<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-lamps-rfc5019bis-05" category="std" consensus="true" submissionType="IETF" obsoletes="5019" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Lightweight OCSP Profile Update">Updates to Lightweight OCSP Profile for High Volume Environments</title>

    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="Clint Wilson">
      <organization>Apple, Inc.</organization>
      <address>
        <email>clintw@apple.com</email>
      </address>
    </author>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="08"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 48?>

<t>RFC 5019 defines a lightweight profile for OCSP that makes the protocol
more suitable for use in high-volume environments. The lightweight
profile specifies the mandatory use of SHA-1 when calculating the values
of several fields in OCSP requests and responses. In recent years,
weaknesses have been demonstrated with the SHA-1 algorithm. As a result,
SHA-1 is increasingly falling out of use even for non-security relevant
use cases. This document obsoletes the lightweight profile as specified
in RFC 5019 to instead recommend the use of SHA-256 where SHA-1 was
previously required. An RFC 5019-compliant OCSP client is still able to
use SHA-1, but the use of SHA-1 may become obsolete in the future.</t>



    </abstract>



  </front>

  <middle>


<?line 61?>

<section anchor="introduction"><name>Introduction</name>

<t>The Online Certificate Status Protocol <xref target="RFC6960"/> specifies a mechanism
used to determine the status of digital certificates, in lieu of
using Certificate Revocation Lists (CRLs). Since its definition in
1999, it has been deployed in a variety of environments and has
proven to be a useful certificate status checking mechanism. (For
brevity we refer to OCSP as being used to verify certificate status,
but only the revocation status of a certificate is checked via this
protocol.)</t>

<t>To date, many OCSP deployments have been used to ensure timely and
secure certificate status information for high-value electronic
transactions or highly sensitive information, such as in the banking
and financial environments. As such, the requirement for an OCSP
responder to respond in "real time" (i.e., generating a new OCSP
response for each OCSP request) has been important. In addition,
these deployments have operated in environments where bandwidth usage
is not an issue, and have run on client and server systems where
processing power is not constrained.</t>

<t>As the use of PKI continues to grow and move into diverse
environments, so does the need for a scalable and cost-effective
certificate status mechanism. Although OCSP as currently defined and
deployed meets the need of small to medium-sized PKIs that operate on
powerful systems on wired networks, there is a limit as to how these
OCSP deployments scale from both an efficiency and cost perspective.
Mobile environments, where network bandwidth may be at a premium and
client-side devices are constrained from a processing point of view,
require the careful use of OCSP to minimize bandwidth usage and
client-side processing complexity. <xref target="OCSPMP"></xref></t>

<t>PKI continues to be deployed into environments where millions if not
hundreds of millions of certificates have been issued. In many of
these environments, an even larger number of users (also known as
relying parties) have the need to ensure that the certificate they
are relying upon has not been revoked. As such, it is important that
OCSP is used in such a way that ensures the load on OCSP responders
and the network infrastructure required to host those responders are
kept to a minimum.</t>

<t>This document addresses the scalability issues inherent when using
OCSP in PKI environments described above by defining a message
profile and clarifying OCSP client and responder behavior that will
permit:</t>

<t><list style="numbers">
  <t>OCSP response pre-production and distribution.</t>
  <t>Reduced OCSP message size to lower bandwidth usage.</t>
  <t>Response message caching both in the network and on the client.</t>
</list></t>

<t>It is intended that the normative requirements defined in this
profile will be adopted by OCSP clients and OCSP responders operating
in very large-scale (high-volume) PKI environments or PKI
environments that require a lightweight solution to minimize
bandwidth and client-side processing power (or both), as described
above.</t>

<t>OCSP does not have the means to signal responder capabilities within the
protocol. Thus, clients will need to use out-of-band mechanisms to
determine whether a responder conforms to the profile defined in this
document. Regardless of the availability of such out-of-band mechanisms,
this profile ensures that interoperability will still occur between an
OCSP client that fully conforms with <xref target="RFC6960"/> and a responder that is
operating in a mode as described in this specification.</t>

<t>Substantive changes to RFC 5019:</t>

<t><list style="symbols">
  <t><xref target="certid"/> requires new OCSP clients to use SHA-256 to
support migration for OCSP clients.</t>
  <t><xref target="byKey"/> requires new OCSP responders to use the byKey field,
and support migration from byName fields.</t>
  <t><xref target="transport"/> clarifies OCSP clients not include
whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string.</t>
</list></t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="ocsp-message-profile"><name>OCSP Message Profile</name>

