Skip to main content

Clarification to Processing Key Usage Values During Certificate Revocation List (CRL) Validation
draft-ietf-lamps-keyusage-crl-validation-04

Revision differences

Document history

Date Rev. By Action
2026-01-20
04 (System) RFC Editor state changed to AUTH from EDIT
2026-01-20
04 (System) RFC Editor state changed to EDIT from AUTH
2026-01-09
04 (System) IANA Action state changed to No IANA Actions from In Progress
2026-01-07
04 (System) RFC Editor state changed to AUTH from EDIT
2026-01-07
04 (System) RFC Editor state changed to EDIT
2026-01-07
04 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2026-01-07
04 (System) Announcement was received by RFC Editor
2026-01-07
04 (System) IANA Action state changed to In Progress
2026-01-07
04 Morgan Condie IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2026-01-07
04 Morgan Condie IESG has approved the document
2026-01-07
04 Morgan Condie Closed "Approve" ballot
2026-01-07
04 Morgan Condie Ballot approval text was generated
2026-01-07
04 Morgan Condie Ballot writeup was changed
2026-01-07
04 (System) Removed all action holders (IESG state changed)
2026-01-07
04 Deb Cooley IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2026-01-06
04 (System) Changed action holders to Deb Cooley (IESG state changed)
2026-01-06
04 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2026-01-06
04 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2026-01-06
04 Corey Bonnell New version available: draft-ietf-lamps-keyusage-crl-validation-04.txt
2026-01-06
04 Corey Bonnell New version accepted (logged-in submitter: Corey Bonnell)
2026-01-06
04 Corey Bonnell Uploaded new revision
2025-12-30
03 Paul Wouters
[Ballot comment]
Thanks for the discussion on 5280 and the security issue I raised, and for pointing out that such setup was already technically incorrect. …
[Ballot comment]
Thanks for the discussion on 5280 and the security issue I raised, and for pointing out that such setup was already technically incorrect.
I have updated my ballot to Yes
2025-12-30
03 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss
2025-12-23
03 Barry Leiba Request closed, assignment withdrawn: Henry Thompson IETF Last Call ARTART review
2025-12-23
03 Barry Leiba Closed request for IETF Last Call review by ARTART with state 'Overtaken by Events'
2025-12-18
03 (System) Changed action holders to Corey Bonnell, Tadahiko Ito, Tomofumi Okubo (IESG state changed)
2025-12-18
03 Morgan Condie IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2025-12-17
03 Mike Bishop [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop
2025-12-16
03 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2025-12-15
03 Paul Wouters
[Ballot discuss]
Like Mahesh, I am a bit nervous about what is expected to happen if the keyUsage extension is not there? I think this …
[Ballot discuss]
Like Mahesh, I am a bit nervous about what is expected to happen if the keyUsage extension is not there? I think this document means to say "That was not a valid CRL signer, so this should not be treated as a valid CRL entry". But this could potentially be happening right now in what up to this document's publication is a valid CRL setup that does not use a keyUsage extension. Should there perhaps be some Operational Considerations on how to handle these? Or is it the WG's opinion that any such CRL signers were broken and it is justified to treat these CRLs as invalid? Could such discarding of a CRL not lead to a security issue (eg a compromised private key is being decommissioned with a CRL but now the CRL is ignored because of a missing keyUsage, and the compromise is not contained via the CRL mechanism)
2025-12-15
03 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2025-12-15
03 Gunter Van de Velde [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde
2025-12-13
03 Mahesh Jethanandani
[Ballot comment]
Section 4, paragraph 5
>    _OLD:_
>
>      (f) Obtain and validate the certification path for the issuer of
>  …
[Ballot comment]
Section 4, paragraph 5
>    _OLD:_
>
>      (f) Obtain and validate the certification path for the issuer of
>      the complete CRL.  The trust anchor for the certification path
>      MUST be the same as the trust anchor used to validate the target
>      certificate.  If a keyUsage extension is present in the CRL
>      issuer's certificate, verify that the cRLSign bit is set.
>
>    _NEW:_
>
>      (f) Obtain and validate the certification path for the issuer of
>      the complete CRL.  The trust anchor for the certification path
>      MUST be the same as the trust anchor used to validate the target
>      certificate.  If the version of the CRL issuer’s certificate is
>      version 3 (v3), then verify that the keyUsage extension is present
>      and verify that the cRLSign bit is set.

