<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc5019bis-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="RFC5019bis">Updates to Lightweight OCSP Profile for High Volume Environments</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5019bis-01"/>
    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="Clint Wilson">
      <organization>Apple, Inc.</organization>
      <address>
        <email>clintw@apple.com</email>
      </address>
    </author>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2023" month="December" day="14"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 48?>

<t>This document updates RFC 5019 to allow OCSP clients to use SHA-256.
An RFC 5019 compliant OCSP client is still able to use SHA-1,
but the use of SHA-1 may become obsolete in the future.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/tadahik/RFC5019bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Online Certificate Status Protocol <xref target="RFC6960"/> specifies a mechanism
used to determine the status of digital certificates, in lieu of
using Certificate Revocation Lists (CRLs). Since its definition in
1999, it has been deployed in a variety of environments and has
proven to be a useful certificate status checking mechanism. (For
brevity we refer to OCSP as being used to verify certificate status,
but only the revocation status of a certificate is checked via this
protocol.)</t>
      <t>To date, many OCSP deployments have been used to ensure timely and
secure certificate status information for high-value electronic
transactions or highly sensitive information, such as in the banking
and financial environments. As such, the requirement for an OCSP
responder to respond in "real time" (i.e., generating a new OCSP
response for each OCSP request) has been important. In addition,
these deployments have operated in environments where bandwidth usage
is not an issue, and have run on client and server systems where
processing power is not constrained.</t>
      <t>As the use of PKI continues to grow and move into diverse
environments, so does the need for a scalable and cost-effective
certificate status mechanism. Although OCSP as currently defined and
deployed meets the need of small to medium-sized PKIs that operate on
powerful systems on wired networks, there is a limit as to how these
OCSP deployments scale from both an efficiency and cost perspective.
Mobile environments, where network bandwidth may be at a premium and
client-side devices are constrained from a processing point of view,
require the careful use of OCSP to minimize bandwidth usage and
client-side processing complexity. <xref target="OCSPMP"/></t>
      <t>PKI continues to be deployed into environments where millions if not
hundreds of millions of certificates have been issued. In many of
these environments, an even larger number of users (also known as
relying parties) have the need to ensure that the certificate they
are relying upon has not been revoked. As such, it is important that
OCSP is used in such a way that ensures the load on OCSP responders
and the network infrastructure required to host those responders are
kept to a minimum.</t>
      <t>This document addresses the scalability issues inherent when using
OCSP in PKI environments described above by defining a message
profile and clarifying OCSP client and responder behavior that will
permit:</t>
      <ol spacing="normal" type="1"><li>
          <t>OCSP response pre-production and distribution.</t>
        </li>
        <li>
          <t>Reduced OCSP message size to lower bandwidth usage.</t>
        </li>
        <li>
          <t>Response message caching both in the network and on the client.</t>
        </li>
      </ol>
      <t>It is intended that the normative requirements defined in this
profile will be adopted by OCSP clients and OCSP responders operating
in very large-scale (high-volume) PKI environments or PKI
environments that require a lightweight solution to minimize
bandwidth and client-side processing power (or both), as described
above. As OCSP does not have the means to signal responder
capabilities within the protocol, clients needing to differentiate
between OCSP responses produced by responders that conform with this
profile and those that are not need to rely on out-of-band mechanisms
to determine when a responder operates according to this profile and,
as such, when the requirements of this profile apply. In the case
where out-of-band mechanisms may not be available, this profile
ensures that interoperability will still occur between an OCSP client
that fully conforms with <xref target="RFC6960"/> and a responder that is operating
in a mode as described in this specification.</t>