<t>This section defines a subset of OCSPRequest and OCSPResponse
functionality as defined in <xref target="RFC6960"/>.</t>

<section anchor="req-profile"><name>OCSP Request Profile</name>

<section anchor="certid"><name>OCSPRequest Structure</name>

<t>The ASN.1 structure corresponding to the OCSPRequest
with the relevant CertID is:</t>

<figure><artwork><![CDATA[
OCSPRequest     ::=     SEQUENCE {
   tbsRequest                  TBSRequest,
   optionalSignature   [0]     EXPLICIT Signature OPTIONAL }

TBSRequest      ::=     SEQUENCE {
   version             [0]     EXPLICIT Version DEFAULT v1,
   requestorName       [1]     EXPLICIT GeneralName OPTIONAL,
   requestList                 SEQUENCE OF Request,
   requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }

Request         ::=     SEQUENCE {
   reqCert                     CertID,
   singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }

CertID          ::=     SEQUENCE {
   hashAlgorithm       AlgorithmIdentifier,
   issuerNameHash      OCTET STRING, -- Hash of issuer's DN
   issuerKeyHash       OCTET STRING, -- Hash of issuer's public key
   serialNumber        CertificateSerialNumber }
]]></artwork></figure>

<t>OCSPRequests that conform to this profile <bcp14>MUST</bcp14> include only one Request
in the OCSPRequest.RequestList structure.</t>

<t>The CertID.issuerNameHash and CertID.issuerKeyHash fields contain hashes
of the issuer's DN and public key, respectively. OCSP clients that
conform with this profile <bcp14>MUST</bcp14> use SHA-256 as defined in <xref target="RFC6234"/> as
the hashing algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values.</t>

<t>Older OCSP clients which provide backward compatibility with
<xref target="RFC5019"/> use SHA-1 as defined in <xref target="RFC3174"/> as the hashing
algorithm for the CertID.issuerNameHash and the
CertID.issuerKeyHash values. However, these OCSP clients should
transition from SHA-1 to SHA-256 as soon as practical.</t>

<t>Clients <bcp14>MUST NOT</bcp14> include the singleRequestExtensions structure.</t>

<t>Clients <bcp14>SHOULD NOT</bcp14> include the requestExtensions structure. If a
requestExtensions structure is included, this profile RECOMMENDS that
it contain only the nonce extension (id-pkix-ocsp-nonce). See
<xref target="fresh"/> for issues concerning the use of a nonce in high-volume
OCSP environments.</t>

</section>
<section anchor="signed-ocsprequests"><name>Signed OCSPRequests</name>

<t>Clients <bcp14>SHOULD NOT</bcp14> send signed OCSPRequests. Responders <bcp14>MAY</bcp14> ignore
the signature on OCSPRequests.</t>

<t>If the OCSPRequest is signed, the client <bcp14>SHALL</bcp14> specify its name in
the OCSPRequest.requestorName field; otherwise, clients <bcp14>SHOULD NOT</bcp14>
include the requestorName field in the OCSPRequest. OCSP servers
<bcp14>MUST</bcp14> be prepared to receive unsigned OCSP requests that contain the
requestorName field, but <bcp14>MUST</bcp14> handle such requests as if the
requestorName field were absent.</t>

</section>
</section>
<section anchor="ocsp-response-profile"><name>OCSP Response Profile</name>

<section anchor="ocspresponse-structure"><name>OCSPResponse Structure</name>
<t>The ASN.1 structure corresponding to the OCSPResponse
with the relevant CertID is:</t>

<figure><artwork><![CDATA[
OCSPResponse ::= SEQUENCE {
   responseStatus         OCSPResponseStatus,
   responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }

ResponseBytes ::=       SEQUENCE {
   responseType   OBJECT IDENTIFIER,
   response       OCTET STRING }

The value for response SHALL be the DER encoding of BasicOCSPResponse.

BasicOCSPResponse       ::= SEQUENCE {
   tbsResponseData      ResponseData,
   signatureAlgorithm   AlgorithmIdentifier,
   signature            BIT STRING,
   certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }

ResponseData ::= SEQUENCE {
   version              [0] EXPLICIT Version DEFAULT v1,
   responderID              ResponderID,
   producedAt               GeneralizedTime,
   responses                SEQUENCE OF SingleResponse,
   responseExtensions   [1] EXPLICIT Extensions OPTIONAL }

SingleResponse ::= SEQUENCE {
   certID                       CertID,
   certStatus                   CertStatus,
   thisUpdate                   GeneralizedTime,
   nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,
   singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }
]]></artwork></figure>

