<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" consensus="true" docName="draft-housley-ers-asn1-modules-03" indexInclude="true" ipr="trust200902" number="9169" prepTime="2021-12-30T11:20:53" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-housley-ers-asn1-modules-03" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9169" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="New ASN.1 Modules for the ERS">New ASN.1 Modules for the Evidence Record Syntax (ERS)</title>
    <seriesInfo name="RFC" value="9169" stream="IETF"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security" showOnFrontPage="true">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon</city>
          <region>VA</region>
          <code>20170</code>
          <country>USA</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="C." surname="Wallace" fullname="Carl Wallace">
      <organization abbrev="Red Hound Software" showOnFrontPage="true">Red Hound Software, Inc.</organization>
      <address>
        <postal>
          <street>5112 27th St. N</street>
          <city>Arlington</city>
          <region>VA</region>
          <code>22207</code>
          <country>USA</country>
        </postal>
        <email>carl@redhoundsoftware.com</email>
      </address>
    </author>
    <date month="12" year="2021"/>
    <keyword>LTANS</keyword>
    <keyword>long-term archive</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">The Evidence Record Syntax (ERS) and the conventions for including these
evidence records in the Server-based Certificate Validation Protocol
(SCVP) are expressed using ASN.1.  This document offers alternative ASN.1
modules that conform to the 2002 version of ASN.1 and employ the
conventions adopted in RFCs 5911, 5912, and 6268.  There are no
bits-on-the-wire changes to any of the formats; this is simply a change
to the ASN.1 syntax.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by the
            Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9169" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-asn1-module-for-rfc-4998">ASN.1 Module for RFC 4998</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-asn1-module-for-rfc-5276">ASN.1 Module for RFC 5276</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Some developers would like the IETF to use the latest version of ASN.1 in
its standards.  This document provides alternative ASN.1 modules to assist
in that goal.</t>
      <t indent="0" pn="section-1-2">The Evidence Record Syntax (ERS) <xref target="RFC4998" format="default" sectionFormat="of" derivedContent="RFC4998"/> provides two ASN.1 modules: one using the 1988 syntax
      <xref target="OLD-ASN1" format="default" sectionFormat="of" derivedContent="OLD-ASN1"/>, which has been deprecated by
      the ITU-T, and another one using the newer syntax <xref target="NEW-ASN1" format="default" sectionFormat="of" derivedContent="NEW-ASN1"/>, which continues to be maintained
      and enhanced.  This document provides an alternative ASN.1 module that
      follows the conventions established in <xref target="RFC5911" format="default" sectionFormat="of" derivedContent="RFC5911"/>, <xref target="RFC5912" format="default" sectionFormat="of" derivedContent="RFC5912"/>, and <xref target="RFC6268" format="default" sectionFormat="of" derivedContent="RFC6268"/>.</t>
      <t indent="0" pn="section-1-3">In addition, <xref target="RFC5276" format="default" sectionFormat="of" derivedContent="RFC5276"/> specifies the
      mechanism for conveying evidence records in the Server-based Certificate
      Validation Protocol (SCVP) <xref target="RFC5055" format="default" sectionFormat="of" derivedContent="RFC5055"/>.
      There is only one ASN.1 module in <xref target="RFC5276" format="default" sectionFormat="of" derivedContent="RFC5276"/>, and it uses the 1988 syntax <xref target="OLD-ASN1" format="default" sectionFormat="of" derivedContent="OLD-ASN1"/>.  This document provides an alternative ASN.1 module
      using the newer syntax <xref target="NEW-ASN1" format="default" sectionFormat="of" derivedContent="NEW-ASN1"/> and
      follows the conventions established in <xref target="RFC5911" format="default" sectionFormat="of" derivedContent="RFC5911"/>, <xref target="RFC5912" format="default" sectionFormat="of" derivedContent="RFC5912"/>, and <xref target="RFC6268" format="default" sectionFormat="of" derivedContent="RFC6268"/>.  Note that <xref target="RFC5912" format="default" sectionFormat="of" derivedContent="RFC5912"/> already includes an alternative ASN.1 module for SCVP
      <xref target="RFC5055" format="default" sectionFormat="of" derivedContent="RFC5055"/>.</t>
      <t indent="0" pn="section-1-4">The original ASN.1 modules get some of their definitions from places
outside the RFC series.  Some of the referenced definitions are somewhat
difficult to find.  The alternative ASN.1 modules offered in this document
stand on their own when combined with the modules in <xref target="RFC5911" format="default" sectionFormat="of" derivedContent="RFC5911"/>,
<xref target="RFC5912" format="default" sectionFormat="of" derivedContent="RFC5912"/>, and <xref target="RFC6268" format="default" sectionFormat="of" derivedContent="RFC6268"/>.</t>
      <t indent="0" pn="section-1-5">The alternative ASN.1 modules produce the same bits on the wire as
      the original ones.</t>
      <t indent="0" pn="section-1-6">The alternative ASN.1 modules are informative; the original ones
are normative.</t>
    </section>
    <section anchor="asn1-module-for-rfc-4998" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-asn1-module-for-rfc-4998">ASN.1 Module for RFC 4998</name>
      <sourcecode name="" type="asn.1" markers="true" pn="section-2-1">
   ERS-2021
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) ltans(11) id-mod(0)
       id-mod-ers(1) id-mod-ers-v2(2) }