      <t>Substantive changes to RFC 5019:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="certid"/> requires new OCSP clients to use SHA-256 to
support migration for OCSP clients.</t>
        </li>
        <li>
          <t><xref target="byKey"/> requires new OCSP responders to use the byKey field,
and support migration from byName fields.</t>
        </li>
        <li>
          <t><xref target="transport"/> clarifies OCSP clients not include
whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string.</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="ocsp-message-profile">
      <name>OCSP Message Profile</name>
      <t>This section defines a subset of OCSPRequest and OCSPResponse
functionality as defined in <xref target="RFC6960"/>.</t>
      <section anchor="req-profile">
        <name>OCSP Request Profile</name>
        <section anchor="certid">
          <name>OCSPRequest Structure</name>
          <t>OCSPRequests that conform to this profile <bcp14>MUST</bcp14> include only one Request
in the OCSPRequest.RequestList structure.</t>
          <t>Older OCSP clients which provide backward compatibility with
<xref target="RFC5019"/> use SHA-1 as the hashing algorithm for the
CertID.issuerNameHash and the CertID.issuerKeyHash values. However,
these OCSP clients should transition from SHA-1 to SHA-256 as soon as
practical.</t>
          <t>Newer OCSP clients that conform with this profile <bcp14>MUST</bcp14>
use SHA-256 as the hashing algorithm for the
CertID.issuerNameHash and the CertID.issuerKeyHash values.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> include the singleRequestExtensions structure.</t>
          <t>Clients <bcp14>SHOULD NOT</bcp14> include the requestExtensions structure. If a
requestExtensions structure is included, this profile RECOMMENDS that
it contain only the nonce extension (id-pkix-ocsp-nonce). See
<xref target="fresh"/> for issues concerning the use of a nonce in high-volume
OCSP environments.</t>
        </section>
        <section anchor="signed-ocsprequests">
          <name>Signed OCSPRequests</name>
          <t>Clients <bcp14>SHOULD NOT</bcp14> send signed OCSPRequests. Responders <bcp14>MAY</bcp14> ignore
the signature on OCSPRequests.</t>
          <t>If the OCSPRequest is signed, the client <bcp14>SHALL</bcp14> specify its name in
the OCSPRequest.requestorName field; otherwise, clients <bcp14>SHOULD NOT</bcp14>
include the requestorName field in the OCSPRequest. OCSP servers
<bcp14>MUST</bcp14> be prepared to receive unsigned OCSP requests that contain the
requestorName field, but <bcp14>MUST</bcp14> handle such requests as if the
requestorName field were absent.</t>
        </section>
      </section>
      <section anchor="ocsp-response-profile">
        <name>OCSP Response Profile</name>
        <section anchor="ocspresponse-structure">
          <name>OCSPResponse Structure</name>
          <t>Responders <bcp14>MUST</bcp14> generate a BasicOCSPResponse as identified by the
id-pkix-ocsp-basic OID. Clients <bcp14>MUST</bcp14> be able to parse and accept a
BasicOCSPResponse. OCSPResponses that conform to this profile <bcp14>SHOULD</bcp14>
include only one SingleResponse in the ResponseData.responses
structure, but <bcp14>MAY</bcp14> include additional SingleResponse elements if
necessary to improve response pre-generation performance or cache
efficiency. For instance, ResponseData.responses of OCSPResponses
that conform to this profile <bcp14>MAY</bcp14> include two SingleResponse
with SHA-1 and SHA-256 certID of the same certificate.</t>
          <t>The responder <bcp14>SHOULD NOT</bcp14> include responseExtensions. As specified in
<xref target="RFC6960"/>, clients <bcp14>MUST</bcp14> ignore unrecognized non-critical
responseExtensions in the response.</t>
          <t>In the case where a responder does not have the ability to respond to
an OCSP request containing an option not supported by the server, it
<bcp14>SHOULD</bcp14> return the most complete response it can. For example, in the
case where a responder only supports pre-produced responses and does
not have the ability to respond to an OCSP request containing a
nonce, it <bcp14>SHOULD</bcp14> return a response that does not include a nonce.</t>
          <t>Clients <bcp14>SHOULD</bcp14> attempt to process a response even if the response
does not include a nonce. See <xref target="fresh"/> for details on validating
responses that do not contain a nonce. See also <xref target="sec-cons"/> for
relevant security considerations.</t>
          <t>Responders that do not have the ability to respond to OCSP requests
that contain an unsupported option such as a nonce <bcp14>MAY</bcp14> forward the