<t>Responders <bcp14>MUST</bcp14> generate a BasicOCSPResponse as identified by the
id-pkix-ocsp-basic OID. Clients <bcp14>MUST</bcp14> be able to parse and accept a
BasicOCSPResponse. OCSPResponses that conform to this profile <bcp14>SHOULD</bcp14>
include only one SingleResponse in the
ResponseData.responses structure, but <bcp14>MAY</bcp14> include
additional SingleResponse elements if necessary to improve response
pre-generation performance or cache efficiency, and
to ensure backward compatibility. For instance,
to provide support to OCSP clients which do not yet support the
use of SHA-256 for CertID hash calculation, the OCSP responder
<bcp14>MAY</bcp14> include two SingleResponses in a BasicOCSPResponse.
In that BasicOCSPResponse, the CertID of one of the SingleResponses
uses SHA-1 for the hash calculation, and the CertID in the other
SingleResponse uses SHA-256. OCSP responders <bcp14>SHOULD NOT</bcp14> distribute
OCSP responses that contain CertIDs that use SHA-1 if the OCSP
responder has no clients that require the use of SHA-1.
Operators of OCSP responders may consider logging the hash
algorithm used by OCSP clients to inform their determination of
when it is appropriate to obsolete the distribution of OCSP responses
that employ SHA-1 for CertID field hashes.</t>

<t>The responder <bcp14>SHOULD NOT</bcp14> include responseExtensions. As specified in
<xref target="RFC6960"/>, clients <bcp14>MUST</bcp14> ignore unrecognized non-critical
responseExtensions in the response.</t>

<t>In the case where a responder does not have the ability to respond to
an OCSP request containing an option not supported by the server, it
<bcp14>SHOULD</bcp14> return the most complete response it can. For example, in the
case where a responder only supports pre-produced responses and does
not have the ability to respond to an OCSP request containing a
nonce, it <bcp14>SHOULD</bcp14> return a response that does not include a nonce.</t>

<t>Clients <bcp14>SHOULD</bcp14> attempt to process a response even if the response
does not include a nonce. See <xref target="fresh"/> for details on validating
responses that do not contain a nonce. See also <xref target="sec-cons"/> for
relevant security considerations.</t>

<t>Responders that do not have the ability to respond to OCSP requests
that contain an unsupported option such as a nonce <bcp14>MAY</bcp14> forward the
request to an OCSP responder capable of doing so.</t>

<t>The responder <bcp14>MAY</bcp14> include the singleResponse.singleResponse
extensions structure.</t>

</section>
<section anchor="byKey"><name>Signed OCSPResponses</name>

<t>Clients <bcp14>MUST</bcp14> validate the signature on the returned OCSPResponse.</t>

<t>If the response is signed by a delegate of the issuing certification
authority (CA), a valid responder certificate <bcp14>MUST</bcp14> be referenced in
the BasicOCSPResponse.certs structure.</t>

<t>It is <bcp14>RECOMMENDED</bcp14> that the OCSP responder's certificate contain the
id-pkix-ocsp-nocheck extension, as defined in <xref target="RFC6960"/>, to indicate
to the client that it need not check the certificate's status. In
addition, it is <bcp14>RECOMMENDED</bcp14> that neither an OCSP authorityInfoAccess
(AIA) extension nor cRLDistributionPoints (CRLDP) extension be
included in the OCSP responder's certificate. Accordingly, the
responder's signing certificate <bcp14>SHOULD</bcp14> be relatively short-lived and
renewed regularly.</t>

<t>Clients <bcp14>MUST</bcp14> be able to identify OCSP responder certificates using
the byKey field and <bcp14>SHOULD</bcp14> be able to identify OCSP responder
certificates using the byName field of the ResponseData.ResponderID
choices.</t>

<t>Older responders which provide backward compatibility with <xref target="RFC5019"/>
<bcp14>MAY</bcp14> use the byName field to represent the ResponderID, but should
transition to using the byKey field as soon as practical.</t>

<t>Newer responders that conform to this profile <bcp14>MUST</bcp14> use the byKey
field to represent the ResponderID to reduce the size of the response.</t>

</section>
<section anchor="ocspresponsestatus-values"><name>OCSPResponseStatus Values</name>

<t>As long as the OCSP infrastructure has authoritative records for a
particular certificate, an OCSPResponseStatus of "successful" will be
returned. When access to authoritative records for a particular
certificate is not available, the responder <bcp14>MUST</bcp14> return an
OCSPResponseStatus of "unauthorized". As such, this profile extends
the <xref target="RFC6960"/> definition of "unauthorized" as follows:</t>

