype.</li>
        <li>Privacy-related topics that were previously discussed in the Security
Considerations section are now covered in a separate Privacy Considerations
section.  Additional topics are covered in both sections.</li>
        <li>Provide ASN.1 modules for both the older syntax <xref target="OLD-ASN1"/> and the most
recent ASN.1 syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
        <li>Several editorial changes to improve clarity.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