request to an OCSP responder capable of doing so.</t>
          <t>The responder <bcp14>MAY</bcp14> include the singleResponse.singleResponse
extensions structure.</t>
        </section>
        <section anchor="byKey">
          <name>Signed OCSPResponses</name>
          <t>Clients <bcp14>MUST</bcp14> validate the signature on the returned OCSPResponse.</t>
          <t>If the response is signed by a delegate of the issuing certification
authority (CA), a valid responder certificate <bcp14>MUST</bcp14> be referenced in
the BasicOCSPResponse.certs structure.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> that the OCSP responder's certificate contain the
id-pkix-ocsp-nocheck extension, as defined in <xref target="RFC6960"/>, to indicate
to the client that it need not check the certificate's status. In
addition, it is <bcp14>RECOMMENDED</bcp14> that neither an OCSP authorityInfoAccess
(AIA) extension nor cRLDistributionPoints (CRLDP) extension be
included in the OCSP responder's certificate. Accordingly, the
responder's signing certificate <bcp14>SHOULD</bcp14> be relatively short-lived and
renewed regularly.</t>
          <t>Clients <bcp14>MUST</bcp14> be able to identify OCSP responder certificates using
the byKey field and <bcp14>SHOULD</bcp14> be able to identify OCSP responder
certificates using the byName field of the ResponseData.ResponderID
choices.</t>
          <t>Older responders which provide backward compatibility with <xref target="RFC5019"/>
            <bcp14>MAY</bcp14> use the byName field to represent the ResponderID, but should
transition to using the byKey field as soon as practical.</t>
          <t>Newer responders that conform to this profile <bcp14>MUST</bcp14> use the byKey
field to represent the ResponderID to reduce the size of the response.</t>
        </section>
        <section anchor="ocspresponsestatus-values">
          <name>OCSPResponseStatus Values</name>
          <t>As long as the OCSP infrastructure has authoritative records for a
particular certificate, an OCSPResponseStatus of "successful" will be
returned. When access to authoritative records for a particular
certificate is not available, the responder <bcp14>MUST</bcp14> return an
OCSPResponseStatus of "unauthorized". As such, this profile extends
the <xref target="RFC6960"/> definition of "unauthorized" as follows:</t>
          <t>The response "unauthorized" is returned in cases where the client
is not authorized to make this query to this server or the server
is not capable of responding authoritatively.</t>
          <t>For example, OCSP responders that do not have access to authoritative
records for a requested certificate, such as those that generate and
distribute OCSP responses in advance and thus do not have the ability
to properly respond with a signed "successful" yet "unknown"
response, will respond with an OCSPResponseStatus of "unauthorized".
Also, in order to ensure the database of revocation information does
not grow unbounded over time, the responder <bcp14>MAY</bcp14> remove the status
records of expired certificates. Requests from clients for
certificates whose record has been removed will result in an
OCSPResponseStatus of "unauthorized".</t>
          <t>Security considerations regarding the use of unsigned responses are
discussed in <xref target="RFC6960"/>.</t>
        </section>
        <section anchor="times">
          <name>thisUpdate, nextUpdate, and producedAt</name>
          <t>When pre-producing OCSPResponse messages, the responder <bcp14>MUST</bcp14> set the
thisUpdate, nextUpdate, and producedAt times as follows:</t>
          <dl>
            <dt>thisUpdate:</dt>
            <dd>
              <t>The time at which the status being indicated is known to be correct.</t>
            </dd>
            <dt>nextUpdate:</dt>
            <dd>
              <t>The time at or before which newer information will be available
about the status of the certificate. Responders <bcp14>MUST</bcp14> always include
this value to aid in response caching. See <xref target="cache-recs"/> for additional
information on caching.</t>
            </dd>
            <dt>producedAt:</dt>
            <dd>
              <t>The time at which the OCSP response was signed.</t>
            </dd>
          </dl>
          <aside>
            <t>Note: In many cases the value of thisUpdate and producedAt will be
  the same.</t>
          </aside>
          <t>For the purposes of this profile, ASN.1-encoded GeneralizedTime
values such as thisUpdate, nextUpdate, and producedAt <bcp14>MUST</bcp14> be
expressed Greenwich Mean Time (Zulu) and <bcp14>MUST</bcp14> include seconds (i.e.,
times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values <bcp14>MUST NOT</bcp14> include fractional seconds.</t>