<t>The response "unauthorized" is returned in cases where the client
is not authorized to make this query to this server or the server
is not capable of responding authoritatively.</t>

<t>For example, OCSP responders that do not have access to authoritative
records for a requested certificate, such as those that generate and
distribute OCSP responses in advance and thus do not have the ability
to properly respond with a signed "successful" yet "unknown"
response, will respond with an OCSPResponseStatus of "unauthorized".
Also, in order to ensure the database of revocation information does
not grow unbounded over time, the responder <bcp14>MAY</bcp14> remove the status
records of expired certificates. Requests from clients for
certificates whose record has been removed will result in an
OCSPResponseStatus of "unauthorized".</t>

<t>Security considerations regarding the use of unsigned responses are
discussed in <xref target="RFC6960"/>.</t>

</section>
<section anchor="times"><name>thisUpdate, nextUpdate, and producedAt</name>

<t>When pre-producing OCSPResponse messages, the responder <bcp14>MUST</bcp14> set the
thisUpdate, nextUpdate, and producedAt times as follows:</t>

<dl>
  <dt>thisUpdate:</dt>
  <dd>
    <t>The time at which the status being indicated is known to be correct.</t>
  </dd>
  <dt>nextUpdate:</dt>
  <dd>
    <t>The time at or before which newer information will be available
about the status of the certificate. Responders <bcp14>MUST</bcp14> always include
this value to aid in response caching. See <xref target="cache-recs"/> for additional
information on caching.</t>
  </dd>
  <dt>producedAt:</dt>
  <dd>
    <t>The time at which the OCSP response was signed.</t>
  </dd>
</dl>

<aside>  <t>Note: In many cases the value of thisUpdate and producedAt will be
  the same.</t>
</aside>

<t>For the purposes of this profile, ASN.1-encoded GeneralizedTime
values such as thisUpdate, nextUpdate, and producedAt <bcp14>MUST</bcp14> be
expressed Greenwich Mean Time (Zulu) and <bcp14>MUST</bcp14> include seconds (i.e.,
times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values <bcp14>MUST NOT</bcp14> include fractional seconds.</t>

</section>
</section>
</section>
<section anchor="client-behavior"><name>Client Behavior</name>

<section anchor="ocsp-responder-discovery"><name>OCSP Responder Discovery</name>

<t>Clients <bcp14>MUST</bcp14> support the authorityInfoAccess extension as defined in
<xref target="RFC5280"/> and <bcp14>MUST</bcp14> recognize the id-ad-ocsp access method. This
enables CAs to inform clients how they can contact the OCSP service.</t>

<t>In the case where a client is checking the status of a certificate
that contains both an authorityInformationAccess (AIA) extension
pointing to an OCSP responder and a cRLDistributionPoints extension
pointing to a CRL, the client <bcp14>SHOULD</bcp14> attempt to contact the OCSP
responder first. Clients <bcp14>MAY</bcp14> attempt to retrieve the CRL if no
OCSPResponse is received from the responder after a locally
configured timeout and number of retries.</t>

</section>
<section anchor="sending-an-ocsp-request"><name>Sending an OCSP Request</name>

<t>To avoid needless network traffic, applications <bcp14>MUST</bcp14> verify the
signature of signed data before asking an OCSP client to check the
status of certificates used to verify the data. If the signature is
invalid or the application is not able to verify it, an OCSP check
<bcp14>MUST NOT</bcp14> be requested.</t>

<t>Similarly, an application <bcp14>MUST</bcp14> validate the signature on certificates
in a chain, before asking an OCSP client to check the status of the
certificate. If the certificate signature is invalid or the
application is not able to verify it, an OCSP check <bcp14>MUST NOT</bcp14> be
requested. Clients <bcp14>SHOULD NOT</bcp14> make a request to check the status of
expired certificates.</t>

</section>
</section>
<section anchor="fresh"><name>Ensuring an OCSPResponse Is Fresh</name>

<t>In order to ensure that a client does not accept an out-of-date
response that indicates a 'good' status when in fact there is a more
up-to-date response that specifies the status of 'revoked', a client
must ensure the responses they receive are fresh.</t>

<t>In general, two mechanisms are available to clients to ensure a
response is fresh. The first uses nonces, and the second is based on
time. In order for time-based mechanisms to work, both clients and
responders <bcp14>MUST</bcp14> have access to an accurate source of time.</t>