While the NEW statement goes further in its clarification, it is not obvious what happens if the keyUsage extension is NOT present. As is, and per the Security Considerations section, the fact that the extension is included in only RECOMMENDED and is not a MUST opens up the possibility that it may not be present.

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

These URLs in the document did not return content:

* https://CBonnell.github.io/ietf-lamps-keyusage-crl-validation-clarification/draft-ietf-lamps-keyusage-crl-validation.html

Section 3, paragraph 11
> certificates signed in step 2. 5. Relying parties download the CRL published
>                                  ^^^^^^^
The verb "rely" requires the preposition "on" (or "upon").

Section 4, paragraph 5
> Section 4.2.1.3 of [RFC5280], then relying party applications that have implented
>                                    ^^^^^^^
The verb "rely" requires the preposition "on" (or "upon").
2025-12-13
03 Mahesh Jethanandani [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani
2025-12-11
03 Ketan Talaulikar
[Ballot comment]
Thanks to the authors and the WG for their work on the document.

I have only one editorial comment to offer. The abstract …
[Ballot comment]
Thanks to the authors and the WG for their work on the document.

I have only one editorial comment to offer. The abstract and the introduction sections are nearly identical. The abstract should be short and self contained to give an overview of the document. Reference to RFC 5280 which this document updates is appropriate in the abstract, but at references to specific sections seem inappropriate. Please consider rephrasing the abstract without those section references?
2025-12-11
03 Ketan Talaulikar [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar
2025-12-10
03 Roman Danyliw [Ballot comment]
Thank you to Roni Even for the GENART review.
2025-12-10
03 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2025-12-10
03 Gorry Fairhurst [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst
2025-12-08
03 Andy Newton [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton
2025-12-08
03 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2025-12-08
03 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2025-12-07
03 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2025-12-05
03 Mohamed Boucadair
[Ballot comment]
Hi Corey, Tadahiko, and Tomofumi,

Thank you for the effort put into this document.

I only have few nits that I submitted as …
[Ballot comment]
Hi Corey, Tadahiko, and Tomofumi,

Thank you for the effort put into this document.

I only have few nits that I submitted as a PR for authors convenience [1].

Cheers,
Med

[1] https://github.com/CBonnell/lamps-keyusage-crl-validation-clarification/pull/4
2025-12-05
03 Mohamed Boucadair [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair
2025-12-04
03 Morgan Condie Placed on agenda for telechat - 2025-12-18
2025-12-04
03 Deb Cooley Ballot has been issued
2025-12-04
03 Deb Cooley [Ballot Position Update] New position, Yes, has been recorded for Deb Cooley
2025-12-04
03 Deb Cooley Created "Approve" ballot
2025-12-04
03 Deb Cooley IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2025-12-03
03 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2025-12-03
03 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2025-11-29
03 Roni Even Request for IETF Last Call review by GENART Completed: Ready. Reviewer: Roni Even. Sent review to list.
2025-11-25
03 Barry Leiba Request for IETF Last Call review by ARTART is assigned to Henry Thompson
2025-11-23
03 Jon Geater Request for IETF Last Call review by SECDIR Completed: Ready. Reviewer: Jon Geater. Sent review to list.
2025-11-21
03 Tero Kivinen Request for IETF Last Call review by SECDIR is assigned to Jon Geater
2025-11-20
03 Jean Mahoney Request for IETF Last Call review by GENART is assigned to Roni Even
2025-11-19
03 Morgan Condie IANA Review state changed to IANA - Review Needed
2025-11-19
03 Morgan Condie
The following Last Call announcement was sent out (ends 2025-12-03):