        </section>
      </section>
    </section>
    <section anchor="client-behavior">
      <name>Client Behavior</name>
      <section anchor="ocsp-responder-discovery">
        <name>OCSP Responder Discovery</name>
        <t>Clients <bcp14>MUST</bcp14> support the authorityInfoAccess extension as defined in
<xref target="RFC5280"/> and <bcp14>MUST</bcp14> recognize the id-ad-ocsp access method. This
enables CAs to inform clients how they can contact the OCSP service.</t>
        <t>In the case where a client is checking the status of a certificate
that contains both an authorityInformationAccess (AIA) extension
pointing to an OCSP responder and a cRLDistributionPoints extension
pointing to a CRL, the client <bcp14>SHOULD</bcp14> attempt to contact the OCSP
responder first. Clients <bcp14>MAY</bcp14> attempt to retrieve the CRL if no
OCSPResponse is received from the responder after a locally
configured timeout and number of retries.</t>
      </section>
      <section anchor="sending-an-ocsp-request">
        <name>Sending an OCSP Request</name>
        <t>To avoid needless network traffic, applications <bcp14>MUST</bcp14> verify the
signature of signed data before asking an OCSP client to check the
status of certificates used to verify the data. If the signature is
invalid or the application is not able to verify it, an OCSP check
<bcp14>MUST NOT</bcp14> be requested.</t>
        <t>Similarly, an application <bcp14>MUST</bcp14> validate the signature on certificates
in a chain, before asking an OCSP client to check the status of the
certificate. If the certificate signature is invalid or the
application is not able to verify it, an OCSP check <bcp14>MUST NOT</bcp14> be
requested. Clients <bcp14>SHOULD NOT</bcp14> make a request to check the status of
expired certificates.</t>
      </section>
    </section>
    <section anchor="fresh">
      <name>Ensuring an OCSPResponse Is Fresh</name>
      <t>In order to ensure that a client does not accept an out-of-date
response that indicates a 'good' status when in fact there is a more
up-to-date response that specifies the status of 'revoked', a client
must ensure the responses they receive are fresh.</t>
      <t>In general, two mechanisms are available to clients to ensure a
response is fresh. The first uses nonces, and the second is based on
time. In order for time-based mechanisms to work, both clients and
responders <bcp14>MUST</bcp14> have access to an accurate source of time.</t>
      <t>Because this profile specifies that clients <bcp14>SHOULD NOT</bcp14> include a
requestExtensions structure in OCSPRequests (see <xref target="req-profile"/>),
clients <bcp14>MUST</bcp14> be able to determine OCSPResponse freshness based on an
accurate source of time. Clients that opt to include a nonce in the
request <bcp14>SHOULD NOT</bcp14> reject a corresponding OCSPResponse solely on the
basis of the nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to
validating the OCSPResponse based on time.</t>
      <t>Clients that do not include a nonce in the request <bcp14>MUST</bcp14> ignore any
nonce that may be present in the response.</t>
      <t>Clients <bcp14>MUST</bcp14> check for the existence of the nextUpdate field and <bcp14>MUST</bcp14>
ensure the current time, expressed in GMT time as described in
<xref target="times"/>, falls between the thisUpdate and nextUpdate times. If
the nextUpdate field is absent, the client <bcp14>MUST</bcp14> reject the response.</t>
      <t>If the nextUpdate field is present, the client <bcp14>MUST</bcp14> ensure that it is
not earlier than the current time. If the current time on the client
is later than the time specified in the nextUpdate field, the client
<bcp14>MUST</bcp14> reject the response as stale. Clients <bcp14>MAY</bcp14> allow configuration
of a small tolerance period for acceptance of responses after
nextUpdate to handle minor clock differences relative to responders
and caches. This tolerance period should be chosen based on the
accuracy and precision of time synchronization technology available
to the calling application environment. For example, Internet peers
with low latency connections typically expect NTP time
synchronization to keep them accurate within parts of a second;
higher latency environments or where an NTP analogue is not available
may have to be more liberal in their tolerance.</t>
      <t>See the security considerations in <xref target="sec-cons"/> for additional details
on replay and man-in-the-middle attacks.</t>
    </section>
    <section anchor="transport">
      <name>Transport Profile</name>
      <t>The OCSP responder <bcp14>MUST</bcp14> support requests and responses over HTTP.