<t>Because this profile specifies that clients <bcp14>SHOULD NOT</bcp14> include a
requestExtensions structure in OCSPRequests (see <xref target="req-profile"/>),
clients <bcp14>MUST</bcp14> be able to determine OCSPResponse freshness based on an
accurate source of time. Clients that opt to include a nonce in the
request <bcp14>SHOULD NOT</bcp14> reject a corresponding OCSPResponse solely on the
basis of the nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to
validating the OCSPResponse based on time.</t>

<t>Clients that do not include a nonce in the request <bcp14>MUST</bcp14> ignore any
nonce that may be present in the response.</t>

<t>Clients <bcp14>MUST</bcp14> check for the existence of the nextUpdate field and <bcp14>MUST</bcp14>
ensure the current time, expressed in GMT time as described in
<xref target="times"/>, falls between the thisUpdate and nextUpdate times. If
the nextUpdate field is absent, the client <bcp14>MUST</bcp14> reject the response.</t>

<t>If the nextUpdate field is present, the client <bcp14>MUST</bcp14> ensure that it is
not earlier than the current time. If the current time on the client
is later than the time specified in the nextUpdate field, the client
<bcp14>MUST</bcp14> reject the response as stale. Clients <bcp14>MAY</bcp14> allow configuration
of a small tolerance period for acceptance of responses after
nextUpdate to handle minor clock differences relative to responders
and caches. This tolerance period should be chosen based on the
accuracy and precision of time synchronization technology available
to the calling application environment. For example, Internet peers
with low latency connections typically expect NTP time
synchronization to keep them accurate within parts of a second;
higher latency environments or where an NTP analogue is not available
may have to be more liberal in their tolerance
(e.g. allow one day difference).</t>

<t>See the security considerations in <xref target="sec-cons"/> for additional details
on replay and man-in-the-middle attacks.</t>

</section>
<section anchor="transport"><name>Transport Profile</name>

<t>OCSP clients can send HTTP-based OCSP requests using either the GET
or POST method.
The OCSP responder <bcp14>MUST</bcp14> support requests and responses over HTTP.
When sending requests that are less than or equal to 255 bytes in
total (after encoding) including the scheme and delimiters (http://),
server name and base64-encoded OCSPRequest structure, clients <bcp14>MUST</bcp14>
use the GET method (to enable OCSP response caching). OCSP requests
larger than 255 bytes <bcp14>SHOULD</bcp14> be submitted using the POST method. In
all cases, clients <bcp14>MUST</bcp14> follow the descriptions in A.1 of <xref target="RFC6960"/>
when constructing these messages.</t>

<t>When constructing a GET message, OCSP clients <bcp14>MUST</bcp14> base64-encode the
OCSPRequest structure according to <xref target="RFC4648"/>, section 4. Clients
<bcp14>MUST NOT</bcp14> include whitespace or any other characters that are not part of
the base64 character repertoire in the base64-encoded string. Clients
<bcp14>MUST</bcp14> properly URL-encode the base64-encoded OCSPRequest according to
<xref target="RFC3986"/>. OCSP clients <bcp14>MUST</bcp14> append the base64-encoded OCSPRequest
to the URI specified in the AIA extension <xref target="RFC5280"/>. For example:</t>

<figure><artwork><![CDATA[
   http://ocsp.example.com/MEowSDBGMEQwQjAKBggqhkiG9w0CBQQQ7sp6GTKpL2dA
   deGaW267owQQqInESWQD0mGeBArSgv%2FBWQIQLJx%2Fg9xF8oySYzol80Mbpg%3D%3D
]]></artwork></figure>

<t>In response to properly formatted OCSPRequests that are cachable
(i.e., responses that contain a nextUpdate value), the responder will
include the binary value of the DER encoding of the OCSPResponse
preceded by the following HTTP <xref target="RFC9110"/> and <xref target="RFC9111"/> headers.</t>

<figure><artwork><![CDATA[
   Content-type: application/ocsp-response
   Content-length: < OCSP response length >
   Last-modified: < producedAt HTTP-date >
   ETag: "< strong validator >"
   Expires: < nextUpdate HTTP-date >
   Cache-control: max-age=< n >, public, no-transform, must-revalidate
   Date: < current HTTP-date >
]]></artwork></figure>

<t>See <xref target="http-proxies"/> for details on the use of these headers.</t>

</section>
<section anchor="cache-recs"><name>Caching Recommendations</name>

<t>The ability to cache OCSP responses throughout the network is an
important factor in high volume OCSP deployments. This section
discusses the recommended caching behavior of OCSP clients and HTTP
proxies and the steps that should be taken to minimize the number of
times that OCSP clients "hit the wire". In addition, the concept of
including OCSP responses in protocol exchanges (aka stapling or
piggybacking), such as has been defined in TLS, is also discussed.</t>

