<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-norevavail-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="NoRevAvail for Short-lived Certificates">No Revocation Available for Short-lived X.509 Public Key Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-norevavail-00"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization abbrev="DigiCert">DigiCert, Inc.</organization>
      <address>
        <postal>
          <city>Fairfax, VA</city>
          <country>US</country>
        </postal>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Mandel" fullname="Joseph Mandel">
      <organization abbrev="SecureG">SecureG Inc.</organization>
      <address>
        <postal>
          <city>Tacoma, WA</city>
          <country>USA</country>
        </postal>
        <email>joe.mandel@secureg.io</email>
      </address>
    </author>
    <date year="2024" month="January" day="03"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 135?>

<t>Short-lived X.509v3 public key certificates as profiled in RFC 5280 are
seeing greater use in the Internet. The Certification Authority (CA) that
issues these short-lived certificates do not publish revocation information
because the certificate lifespan that is shorter than the time needed to
detect, report, and distribute revocation information. Some long-lived
X.509v3 public key certificates never expire, and they are never revoked.
This specification defines the noRevAvail certificate extension so that a
relying party can readily determine that the CA does not publish revocation
information for the certificate.</t>
    </abstract>
  </front>
  <middle>
    <?line 147?>

<section anchor="intro">
      <name>Introduction</name>
      <t>X.509v3 public key certificates <xref target="RFC5280"/> with short validity periods are
seeing greater use in the Internet.  For example, Automatic Certificate
Management Environment (ACME) <xref target="RFC8555"/> provides a straightforward way
to obtain short-lived certificates.  In many cases, no revocation
information is made available for short-lived certificates by the
Certification Authority (CA).  This is because short-lived certificates
have a validity period that is shorter than the time needed to detect, report,
and distribute revocation information.  As a result, revoking short-lived
certificates is unnecessary and pointless.</t>
      <t>Some long-lived X.509v3 public key certificates never expire, and they are
never revoked. For example, a factory might include an IDevID certificate <xref target="IEEE802.1AR"/>
to bind the factory-assigned device identity to a factory-installed public key. This
identity might include the manufacturer, model, and serial number of the device,
which never change.  To indicate that a certificate has no well-defined expiration
date, the notAfter date in the certificate validity period is set to
"99991231235959Z" <xref target="RFC5280"/>.</t>
      <t>This specification defines the noRevAvail certificate extension so that a
relying party can readily determine that the CA does not publish revocation
information for the certificate.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="asn1">
        <name>ASN.1</name>
        <t>X.509 certificates are generated using ASN.1 <xref target="X.680"/>, using the Basic
Encoding Rules (BER) and the Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
      </section>
      <section anchor="history">
        <name>History</name>
        <t>In 1988, CCITT defined the X.509v1 certificate <xref target="X.509-1988"/>.</t>
        <t>In 1997, ITU-T defined the X.509v3 certificate and the attribute
certificate <xref target="X.509-1997"/>.</t>
        <t>In 1999, the IETF first profiled the X.509v3 certificate for use in the
Internet <xref target="RFC2459"/>.</t>
        <t>In 2000, ITU-T defined the noRevAvail certificate extension for use with
attribute certificates <xref target="X.509-2000"/>.</t>
        <t>In 2002, the IETF first profiled the attribute certificate for use in the
Internet <xref target="RFC3281"/>, and this profile included support for the
noRevAvail certificate extension.</t>
        <t>In 2019, ITU-T published an update to ITU-T Recommendation X.509
<xref target="X.509-2019"/>.</t>
        <t>With greater use of short-lived certificates in the Internet, the recent
Technical Corrigendum to ITU-T Recommendation X.509 <xref target="X.509-2019-TC2"/> allows
the noRevAvail certificate extension to be used with public key certificates
as well as attribute certificates.</t>
      </section>
    </section>
    <section anchor="the-norevavail-certificate-extension">
      <name>The noRevAvail Certificate Extension</name>
      <t>The noRevAvail extension, defined in <xref target="X.509-2019-TC2"/>, allows an CA to indicate that
no revocation information will be made available for this certificate.</t>
      <t>This extension <bcp14>MUST NOT</bcp14> be present in CA public key certificates.</t>
      <t>Conforming CAs <bcp14>MUST</bcp14> include this extension in certificates for which no
revocation information will be published.  When present, conforming CAs
<bcp14>MUST</bcp14> mark this extension as non-critical.</t>
      <ul empty="true">
        <li>
          <artwork><![CDATA[
name           id-ce-noRevAvail
OID            { id-ce 56 }
syntax         NULL (i.e. '0500'H is the DER encoding)
criticality    MUST be FALSE
]]></artwork>
        </li>
      </ul>
      <t>A relying party that does not understand this extension might be able to
find a certificate revocation list (CRL) from the CA, but the CRL will
never include an entry for the certificate containing this extension.</t>
    </section>
    <section anchor="other-x509-certificate-extensions">
      <name>Other X.509 Certificate Extensions</name>
      <t>Certificates that include the noRevAvail extension <bcp14>MUST NOT</bcp14> include
certificate extensions that point to Certificate Revocation List (CRL)
repositories or provide locations of Online Certificate Status Protocol
(OCSP) Responders.  If the noRevAvail extension is present in a
certificate, then:</t>
      <ul spacing="normal">
        <li>
          <t>The certificate <bcp14>MUST NOT</bcp14> also include the CRL Distribution Points certificate extension; see Section 4.2.1.13 of <xref target="RFC5280"/>.</t>
        </li>
        <li>
          <t>The certificate <bcp14>MUST NOT</bcp14> also include the Freshest CRL certificate extension; see Section 4.2.1.15 of <xref target="RFC5280"/>.</t>
        </li>
        <li>
          <t>The Authority Information Access certificate extension, if present, <bcp14>MUST NOT</bcp14> include an id-ad-ocsp accessMethod; see Section 4.2.2.1 of <xref target="RFC5280"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="asn1-mod">
      <name>ASN.1 Module</name>
      <t>This section provides an ASN.1 module <xref target="X.680"/> for the noRevAvail
certificate extension, and it follows the conventions established
in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
      <sourcecode type="asn.1" markers="true"><![CDATA[
  NoRevAvailExtn
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-noRevAvail(TBD) }