When sending requests that are less than or equal to 255 bytes in
total (after encoding) including the scheme and delimiters (http://),
server name and base64-encoded OCSPRequest structure, clients <bcp14>MUST</bcp14>
use the GET method (to enable OCSP response caching). OCSP requests
larger than 255 bytes <bcp14>SHOULD</bcp14> be submitted using the POST method. In
all cases, clients <bcp14>MUST</bcp14> follow the descriptions in A.1 of <xref target="RFC6960"/>
when constructing these messages.</t>
      <t>When constructing a GET message, OCSP clients <bcp14>MUST</bcp14> base64-encode the
OCSPRequest structure according to <xref target="RFC4648"/>, section 3. Clients
<bcp14>MUST NOT</bcp14> include whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string. Clients
<bcp14>MUST</bcp14> properly URL-encode the base64-encoded OCSPRequest according to
<xref target="RFC3986"/>. OCSP clients <bcp14>MUST</bcp14> append the base64-encoded OCSPRequest
to the URI specified in the AIA extension <xref target="RFC5280"/>. For example:</t>
      <artwork><![CDATA[
    http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dA
    deGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D
]]></artwork>
      <t>In response to properly formatted OCSPRequests that are cachable
(i.e., responses that contain a nextUpdate value), the responder will
include the binary value of the DER encoding of the OCSPResponse
preceded by the following HTTP <xref target="RFC9110"/> and <xref target="RFC9111"/> headers.</t>
      <artwork><![CDATA[
    Content-type: application/ocsp-response
    Content-length: < OCSP response length >
    Last-modified: < producedAt HTTP-date >
    ETag: "< strong validator >"
    Expires: < nextUpdate HTTP-date >
    Cache-control: max-age=< n >, public, no-transform, must-revalidate
    Date: < current HTTP-date >
]]></artwork>
      <t>See <xref target="http-proxies"/> for details on the use of these headers.</t>
    </section>
    <section anchor="cache-recs">
      <name>Caching Recommendations</name>
      <t>The ability to cache OCSP responses throughout the network is an
important factor in high volume OCSP deployments. This section
discusses the recommended caching behavior of OCSP clients and HTTP
proxies and the steps that should be taken to minimize the number of
times that OCSP clients "hit the wire". In addition, the concept of
including OCSP responses in protocol exchanges (aka stapling or
piggybacking), such as has been defined in TLS, is also discussed.</t>
      <section anchor="caching-at-the-client">
        <name>Caching at the Client</name>
        <t>To minimize bandwidth usage, clients <bcp14>MUST</bcp14> locally cache authoritative
OCSP responses (i.e., a response with a signature that has been
successfully validated and that indicate an OCSPResponseStatus of
'successful').</t>
        <t>Most OCSP clients will send OCSPRequests at or near the nextUpdate
time (when a cached response expires). To avoid large spikes in
responder load that might occur when many clients refresh cached
responses for a popular certificate, responders <bcp14>MAY</bcp14> indicate when the
client should fetch an updated OCSP response by using the cache-
control:max-age directive. Clients <bcp14>SHOULD</bcp14> fetch the updated OCSP
Response on or after the max-age time. To ensure that clients
receive an updated OCSP response, OCSP responders <bcp14>MUST</bcp14> refresh the
OCSP response before the max-age time.</t>
      </section>
      <section anchor="http-proxies">
        <name>HTTP Proxies</name>
        <t>The responder <bcp14>SHOULD</bcp14> set the HTTP headers of the OCSP response in
such a way as to allow for the intelligent use of intermediate HTTP
proxy servers. See <xref target="RFC9110"/> and <xref target="RFC9111"/> for the full definition
of these headers and the proper format of any date and time values.</t>
        <table anchor="http-headers">
          <name>HTTP Headers</name>
          <thead>
            <tr>
              <th align="left">HTTP Header</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Date</td>
              <td align="left">The date and time at which the OCSP server generated the HTTP response.</td>
            </tr>
            <tr>
              <td align="left">Last-Modified</td>
              <td align="left">This value specifies the date and time at which the OCSP responder last modified the response. This date and time will be the same as the thisUpdate timestamp in the request itself.</td>
            </tr>
            <tr>
              <td align="left">Expires</td>
              <td align="left">Specifies how long the response is considered fresh. This date and time will be the same as the nextUpdate timestamp in the OCSP response itself.</td>
            </tr>
            <tr>
              <td align="left">ETag</td>
              <td align="left">A string that identifies a particular version of the associated data. This profile RECOMMENDS that the ETag value be the ASCII HEX representation of the SHA-256 hash of the OCSPResponse structure.</td>