<section anchor="caching-at-the-client"><name>Caching at the Client</name>

<t>To minimize bandwidth usage, clients <bcp14>MUST</bcp14> locally cache authoritative
OCSP responses (i.e., a response with a signature that has been
successfully validated and that indicate an OCSPResponseStatus of
'successful').</t>

<t>Most OCSP clients will send OCSPRequests at or near the nextUpdate
time (when a cached response expires). To avoid large spikes in
responder load that might occur when many clients refresh cached
responses for a popular certificate, responders <bcp14>MAY</bcp14> indicate when the
client should fetch an updated OCSP response by using the cache-
control:max-age directive. Clients <bcp14>SHOULD</bcp14> fetch the updated OCSP
Response on or after the max-age time. To ensure that clients
receive an updated OCSP response, OCSP responders <bcp14>MUST</bcp14> refresh the
OCSP response before the max-age time.</t>

</section>
<section anchor="http-proxies"><name>HTTP Proxies</name>

<t>The responder <bcp14>SHOULD</bcp14> set the HTTP headers of the OCSP response in
such a way as to allow for the intelligent use of intermediate HTTP
proxy servers. See <xref target="RFC9110"/> and <xref target="RFC9111"/> for the full definition
of these headers and the proper format of any date and time values.</t>

<texttable title="HTTP Headers" anchor="http-headers">
      <ttcol align='left'>HTTP Header</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Date</c>
      <c>The date and time at which the OCSP server generated the HTTP response.</c>
      <c>Last-Modified</c>
      <c>This value specifies the date and time at which the OCSP responder last modified the response. This date and time will be the same as the thisUpdate timestamp in the request itself.</c>
      <c>Expires</c>
      <c>Specifies how long the response is considered fresh. This date and time will be the same as the nextUpdate timestamp in the OCSP response itself.</c>
      <c>ETag</c>
      <c>A string that identifies a particular version of the associated data. This profile RECOMMENDS that the ETag value be the ASCII HEX representation of the SHA-256 hash of the OCSPResponse structure.</c>
      <c>Cache-Control</c>
      <c>Contains a number of caching directives. <br /> * max-age = &lt; n &gt; -where n is a time value later than thisUpdate but earlier than nextUpdate. <br /> * public -makes normally uncachable response cachable by both shared and nonshared caches. <br /> * no-transform -specifies that a proxy cache cannot change the type, length, or encoding of the object content. <br /> * must-revalidate -prevents caches from intentionally returning stale responses.</c>
</texttable>

<t>OCSP responders <bcp14>MUST NOT</bcp14> include a "Pragma: no-cache", "Cache-
Control: no-cache", or "Cache-Control: no-store" header in
authoritative OCSP responses.</t>

<t>OCSP responders <bcp14>SHOULD</bcp14> include one or more of these headers in non-
authoritative OCSP responses.</t>

<t>For example, assume that an OCSP response has the following timestamp
values:</t>

<figure><artwork><![CDATA[
   thisUpdate = March 19, 2023 01:00:00 GMT
   nextUpdate = March 21, 2023 01:00:00 GMT
   productedAt = March 19, 2023 01:00:00 GMT
]]></artwork></figure>

<t>and that an OCSP client requests the response on March 20, 2023 01:00:00
GMT. In this scenario, the HTTP response may look like this:</t>

<figure><artwork><![CDATA[
   Content-Type: application/ocsp-response
   Content-Length: 1000
   Date: Mon, 20 Mar 2023 01:00:00 GMT
   Last-Modified: Sun, 19 Mar 2023 01:00:00 GMT
   ETag: "97df3588b5a3f24babc3851b372f0ba7
         1a9dcdded43b14b9d06961bfc1707d9d"
   Expires: Tue, 21 Mar 2023 01:00:00 GMT
   Cache-Control: max-age=86000,public,no-transform,must-revalidate
   <...>
]]></artwork></figure>

<t>OCSP clients <bcp14>MUST NOT</bcp14> include a no-cache header in OCSP request
messages, unless the client encounters an expired response which may
be a result of an intermediate proxy caching stale data. In this
situation, clients <bcp14>SHOULD</bcp14> resend the request specifying that proxies
should be bypassed by including an appropriate HTTP header in the
request (i.e., Pragma: no-cache or Cache-Control: no-cache).</t>