From: The IESG
To: IETF-Announce
CC: debcooley1@gmail.com, draft-ietf-lamps-keyusage-crl-validation@ietf.org, housley@vigilsec.com, lamps-chairs@ietf.org, spasm@ietf.org …
The following Last Call announcement was sent out (ends 2025-12-03):

From: The IESG
To: IETF-Announce
CC: debcooley1@gmail.com, draft-ietf-lamps-keyusage-crl-validation@ietf.org, housley@vigilsec.com, lamps-chairs@ietf.org, spasm@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Clarification to processing Key Usage values during CRL validation) to Proposed Standard


The IESG has received a request from the Limited Additional Mechanisms for
PKIX and SMIME WG (lamps) to consider the following document: -
'Clarification to processing Key Usage values during CRL validation'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2025-12-03. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  RFC 5280 defines the profile of X.509 certificates and certificate
  revocation lists (CRLs) for use in the Internet.  Section 4.2.1.3 of
  RFC 5280 requires CRL issuer certificates to contain the keyUsage
  extension with the cRLSign bit asserted.  However, the CRL validation
  algorithm specified in Section 6.3 of RFC 5280 does not explicitly
  include a corresponding check for the presence of the keyUsage
  certificate extension.  This document updates RFC 5280 to require
  that check.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lamps-keyusage-crl-validation/



No IPR declarations have been submitted directly on this I-D.




2025-11-19
03 Morgan Condie IESG state changed to In Last Call from Last Call Requested
2025-11-19
03 Deb Cooley Last call was requested
2025-11-19
03 Deb Cooley Last call announcement was generated
2025-11-19
03 Deb Cooley Ballot approval text was generated
2025-11-19
03 Deb Cooley IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2025-11-18
03 (System) Changed action holders to Deb Cooley (IESG state changed)
2025-11-18
03 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-11-18
03 Corey Bonnell New version available: draft-ietf-lamps-keyusage-crl-validation-03.txt
2025-11-18
03 Corey Bonnell New version approved
2025-11-18
03 (System) Request for posting confirmation emailed to previous authors: Corey Bonnell , Tadahiko Ito , Tomofumi Okubo
2025-11-18
03 Corey Bonnell Uploaded new revision
2025-10-26
02 Deb Cooley comments are here:  https://mailarchive.ietf.org/arch/msg/spasm/3LbSovpxNl-Yut-O2b4irdRWimw/
2025-10-26
02 (System) Changed action holders to Corey Bonnell, Tadahiko Ito, Tomofumi Okubo (IESG state changed)
2025-10-26
02 Deb Cooley IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2025-10-26
02 Deb Cooley IESG state changed to AD Evaluation from Publication Requested
2025-10-24
02 Deb Cooley Ballot writeup was changed
2025-10-02
02 Russ Housley
Shepherd Write-up for draft-ietf-lamps-keyusage-crl-validation-02


(1) Does the working group (WG) consensus represent the strong
concurrence of a few individuals, with others being silent, or did …
Shepherd Write-up for draft-ietf-lamps-keyusage-crl-validation-02


(1) Does the working group (WG) consensus represent the strong
concurrence of a few individuals, with others being silent, or did it
reach broad agreement?

  There is support for this document in the LAMPS WG.

(2) Was there controversy about particular points, or were there
decisions where the consensus was particularly rough?

  During the WG Last Call there was a very active discussion in late
  June 2025, and the modifications made to the document reflect the
  consensus that was reached.
 
(3) Has anyone threatened an appeal or otherwise indicated extreme
discontent?  If so, please summarize the areas of conflict in separate
email messages to the responsible Area Director.  (It should be in a
separate email because this questionnaire is publicly available.)

  No one has threatened an appeal or indicated any discontent.

(4) For protocol documents, are there existing implementations of the
contents of the document?  Have a significant number of potential
implementers indicated plans to implement?  Are any existing
implementations reported somewhere, either in the document itself (as
RFC 7942 recommends) or elsewhere (where)?

  It is clear that several people already implement this document.

(5) Does this document need review from other IETF working groups or
external organizations?  Have those reviews occurred?

  None needed.

(6) Describe how the document meets any required formal expert review
criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type
reviews.