            </tr>
            <tr>
              <td align="left">Cache-Control</td>
              <td align="left">Contains a number of caching directives. <br/> * max-age = &lt; n &gt; -where n is a time value later than thisUpdate but earlier than nextUpdate. <br/> * public -makes normally uncachable response cachable by both shared and nonshared caches. <br/> * no-transform -specifies that a proxy cache cannot change the type, length, or encoding of the object content. <br/> * must-revalidate -prevents caches from intentionally returning stale responses.</td>
            </tr>
          </tbody>
        </table>
        <t>OCSP responders <bcp14>MUST NOT</bcp14> include a "Pragma: no-cache", "Cache-
Control: no-cache", or "Cache-Control: no-store" header in
authoritative OCSP responses.</t>
        <t>OCSP responders <bcp14>SHOULD</bcp14> include one or more of these headers in non-
authoritative OCSP responses.</t>
        <t>For example, assume that an OCSP response has the following timestamp
values:</t>
        <artwork><![CDATA[
    thisUpdate = March 19, 2023 01:00:00 GMT
    nextUpdate = March 21, 2023 01:00:00 GMT
    productedAt = March 19, 2023 01:00:00 GMT
]]></artwork>
        <t>and that an OCSP client requests the response on March 20, 2023 01:00:00
GMT. In this scenario, the HTTP response may look like this:</t>
        <artwork><![CDATA[
    Content-Type: application/ocsp-response
    Content-Length: 1000
    Date: Mon, 20 Mar 2023 01:00:00 GMT
    Last-Modified: Sun, 19 Mar 2023 01:00:00 GMT
    ETag: "97df3588b5a3f24babc3851b372f0ba71a9dcdded43b14b9d06961bfc1707d9d"
    Expires: Tue, 21 Mar 2023 01:00:00 GMT
    Cache-Control: max-age=86000,public,no-transform,must-revalidate
    <...>
]]></artwork>
        <t>OCSP clients <bcp14>MUST NOT</bcp14> include a no-cache header in OCSP request
messages, unless the client encounters an expired response which may
be a result of an intermediate proxy caching stale data. In this
situation, clients <bcp14>SHOULD</bcp14> resend the request specifying that proxies
should be bypassed by including an appropriate HTTP header in the
request (i.e., Pragma: no-cache or Cache-Control: no-cache).</t>
      </section>
      <section anchor="caching-at-servers">
        <name>Caching at Servers</name>
        <t>In some scenarios, it is advantageous to include OCSP response
information within the protocol being utilized between the client and
server. Including OCSP responses in this manner has a few attractive
effects.</t>
        <t>First, it allows for the caching of OCSP responses on the server,
thus lowering the number of hits to the OCSP responder.</t>
        <t>Second, it enables certificate validation in the event the client is
not connected to a network and thus eliminates the need for clients
to establish a new HTTP session with the responder.</t>
        <t>Third, it reduces the number of round trips the client needs to make
in order to complete a handshake.</t>
        <t>Fourth, it simplifies the client-side OCSP implementation by enabling
a situation where the client need only the ability to parse and
recognize OCSP responses.</t>
        <t>This functionality has been specified as an extension to the TLS
<xref target="I-D.ietf-tls-rfc8446bis"/> protocol in
<xref section="4.4.2" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>,
but can be applied to any client-server protocol.</t>
        <t>This profile RECOMMENDS that both TLS clients and servers implement
the certificate status request extension mechanism for TLS.</t>
        <t>Further information regarding caching issues can be obtained
from <xref target="RFC3143"/>.</t>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The following considerations apply in addition to the security
considerations addressed in <xref section="5" sectionFormat="of" target="RFC6960"/>.</t>
      <section anchor="replay-attacks">
        <name>Replay Attacks</name>
        <t>Because the use of nonces in this profile is optional, there is a
possibility that an out of date OCSP response could be replayed, thus
causing a client to accept a good response when in fact there is a
more up-to-date response that specifies the status of revoked. In
order to mitigate this attack, clients <bcp14>MUST</bcp14> have access to an
accurate source of time and ensure that the OCSP responses they
receive are sufficiently fresh.</t>
        <t>Clients that do not have an accurate source of date and time are
vulnerable to service disruption. For example, a client with a
sufficiently fast clock may reject a fresh OCSP response. Similarly
a client with a sufficiently slow clock may incorrectly accept
expired valid responses for certificates that may in fact be revoked.</t>
        <t>Future versions of the OCSP protocol may provide a way for the client
to know whether the server supports nonces or does not support
nonces. If a client can determine that the server supports nonces,
it <bcp14>MUST</bcp14> reject a reply that does not contain an expected nonce.