</section>
<section anchor="caching-at-servers"><name>Caching at Servers</name>

<t>In some scenarios, it is advantageous to include OCSP response
information within the protocol being utilized between the client and
server. Including OCSP responses in this manner has a few attractive
effects.</t>

<t>First, it allows for the caching of OCSP responses on the server,
thus lowering the number of hits to the OCSP responder.</t>

<t>Second, it enables certificate validation in the event the client is
not connected to a network and thus eliminates the need for clients
to establish a new HTTP session with the responder.</t>

<t>Third, it reduces the number of round trips the client needs to make
in order to complete a handshake.</t>

<t>Fourth, it simplifies the client-side OCSP implementation by enabling
a situation where the client need only the ability to parse and
recognize OCSP responses.</t>

<t>This functionality has been specified as an extension to the TLS
<xref target="I-D.ietf-tls-rfc8446bis"/> protocol in
<xref section="4.4.2" sectionFormat="of" target="I-D.ietf-tls-rfc8446bis"/>,
but can be applied to any client-server protocol.</t>

<t>This profile RECOMMENDS that both TLS clients and servers implement
the certificate status request extension mechanism for TLS.</t>

<t>Further information regarding caching issues can be obtained
from <xref target="RFC3143"/>.</t>

</section>
</section>
<section anchor="sec-cons"><name>Security Considerations</name>

<t>The following considerations apply in addition to the security
considerations addressed in <xref section="5" sectionFormat="of" target="RFC6960"/>.</t>

<section anchor="replay-attacks"><name>Replay Attacks</name>

<t>Because the use of nonces in this profile is optional, there is a
possibility that an out of date OCSP response could be replayed, thus
causing a client to accept a good response when in fact there is a
more up-to-date response that specifies the status of revoked. In
order to mitigate this attack, clients <bcp14>MUST</bcp14> have access to an
accurate source of time and ensure that the OCSP responses they
receive are sufficiently fresh.</t>

<t>Clients that do not have an accurate source of date and time are
vulnerable to service disruption. For example, a client with a
sufficiently fast clock may reject a fresh OCSP response. Similarly
a client with a sufficiently slow clock may incorrectly accept
expired valid responses for certificates that may in fact be revoked.</t>

<t>Future versions of the OCSP protocol may provide a way for the client
to know whether the server supports nonces or does not support
nonces. If a client can determine that the server supports nonces,
it <bcp14>MUST</bcp14> reject a reply that does not contain an expected nonce.
Otherwise, clients that opt to include a nonce in the request <bcp14>SHOULD
NOT</bcp14> reject a corresponding OCSPResponse solely on the basis of the
nonexistent expected nonce, but <bcp14>MUST</bcp14> fall back to validating the
OCSPResponse based on time.</t>

</section>
<section anchor="man-in-the-middle-attacks"><name>Man-in-the-Middle Attacks</name>

<t>To mitigate risk associated with this class of attack, the client
must properly validate the signature on the response.</t>

<t>The use of signed responses in OCSP serves to authenticate the
identity of the OCSP responder and to verify that it is authorized to
sign responses on the CA's behalf.</t>

<t>Clients <bcp14>MUST</bcp14> ensure that they are communicating with an authorized
responder by the rules described in <xref section="4.2.2.2" sectionFormat="of" target="RFC6960"/>.</t>

</section>
<section anchor="impersonation-attacks"><name>Impersonation Attacks</name>

<t>The use of signed responses in OCSP serves to authenticate the
identity of OCSP responder.</t>

<t>As detailed in <xref target="RFC6960"/>, clients must properly validate the signature
of the OCSP response and the signature on the OCSP response signer
certificate to ensure an authorized responder created it.</t>

</section>
<section anchor="denial-of-service-attacks"><name>Denial-of-Service Attacks</name>

<t>OCSP responders should take measures to prevent or mitigate denial-
of-service attacks. As this profile specifies the use of unsigned
OCSPRequests, access to the responder may be implicitly given to
everyone who can send a request to a responder, and thus the ability
to mount a denial-of-service attack via a flood of requests may be
greater. For example, a responder could limit the rate of incoming
requests from a particular IP address if questionable behavior is
detected.</t>

</section>
<section anchor="modification-of-http-headers"><name>Modification of HTTP Headers</name>

<t>Values included in HTTP headers, as described in <xref target="transport"/>
and <xref target="cache-recs"/>,
are not cryptographically protected; they may be manipulated by an
attacker. Clients <bcp14>SHOULD</bcp14> use these values for caching guidance only
and ultimately <bcp14>SHOULD</bcp14> rely only on the values present in the signed
OCSPResponse. Clients <bcp14>SHOULD NOT</bcp14> rely on cached responses beyond the
nextUpdate time.</t>