  The document discusses the ASN.1 in RFC 5280, but no new ASN.1
  definitions are needed.

(7) If the document contains a YANG module, has the final version of the
module been checked with any of the recommended validation tools for
syntax and formatting validation?  If there are any resulting errors or
warnings, what is the justification for not fixing them at this time?
Does the YANG module comply with the Network Management Datastore
Architecture (NMDA) as specified in RFC 8342?

  YANG is not used in the document.

(8) Describe reviews and automated checks performed to validate sections
of the final version of the document written in a formal language, such
as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc.

  None.

(9) Based on the shepherd's review of the document, is it their opinion
that this document is needed, clearly written, complete, correctly
designed, and ready to be handed off to the responsible Area Director?

  The document shepherd finds the document clear and complete.

(10) Several IETF Areas have assembled lists of common issues that their
reviewers encounter.  Do any such issues remain that would merit specific
attention from subsequent reviews?

  The document shepherd finds no concerns.

(11) What type of RFC publication is being requested on the IETF stream
(Best Current Practice, Proposed Standard, Internet Standard,
Informational, Experimental, or Historic)?  Why is this the proper type
of RFC?  Do all Datatracker state attributes correctly reflect this
intent?

  Proposed Standard.  The datatracker indicates this intent.

(12) Has the interested community confirmed that any and all appropriate
IPR disclosures required by BCP 78 and BCP 79 have been filed?  If not,
explain why.  If yes, summarize any discussion and conclusion regarding
the intellectual property rights (IPR) disclosures, including links to
relevant emails.

  Each author has explicitly confirmed that all IPR disclosures that
  are required for full conformance with the provisions of BCP 78
  and BCP 79 have already been filed.  There are none.

(13) Has each Author or Contributor confirmed their willingness to be
listed as such?  If the number of Authors/Editors on the front page is
greater than 5, please provide a justification.

  Each author has explicitly confirmed their willingness to be listed
  as an author.  All other contributors are comfortable not being
  listed as authors.

(14) Identify any remaining I-D nits in this document.  (See the idnits
tool and the checkbox items found in Guidelines to Authors of
Internet-Drafts).  Simply running the idnits tool is not enough; please
review the entire guidelines document.

  IDnits raises a new concerns, not noe of them seems to be relevant.
 
  First, IDnits complains about non-ASCII characters in the document,
  but these are legitimate use of non-ASCII characters.
 
  Second, IDnits complains about long lines, but they are associated with
  the legitimate use of non-ASCII characters in the document.
 
  Third, IDnits complains that:
 
    -- The draft header indicates that this document updates RFC5280, but the
    abstract doesn't seem to directly say this.  It does mention RFC5280
    though, so this could be OK.

  As document shepherd, it seems fine, and no one raise a concern during
  WG Last Call.

  Finally, IDnits raise a concern that "you may need to add the pre-RFC5378
  disclaimer".  This is not correct.  As author of RFC 5280, I have provided
  the necessary rights to the IETF Trust to avoid the need for this disclaimer.

(15) Should any informative references be normative or vice-versa?

  All three references are normative.

(16) List any normative references that are not freely available to
anyone.  Did the community have sufficient access to review any such
normative references?

  All normative references are RFCs.

(17) Are there any normative downward references (see RFC 3967, BCP 97)?
If so, list them.

  There are no downrefs.

(18) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state?  If they exist, what is
the plan for their completion?

  All of the normative references have already been published.

(19) Will publication of this document change the status of any existing
RFCs?  If so, does the Datatracker metadata correctly reflect this and
are those RFCs listed on the title page, in the abstract, and discussed
in the introduction?  If not, explain why and point to the part of the
document where the relationship of this document to these other RFCs is
discussed.

  Publication of this document will not effect the status of any
  other documents.

(20) Describe the document shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document.  Confirm that all aspects of the document requiring IANA
assignments are associated with the appropriate reservations in IANA
registries.  Confirm that any referenced IANA registries have been
clearly identified.  Confirm that each newly created IANA registry
specifies its initial contents, allocations procedures, and a reasonable
name (see RFC 8126).

  No  IANA actions are needed.