  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  IMPORTS
    EXTENSION
    FROM PKIX-CommonTypes-2009  -- RFC 5912
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-mod(0)
        id-mod-pkixCommon-02(57) } ;

  -- noRevAvail Certificate Extension

  ext-noRevAvail EXTENSION ::= {
    SYNTAX NULL
    IDENTIFIED BY id-ce-noRevAvail
    CRITICALITY { FALSE } }

  -- noRevAvail Certificate Extension OID

  id-ce OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) ds(5) 29 }

  id-ce-noRevAvail OBJECT IDENTIFIER ::= { id-ce 56 }
 
  END
]]></sourcecode>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The Security Considerations in <xref target="RFC5280"/> are relevant.</t>
      <t>When the noRevAvail certificate extension is included in a certificate,
all revocation checking is bypassed, even if the CRL Distribution Points,
Freshest CRL, or Authority Information Access (pointing to an OCSP Responder)
certificate extensions are present.  CA policies and practices <bcp14>MUST</bcp14> ensure
that the noRevAvail is included only when appropriate, as any misuse or
misconfiguration could result in a relying party continuing to trust
a revoked certificate.</t>
      <t>Some applications may have dependencies on revocation information or assume
its availability. The absence of revocation information may require modifications
or alternative configuration settings to ensure proper application security and
functionality.</t>
      <t>Since the absence of revocation information may limit the ability to detect
compromised or malicious certificates, relying parties need confidence that
the CA is following security practices, implementing certificate issuance
policies, and properly using operational controls. Relying parties may
evaluate CA reliability, monitoring CA performance, and observe CA incident
response capabilities.</t>
      <section anchor="short-lived-certificates">
        <name>Short-lived Certificates</name>
        <t>No revocation information is made available for short-lived certificates
because the certificate validity period is shorter than the time needed to
detect, report, and distribute revocation information. If the noRevAvail
certificate extension is incorrectly used for a certificate validity
period that is not adequately short, it creates a window of opportunity for
attackers to exploit a compromised private key. Therefore, it is crucial
to carefully assess and set an appropriate certificate validity period
before implementing the noRevAvail certificate extension.</t>
      </section>
      <section anchor="long-lived-certificates">
        <name>Long-lived Certificates</name>
        <t>No revocation information is made available for some long-lived certificates
that contain information that never changes.  For example, IDevID certificates
<xref target="IEEE802.1AR"/> are included in devices at the factory, and they are used to
obtain LDevID certificates <xref target="IEEE802.1AR"/> in an operational environment. In this
case, cryptographic algorithms need to be chosen that are expected to remain secure
to the expected lifetime of the device. If the noRevAvail certificate extension is
used, the CA has no means of notifying the relying party about compromise of the
factory-installed keying material.</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the ASN.1 Module in <xref target="asn1-mod"/>, IANA is requested to assign an
object identifier (OID) for the module identifier. The OID for the module
should be allocated in the "SMI Security for PKIX Module Identifier"
registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Erik Anderson for his efforts to make the noRevAvail
certificate extension available for use with public key certificates as
well as attribute certificates.</t>
      <t>Many thanks to Carl Wallace and Tim Hollebeek for their review and insightful comments.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="X.509-2019-TC2" target="https://www.itu.int/rec/T-REC-X.509-202310-I!Cor2">
          <front>
            <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks -- Technical Corrigendum 2</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2023" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.509-2019/Cor.2-2023"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.690"/>
          <seriesInfo name="ISO/IEC" value="8825-1-2021"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/document/8423794">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="July" day="31"/>
          </front>
          <seriesInfo name="IEEE" value="802.1AR-2018"/>
        </reference>
        <reference anchor="RFC2459">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and CRL Profile</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author fullname="D. Solo" initials="D." surname="Solo"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 CRL for use in the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2459"/>
          <seriesInfo name="DOI" value="10.17487/RFC2459"/>
        </reference>
        <reference anchor="RFC3281">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="April" year="2002"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements. The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements. The profile places emphasis on attribute certificate support for Internet electronic mail, IPSec, and WWW security applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3281"/>
          <seriesInfo name="DOI" value="10.17487/RFC3281"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="X.509-1988" target="https://www.itu.int/rec/T-REC-X.509-198811-S">
          <front>
            <title>Series X: Data Communication Networks: Directory -- The Directory -- Authentication Framework</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <seriesInfo name="CCITT Recommendation" value="X.509-1988"/>
        </reference>
        <reference anchor="X.509-1997" target="https://www.itu.int/rec/T-REC-X.509-199708-S">
          <front>
            <title>Information Technology -- Open Systems Interconnection -- The Directory: Authentication framework</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="1997" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.509-1997"/>
        </reference>
        <reference anchor="X.509-2000" target="https://www.itu.int/rec/T-REC-X.509-200003-S">
          <front>
            <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2000" month="March"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.509-2000"/>
        </reference>
        <reference anchor="X.509-2019" target="https://www.itu.int/rec/T-REC-X.509-201910-I">
          <front>
            <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2019" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.509-2019"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