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN

   EXPORTS ALL;

   IMPORTS

   ContentInfo
     FROM CryptographicMessageSyntax-2010 -- in [RFC6268]
       { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }

   AlgorithmIdentifier{}, DIGEST-ALGORITHM
     FROM AlgorithmInformation-2009 -- in [RFC5912]
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-algorithmInformation-02(58) }

   AttributeSet{}, ATTRIBUTE
     FROM PKIX-CommonTypes-2009 -- in [RFC5912]
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-pkixCommon-02(57) }
   ;

   ltans OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
     dod(6) internet(1) security(5) mechanisms(5) ltans(11) }

   EvidenceRecord ::= SEQUENCE {
     version  INTEGER { v1(1) },
     digestAlgorithms  SEQUENCE OF AlgorithmIdentifier
                         {DIGEST-ALGORITHM, {...}},
     cryptoInfos  [0] CryptoInfos OPTIONAL,
     encryptionInfo  [1] EncryptionInfo OPTIONAL,
     archiveTimeStampSequence  ArchiveTimeStampSequence }

   CryptoInfos ::= SEQUENCE SIZE (1..MAX) OF Attribute

   ArchiveTimeStamp ::= SEQUENCE {
     digestAlgorithm [0] AlgorithmIdentifier
                           {DIGEST-ALGORITHM, {...}} OPTIONAL,
     attributes      [1] Attributes OPTIONAL,
     reducedHashtree [2] SEQUENCE OF PartialHashtree OPTIONAL,
     timeStamp       ContentInfo }

   PartialHashtree ::= SEQUENCE OF OCTET STRING

   Attributes ::= SET SIZE (1..MAX) OF Attribute

   ArchiveTimeStampChain ::= SEQUENCE OF ArchiveTimeStamp

   ArchiveTimeStampSequence ::= SEQUENCE OF ArchiveTimeStampChain

   EncryptionInfo ::= SEQUENCE {
     encryptionInfoType  ENCINFO-TYPE.&amp;id
       ({SupportedEncryptionAlgorithms}),
     encryptionInfoValue  ENCINFO-TYPE.&amp;Type
       ({SupportedEncryptionAlgorithms}{@encryptionInfoType}) }

   ENCINFO-TYPE ::= TYPE-IDENTIFIER

   SupportedEncryptionAlgorithms ENCINFO-TYPE ::= { ... }

   aa-er-internal ATTRIBUTE ::=
     { TYPE EvidenceRecord IDENTIFIED BY id-aa-er-internal }

   id-aa-er-internal  OBJECT IDENTIFIER ::= { iso(1) member-body(2)
     us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) id-aa(2) 49 }

   aa-er-external ATTRIBUTE ::=
     { TYPE EvidenceRecord IDENTIFIED BY id-aa-er-external }

   id-aa-er-external  OBJECT IDENTIFIER ::= { iso(1) member-body(2)
     us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) id-aa(2) 50 }

   ERSAttrSet ATTRIBUTE ::= { aa-er-internal | aa-er-external, ... }

   Attribute ::= AttributeSet {{ERSAttrSet}}

   END
</sourcecode>
    </section>
    <section anchor="asn1-module-for-rfc-5276" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-asn1-module-for-rfc-5276">ASN.1 Module for RFC 5276</name>
      <sourcecode name="" type="asn.1" markers="true" pn="section-3-1">
   LTANS-SCVP-EXTENSION-2021
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) ltans(11) id-mod(0)
       id-mod-ers-scvp(5) id-mod-ers-scvp-v2(2) }