</section>
<section anchor="request-authentication-and-authorization"><name>Request Authentication and Authorization</name>

<t>The suggested use of unsigned requests in this environment removes an
option that allows the responder to determine the authenticity of
incoming request. Thus, access to the responder may be implicitly
given to everyone who can send a request to a responder.
Environments where explicit authorization to access the OCSP
responder is necessary can utilize other mechanisms to authenticate
requestors or restrict or meter service.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC6960">
  <front>
    <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <author fullname="R. Ankney" initials="R." surname="Ankney"/>
    <author fullname="A. Malpani" initials="A." surname="Malpani"/>
    <author fullname="S. Galperin" initials="S." surname="Galperin"/>
    <author fullname="C. Adams" initials="C." surname="Adams"/>
    <date month="June" year="2013"/>
    <abstract>
      <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6960"/>
  <seriesInfo name="DOI" value="10.17487/RFC6960"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC6234">
  <front>
    <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <date month="May" year="2011"/>
    <abstract>
      <t>Federal Information Processing Standard, FIPS</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6234"/>
  <seriesInfo name="DOI" value="10.17487/RFC6234"/>
</reference>

<reference anchor="RFC5019">
  <front>
    <title>The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments</title>
    <author fullname="A. Deacon" initials="A." surname="Deacon"/>
    <author fullname="R. Hurst" initials="R." surname="Hurst"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This specification defines a profile of the Online Certificate Status Protocol (OCSP) that addresses the scalability issues inherent when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) environments and/or in PKI environments that require a lightweight solution to minimize communication bandwidth and client-side processing. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5019"/>
  <seriesInfo name="DOI" value="10.17487/RFC5019"/>
</reference>

<reference anchor="RFC3174">
  <front>
    <title>US Secure Hash Algorithm 1 (SHA1)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="P. Jones" initials="P." surname="Jones"/>
    <date month="September" year="2001"/>
    <abstract>
      <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3174"/>
  <seriesInfo name="DOI" value="10.17487/RFC3174"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC4648">
  <front>
    <title>The Base16, Base32, and Base64 Data Encodings</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <date month="October" year="2006"/>
    <abstract>
      <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4648"/>
  <seriesInfo name="DOI" value="10.17487/RFC4648"/>
</reference>

<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>

<reference anchor="RFC9110">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>

<reference anchor="RFC9111">
  <front>
    <title>HTTP Caching</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
      <t>This document obsoletes RFC 7234.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="98"/>
  <seriesInfo name="RFC" value="9111"/>
  <seriesInfo name="DOI" value="10.17487/RFC9111"/>
</reference>


<reference anchor="I-D.ietf-tls-rfc8446bis">
   <front>
      <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Windy Hill Systems, LLC</organization>
      </author>
      <date day="3" month="March" year="2024"/>
      <abstract>
	 <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
   
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="OCSPMP" >
  <front>
    <title>OCSP Mobile Profile V1.0</title>
    <author >
      <organization>Open Mobile Alliance</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="www.openmobilealliance.org" value=""/>
</reference>


<reference anchor="RFC3143">
  <front>
    <title>Known HTTP Proxy/Caching Problems</title>
    <author fullname="I. Cooper" initials="I." surname="Cooper"/>
    <author fullname="J. Dilley" initials="J." surname="Dilley"/>
    <date month="June" year="2001"/>
    <abstract>
      <t>This document catalogs a number of known problems with World Wide Web (WWW) (caching) proxies and cache servers. The goal of the document is to provide a discussion of the problems and proposed workarounds, and ultimately to improve conditions by illustrating problems. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3143"/>
  <seriesInfo name="DOI" value="10.17487/RFC3143"/>
</reference>




    </references>


<?line 719?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors of this version of the document wish to thank Alex Deacon
and Ryan Hurst for their work to produce the original version
of the lightweight profile for the OCSP protocol.</t>

<t>The authors of this version of the document wish to thank
Russ Housley, Rob Stradling, Roman Danyliw, and Wendy Brown for the
feedback and suggestions.</t>

<t>The authors wish to thank Magnus Nystrom of RSA Security, Inc.,
Jagjeet Sondh of Vodafone Group R&amp;D, and David Engberg of CoreStreet,
Ltd. for their contributions to the original <xref target="RFC5019"/> specification.
Listed organizational affiliations reflect the author’s affiliation
at the time of RFC5019 was published.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