Otherwise, clients that opt to include a nonce in the request <bcp14>SHOULD
NOT</bcp14> reject a corresponding OCSPResponse solely on the basis of the
nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to validating the
OCSPResponse based on time.</t>
      </section>
      <section anchor="man-in-the-middle-attacks">
        <name>Man-in-the-Middle Attacks</name>
        <t>To mitigate risk associated with this class of attack, the client
must properly validate the signature on the response.</t>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of the OCSP responder and to verify that it is authorized to
sign responses on the CA's behalf.</t>
        <t>Clients <bcp14>MUST</bcp14> ensure that they are communicating with an authorized
responder by the rules described in <xref section="4.2.2.2" sectionFormat="of" target="RFC6960"/>.</t>
      </section>
      <section anchor="impersonation-attacks">
        <name>Impersonation Attacks</name>
        <t>The use of signed responses in OCSP serves to authenticate the
identity of OCSP responder.</t>
        <t>As detailed in <xref target="RFC6960"/>, clients must properly validate the signature
of the OCSP response and the signature on the OCSP response signer
certificate to ensure an authorized responder created it.</t>
      </section>
      <section anchor="denial-of-service-attacks">
        <name>Denial-of-Service Attacks</name>
        <t>OCSP responders should take measures to prevent or mitigate denial-
of-service attacks. As this profile specifies the use of unsigned
OCSPRequests, access to the responder may be implicitly given to
everyone who can send a request to a responder, and thus the ability
to mount a denial-of-service attack via a flood of requests may be
greater. For example, a responder could limit the rate of incoming
requests from a particular IP address if questionable behavior is
detected.</t>
      </section>
      <section anchor="modification-of-http-headers">
        <name>Modification of HTTP Headers</name>
        <t>Values included in HTTP headers, as described in <xref target="transport"/>
and <xref target="cache-recs"/>,
are not cryptographically protected; they may be manipulated by an
attacker. Clients <bcp14>SHOULD</bcp14> use these values for caching guidance only
and ultimately <bcp14>SHOULD</bcp14> rely only on the values present in the signed
OCSPResponse. Clients <bcp14>SHOULD NOT</bcp14> rely on cached responses beyond the
nextUpdate time.</t>
      </section>
      <section anchor="request-authentication-and-authorization">
        <name>Request Authentication and Authorization</name>
        <t>The suggested use of unsigned requests in this environment removes an
option that allows the responder to determine the authenticity of
incoming request. Thus, access to the responder may be implicitly
given to everyone who can send a request to a responder.
Environments where explicit authorization to access the OCSP
responder is necessary can utilize other mechanisms to authenticate
requestors or restrict or meter service.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5019">
          <front>
            <title>The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments</title>
            <author fullname="A. Deacon" initials="A." surname="Deacon"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This specification defines a profile of the Online Certificate Status Protocol (OCSP) that addresses the scalability issues inherent when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) environments and/or in PKI environments that require a lightweight solution to minimize communication bandwidth and client-side processing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5019"/>
          <seriesInfo name="DOI" value="10.17487/RFC5019"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="OCSPMP">
          <front>
            <title>OCSP Mobile Profile V1.0</title>
            <author>
              <organization>Open Mobile Alliance</organization>
            </author>
            <date/>
          </front>
          <seriesInfo name="www.openmobilealliance.org" value=""/>
        </reference>
        <reference anchor="RFC3143">
          <front>
            <title>Known HTTP Proxy/Caching Problems</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="J. Dilley" initials="J." surname="Dilley"/>
            <date month="June" year="2001"/>
            <abstract>
              <t>This document catalogs a number of known problems with World Wide Web (WWW) (caching) proxies and cache servers. The goal of the document is to provide a discussion of the problems and proposed workarounds, and ultimately to improve conditions by illustrating problems. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3143"/>
          <seriesInfo name="DOI" value="10.17487/RFC3143"/>
        </reference>
      </references>
    </references>
    <?line 637?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this version of the document wish to thank Alex Deacon
and Ryan Hurst for all of their work to produce the original version
of the OCSP protocol.</t>
      <t>The authors of this version of the document wish to thank
Russ Housley and Rob Stradling for the feedback and suggestions.</t>
      <t>The authors wish to thank Magnus Nystrom of RSA Security, Inc.,
Jagjeet Sondh of Vodafone Group R&amp;D, and David Engberg of CoreStreet,
Ltd. for their contributions to the original <xref target="RFC5019"/> specification.
Listed organizational affiliations reflect the author’s affiliation
at the time of RFC5019 was published.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