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN

   EXPORTS ALL;

   IMPORTS

   id-swb, CertBundle, WANT-BACK, AllWantBacks
     FROM SCVP-2009 -- in [RFC5912]
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-scvp-02(52) }

   EvidenceRecord
     FROM ERS-2021 -- in [RFC9169]
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) ltans(11) id-mod(0)
         id-mod-ers(1) id-mod-ers-v2(2) }
  ;

   EvidenceRecordWantBack ::= SEQUENCE {
     targetWantBack  WANT-BACK.&amp;id ({ExpandedWantBacks}),
     evidenceRecord  EvidenceRecord OPTIONAL }

   EvidenceRecordWantBacks ::= SEQUENCE SIZE (1..MAX) OF
                                 EvidenceRecordWantBack

   EvidenceRecords ::= SEQUENCE SIZE (1..MAX) OF EvidenceRecord

   ExpandedWantBacks WANT-BACK ::= { AllWantBacks |
                                     NewWantBacks |
                                     ERSWantBacks, ... }

   NewWantBacks WANT-BACK ::= { swb-partial-cert-path, ... }

   swb-partial-cert-path WANT-BACK ::=
     { CertBundle IDENTIFIED BY id-swb-partial-cert-path }

   id-swb-partial-cert-path OBJECT IDENTIFIER ::= { id-swb 15 }

   ERSWantBacks WANT-BACK ::= { swb-ers-pkc-cert |
                                swb-ers-best-cert-path |
                                swb-ers-partial-cert-path |
                                swb-ers-revocation-info |
                                swb-ers-all, ... }

   swb-ers-pkc-cert WANT-BACK ::=
     { EvidenceRecord IDENTIFIED BY id-swb-ers-pkc-cert }

   id-swb-ers-pkc-cert OBJECT IDENTIFIER ::= { id-swb 16 }

   swb-ers-best-cert-path WANT-BACK ::=
     { EvidenceRecord IDENTIFIED BY id-swb-ers-best-cert-path }

   id-swb-ers-best-cert-path OBJECT IDENTIFIER ::= { id-swb 17 }

   swb-ers-partial-cert-path WANT-BACK ::=
     { EvidenceRecord IDENTIFIED BY id-swb-ers-partial-cert-path }

   id-swb-ers-partial-cert-path OBJECT IDENTIFIER ::= { id-swb 18 }

   swb-ers-revocation-info WANT-BACK ::=
     { EvidenceRecords IDENTIFIED BY id-swb-ers-revocation-info }

   id-swb-ers-revocation-info OBJECT IDENTIFIER ::= { id-swb 19 }

   swb-ers-all WANT-BACK ::=
     { EvidenceRecordWantBacks IDENTIFIED BY id-swb-ers-all }