(21) List any new IANA registries that require Designated Expert Review
for future allocations.  Are the instructions to the Designated Expert
clear?  Please include suggestions of designated experts, if appropriate.

  No new IANA registries are needed.
2025-10-02
02 Russ Housley IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2025-10-02
02 Russ Housley IESG state changed to Publication Requested from I-D Exists
2025-10-02
02 (System) Changed action holders to Deb Cooley (IESG state changed)
2025-10-02
02 Russ Housley Responsible AD changed to Deb Cooley
2025-10-02
02 Russ Housley Document is now in IESG state Publication Requested
2025-10-02
02 Russ Housley
Shepherd Write-up for draft-ietf-lamps-keyusage-crl-validation-02


(1) Does the working group (WG) consensus represent the strong
concurrence of a few individuals, with others being silent, or did …
Shepherd Write-up for draft-ietf-lamps-keyusage-crl-validation-02


(1) Does the working group (WG) consensus represent the strong
concurrence of a few individuals, with others being silent, or did it
reach broad agreement?

  There is support for this document in the LAMPS WG.

(2) Was there controversy about particular points, or were there
decisions where the consensus was particularly rough?

  During the WG Last Call there was a very active discussion in late
  June 2025, and the modifications made to the document reflect the
  consensus that was reached.
 
(3) Has anyone threatened an appeal or otherwise indicated extreme
discontent?  If so, please summarize the areas of conflict in separate
email messages to the responsible Area Director.  (It should be in a
separate email because this questionnaire is publicly available.)

  No one has threatened an appeal or indicated any discontent.

(4) For protocol documents, are there existing implementations of the
contents of the document?  Have a significant number of potential
implementers indicated plans to implement?  Are any existing
implementations reported somewhere, either in the document itself (as
RFC 7942 recommends) or elsewhere (where)?

  It is clear that several people already implement this document.

(5) Does this document need review from other IETF working groups or
external organizations?  Have those reviews occurred?

  None needed.

(6) Describe how the document meets any required formal expert review
criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type
reviews.

  The document discusses the ASN.1 in RFC 5280, but no new ASN.1
  definitions are needed.

(7) If the document contains a YANG module, has the final version of the
module been checked with any of the recommended validation tools for
syntax and formatting validation?  If there are any resulting errors or
warnings, what is the justification for not fixing them at this time?
Does the YANG module comply with the Network Management Datastore
Architecture (NMDA) as specified in RFC 8342?

  YANG is not used in the document.

(8) Describe reviews and automated checks performed to validate sections
of the final version of the document written in a formal language, such
as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc.

  None.

(9) Based on the shepherd's review of the document, is it their opinion
that this document is needed, clearly written, complete, correctly
designed, and ready to be handed off to the responsible Area Director?

  The document shepherd finds the document clear and complete.

(10) Several IETF Areas have assembled lists of common issues that their
reviewers encounter.  Do any such issues remain that would merit specific
attention from subsequent reviews?

  The document shepherd finds no concerns.

(11) What type of RFC publication is being requested on the IETF stream
(Best Current Practice, Proposed Standard, Internet Standard,
Informational, Experimental, or Historic)?  Why is this the proper type
of RFC?  Do all Datatracker state attributes correctly reflect this
intent?

  Proposed Standard.  The datatracker indicates this intent.

(12) Has the interested community confirmed that any and all appropriate
IPR disclosures required by BCP 78 and BCP 79 have been filed?  If not,
explain why.  If yes, summarize any discussion and conclusion regarding
the intellectual property rights (IPR) disclosures, including links to
relevant emails.

  Each author has explicitly confirmed that all IPR disclosures that
  are required for full conformance with the provisions of BCP 78
  and BCP 79 have already been filed.  There are none.

(13) Has each Author or Contributor confirmed their willingness to be
listed as such?  If the number of Authors/Editors on the front page is
greater than 5, please provide a justification.

  Each author has explicitly confirmed their willingness to be listed
  as an author.  All other contributors are comfortable not being
  listed as authors.

