A Profile for X.509 PKIX Resource Certificates
RFC 6487
Document | Type | RFC - Proposed Standard (February 2012; Errata) | |
---|---|---|---|
Authors | Geoff Huston , Robert Loomans , George Michaelson | ||
Last updated | 2020-01-21 | ||
Replaces | draft-huston-sidr-res-certs | ||
Stream | Internent Engineering Task Force (IETF) | ||
Formats | plain text html pdf htmlized (tools) htmlized with errata bibtex | ||
Reviews | |||
Stream | WG state | WG Document | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | RFC 6487 (Proposed Standard) | |
Action Holders |
(None)
|
||
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | Stewart Bryant | ||
IESG note | Sandra Murphy (Sandra.Murphy@sparta.com) is the document shepherd. | ||
Send notices to | (None) |
Internet Engineering Task Force (IETF) G. Huston Request for Comments: 6487 G. Michaelson Category: Standards Track R. Loomans ISSN: 2070-1721 APNIC February 2012 A Profile for X.509 PKIX Resource Certificates Abstract This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6487. Huston, et al. Standards Track [Page 1] RFC 6487 Resource Certificate Profile February 2012 Copyright Notice Copyright (c) 2012 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Huston, et al. Standards Track [Page 2] RFC 6487 Resource Certificate Profile February 2012 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5 2. Describing Resources in Certificates . . . . . . . . . . . . . 5 3. End-Entity (EE) Certificates and Signing Functions in the RPKI 5 4. Resource Certificates . . . . . . . . . . . . . . . . . . . . 6 4.1. Version . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.2. Serial Number . . . . . . . . . . . . . . . . . . . . . . 6 4.3. Signature Algorithm . . . . . . . . . . . . . . . . . . . 6 4.4. Issuer . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4.5. Subject . . . . . . . . . . . . . . . . . . . . . . . . . 7 4.6. Validity . . . . . . . . . . . . . . . . . . . . . . . . . 7 4.6.1. notBefore . . . . . . . . . . . . . . . . . . . . . . 8 4.6.2. notAfter . . . . . . . . . . . . . . . . . . . . . . . 8 4.7. Subject Public Key Info . . . . . . . . . . . . . . . . . 8 4.8. Resource Certificate Extensions . . . . . . . . . . . . . 8 4.8.1. Basic Constraints . . . . . . . . . . . . . . . . . . 8 4.8.2. Subject Key Identifier . . . . . . . . . . . . . . . . 9 4.8.3. Authority Key Identifier . . . . . . . . . . . . . . . 9 4.8.4. Key Usage . . . . . . . . . . . . . . . . . . . . . . 9 4.8.5. Extended Key Usage . . . . . . . . . . . . . . . . . . 9 4.8.6. CRL Distribution Points . . . . . . . . . . . . . . . 10 4.8.7. Authority Information Access . . . . . . . . . . . . . 10 4.8.8. Subject Information Access . . . . . . . . . . . . . . 11 4.8.9. Certificate Policies . . . . . . . . . . . . . . . . . 12 4.8.10. IP Resources . . . . . . . . . . . . . . . . . . . . . 12 4.8.11. AS Resources . . . . . . . . . . . . . . . . . . . . . 12 5. Resource Certificate Revocation Lists . . . . . . . . . . . . 13 6. Resource Certificate Requests . . . . . . . . . . . . . . . . 13 6.1. PCKS#10 Profile . . . . . . . . . . . . . . . . . . . . . 14 6.1.1. PKCS#10 Resource Certificate Request Template Fields . 14Show full document text