   id-swb-ers-all OBJECT IDENTIFIER ::= { id-swb 20 }

   END
</sourcecode>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-4-1">IANA has assigned two object identifiers from the 
"SMI Security for LTANS Module Identifier" registry to identify
the two ASN.1 modules in this document.</t>
      <t indent="0" pn="section-4-2">The following object identifiers have been assigned:</t>
      <table anchor="iana" align="center" pn="table-1">
        <name slugifiedName="name-iana-object-identifiers">IANA Object Identifiers</name>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">OID Value</th>
            <th align="left" colspan="1" rowspan="1">Description</th>
            <th align="left" colspan="1" rowspan="1">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">1.3.6.1.5.5.11.0.1.2</td>
            <td align="left" colspan="1" rowspan="1">id-mod-ers-v2</td>
            <td align="left" colspan="1" rowspan="1">RFC 9169</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">1.3.6.1.5.5.11.0.5.2</td>
            <td align="left" colspan="1" rowspan="1">id-mod-ers-scvp-v2</td>
            <td align="left" colspan="1" rowspan="1">RFC 9169</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-5-1">Please see the security considerations in <xref target="RFC4998" format="default" sectionFormat="of" derivedContent="RFC4998"/> and <xref target="RFC5276" format="default" sectionFormat="of" derivedContent="RFC5276"/>.  This
document makes no changes to the security considerations in those
documents.  The ASN.1 modules in this document preserve bits on the wire
as the ASN.1 modules that they replace.</t>
    </section>
  </middle>
  <back>
    <references pn="section-6">
      <name slugifiedName="name-references">References</name>
      <references pn="section-6.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680" quoteTitle="true" derivedAnchor="NEW-ASN1">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="RFC4998" target="https://www.rfc-editor.org/info/rfc4998" quoteTitle="true" derivedAnchor="RFC4998">
          <front>
            <title>Evidence Record Syntax (ERS)</title>
            <author initials="T." surname="Gondrom" fullname="T. Gondrom">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Brandner" fullname="R. Brandner">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="U." surname="Pordesch" fullname="U. Pordesch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="August"/>
            <abstract>
              <t indent="0">In many scenarios, users must be able prove the existence and integrity of data, including digitally signed data, in a common and reproducible way over a long and possibly undetermined period of time.  This document specifies the syntax and processing of an Evidence Record, a structure designed to support long-term non-repudiation of existence of data.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4998"/>
          <seriesInfo name="DOI" value="10.17487/RFC4998"/>
        </reference>
        <reference anchor="RFC5055" target="https://www.rfc-editor.org/info/rfc5055" quoteTitle="true" derivedAnchor="RFC5055">
          <front>
            <title>Server-Based Certificate Validation Protocol (SCVP)</title>
            <author initials="T." surname="Freeman" fullname="T. Freeman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Malpani" fullname="A. Malpani">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Cooper" fullname="D. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Polk" fullname="W. Polk">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="December"/>
            <abstract>
              <t indent="0">The Server-Based Certificate Validation Protocol (SCVP) allows a client to delegate certification path construction and certification path validation to a server.  The path construction or validation (e.g., making sure that none of the certificates in the path are revoked) is performed according to a validation policy, which contains one or more trust anchors.  It allows simplification of client implementations and use of a set of predefined validation policies.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5055"/>
          <seriesInfo name="DOI" value="10.17487/RFC5055"/>
        </reference>
        <reference anchor="RFC5276" target="https://www.rfc-editor.org/info/rfc5276" quoteTitle="true" derivedAnchor="RFC5276">
          <front>
            <title>Using the Server-Based Certificate Validation Protocol (SCVP) to Convey Long-Term Evidence Records</title>
            <author initials="C." surname="Wallace" fullname="C. Wallace">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="August"/>
            <abstract>
              <t indent="0">The Server-based Certificate Validation Protocol (SCVP) defines an extensible means of delegating the development and validation of certification paths to a server.  It can be used to support the development and validation of certification paths well after the expiration of the certificates in the path by specifying a time of interest in the past.  The Evidence Record Syntax (ERS) defines structures, called evidence records, to support the non-repudiation of the existence of data.  Evidence records can be used to preserve materials that comprise a certification path such that trust in the certificates can be established after the expiration of the certificates in the path and after the cryptographic algorithms used to sign the certificates in the path are no longer secure.  This document describes usage of the SCVP WantBack feature to convey evidence records, enabling SCVP responders to provide preservation evidence for certificates and certificate revocation lists (CRLs).   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5276"/>
          <seriesInfo name="DOI" value="10.17487/RFC5276"/>
        </reference>
        <reference anchor="RFC5911" target="https://www.rfc-editor.org/info/rfc5911" quoteTitle="true" derivedAnchor="RFC5911">
          <front>
            <title>New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME</title>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t indent="0">The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1.  There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5911"/>
          <seriesInfo name="DOI" value="10.17487/RFC5911"/>
        </reference>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912" quoteTitle="true" derivedAnchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t indent="0">The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268" quoteTitle="true" derivedAnchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="July"/>
            <abstract>
              <t indent="0">The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
      </references>
      <references pn="section-6.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en" quoteTitle="true" derivedAnchor="OLD-ASN1">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization showOnFrontPage="true">CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="R." surname="Housley" fullname="Russ Housley">
        <organization abbrev="Vigil Security" showOnFrontPage="true">Vigil Security, LLC</organization>
        <address>
          <postal>
            <street>516 Dranesville Road</street>
            <city>Herndon</city>
            <region>VA</region>
            <code>20170</code>
            <country>USA</country>
          </postal>
          <email>housley@vigilsec.com</email>
        </address>
      </author>
      <author initials="C." surname="Wallace" fullname="Carl Wallace">
        <organization abbrev="Red Hound Software" showOnFrontPage="true">Red Hound Software, Inc.</organization>
        <address>
          <postal>
            <street>5112 27th St. N</street>
            <city>Arlington</city>
            <region>VA</region>
            <code>22207</code>
            <country>USA</country>
          </postal>
          <email>carl@redhoundsoftware.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