(14) Identify any remaining I-D nits in this document.  (See the idnits
tool and the checkbox items found in Guidelines to Authors of
Internet-Drafts).  Simply running the idnits tool is not enough; please
review the entire guidelines document.

  IDnits raises a new concerns, not noe of them seems to be relevant.
 
  First, IDnits complains about non-ASCII characters in the document,
  but these are legitimate use of non-ASCII characters.
 
  Second, IDnits complains about long lines, but they are associated with
  the legitimate use of non-ASCII characters in the document.
 
  Third, IDnits complains that:
 
    -- The draft header indicates that this document updates RFC5280, but the
    abstract doesn't seem to directly say this.  It does mention RFC5280
    though, so this could be OK.

  As document shepherd, it seems fine, and no one raise a concern during
  WG Last Call.

  Finally, IDnits raise a concern that "you may need to add the pre-RFC5378
  disclaimer".  This is not correct.  As author of RFC 5280, I have provided
  the necessary rights to the IETF Trust to avoid the need for this disclaimer.

(15) Should any informative references be normative or vice-versa?

  All three references are normative.

(16) List any normative references that are not freely available to
anyone.  Did the community have sufficient access to review any such
normative references?

  All normative references are RFCs.

(17) Are there any normative downward references (see RFC 3967, BCP 97)?
If so, list them.

  There are no downrefs.

(18) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state?  If they exist, what is
the plan for their completion?

  All of the normative references have already been published.

(19) Will publication of this document change the status of any existing
RFCs?  If so, does the Datatracker metadata correctly reflect this and
are those RFCs listed on the title page, in the abstract, and discussed
in the introduction?  If not, explain why and point to the part of the
document where the relationship of this document to these other RFCs is
discussed.

  Publication of this document will not effect the status of any
  other documents.

(20) Describe the document shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document.  Confirm that all aspects of the document requiring IANA
assignments are associated with the appropriate reservations in IANA
registries.  Confirm that any referenced IANA registries have been
clearly identified.  Confirm that each newly created IANA registry
specifies its initial contents, allocations procedures, and a reasonable
name (see RFC 8126).

  No  IANA actions are needed.

(21) List any new IANA registries that require Designated Expert Review
for future allocations.  Are the instructions to the Designated Expert
clear?  Please include suggestions of designated experts, if appropriate.

  No new IANA registries are needed.
2025-10-01
02 Russ Housley Notification list changed to housley@vigilsec.com because the document shepherd was set
2025-10-01
02 Russ Housley Document shepherd changed to Russ Housley
2025-10-01
02 Russ Housley IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2025-10-01
02 Corey Bonnell New version available: draft-ietf-lamps-keyusage-crl-validation-02.txt
2025-10-01
02 (System) New version approved
2025-10-01
02 (System) Request for posting confirmation emailed to previous authors: Corey Bonnell , Tadahiko Ito , Tomofumi Okubo
2025-10-01
02 Corey Bonnell Uploaded new revision
2025-07-07
01 Corey Bonnell New version available: draft-ietf-lamps-keyusage-crl-validation-01.txt
2025-07-07
01 Corey Bonnell New version approved
2025-07-07
01 (System) Request for posting confirmation emailed to previous authors: Corey Bonnell , Tadahiko Ito , Tomofumi Okubo
2025-07-07
01 Corey Bonnell Uploaded new revision
2025-06-11
00 Russ Housley IETF WG state changed to In WG Last Call from WG Document
2025-06-11
00 Russ Housley This document now replaces draft-lamps-bonnell-keyusage-crl-validation instead of None
2025-06-11
00 Russ Housley Changed consensus to Yes from Unknown
2025-06-11
00 Russ Housley Intended Status changed to Proposed Standard from None
2025-05-20
00 Corey Bonnell New version available: draft-ietf-lamps-keyusage-crl-validation-00.txt
2025-05-20
00 Russ Housley WG -00 approved
2025-05-20
00 Corey Bonnell Set submitter to "Corey Bonnell ", replaces to (none) and sent approval email to group chairs: lamps-chairs@ietf.org
2025-05-20
00 Corey Bonnell Uploaded new revision