X.509 Warranty Certificate Extension 4059 Справочная информация по SSL сертификатам Украина купить сертификат 

Официальные документы RFC для сертификатов
технические требования, спецификации и стандарты

Контакты
☎ +380672576220

Проверка
SSL
Установка
SSL
Цепочка
SSL
Seal
SSL
CSR
pKey
Экспорт-Импорт
Конвертер
Code Sign
сертификаты
Email Smime
сертификаты
PDF и Word
сертификаты
База
знаний
Купить
SSL

Обзор требований стандарта сертификатов x.509Стандарт x.509
Документы RFC
rfc765 протокол ФТП
rfc854 протокол ТЕЛНЕТ
rfc1035 доменные имена
rfc1321 алгоритм MD5
rfc1945 протокол HTTP/1.0
rfc2119 ключевые слова
rfc2246 TLS протокол v.1.0
rfc2246* TLS протокол v.1 new
rfc2437 спецификация RSA 2.0
rfc2459 x.509 профиль CRL
rfc2511 x.509 форма запроса
rfc2527 x.509 принципы
rfc2549 стандарт IP
rfc2560 x.509 - OCSP
rfc2585 x.509 FTP HTTP
rfc2616 протокол HTTP / 1.1
rfc2822 формат email
rfc2986 Спецификация CSR
rfc3029 x.509 протокол данных
rfc3161 x.509 метка времени
rfc3279 x.509 профиль CRL
rfc3280 x.509 профиль CRL*
rfc3281 атрибуты сертификата
rfc3443 процесс TTL
rfc3447 спецификация RSA 2.1
rfc3546 расширения TLS
rfc3597 обработка DNS RR
rfc3647 x.509 полис*
rfc3709 x.509 логотипы
rfc3739 x.509 профиль*
rfc3779 x.509 IP и AS
rfc4043 x.509 идентификатор
rfc4051 XML URI
rfc4055 x.509 RSA
rfc4059 x.509 гарантии
rfc4158 x.509 цепь доверия
rfc4210 x.509 протокол CMP
rfc4211 x.509 запрос*
rfc4212 x.509 CRMF PKIX
rfc4262 x.509 s/mime
rfc4325 x.509 профиль CRL**
rfc4346 TLS протокол v.1.1
rfc4366 TLS протокол v.1.1*
rfc4523 x.509 протокол LDAP
rfc5019 SMTP для особых сред
rfc5070 Обмена данными
rfc5246 TLS протокол 1.2
rfc5280 x.509 профиль CRL
rfc5480 ECC криптография
rfc5698 DSSC структура
rfc5741 RFC информация
rfc5750 s/mime v.3.2
rfc6066 TLS протокол
rfc6101 SSL протокол v.3.0
rfc6394 DNS DANE
rfc6454 Концепция Web Origin
rfc6455 WebSocket протокол
rfc6520 DTLS расширения TLS
rfc6546 RID HTTP/TLS
rfc6698 TLSA и DNS DANE
rfc6797 HSTS протокол
rfc6844 CAA DNS записи
rfc6960 OCSP статус
rfc6962 Прозрачность
rfc7489 DMARC
rfc8446 TLS 1.3

x.509 Инфраструктура открытого ключа Гарантийное расширение сертификата


Статус этой заметки

    Эта записка предоставляет информацию для интернет-сообщества. Оно делает
    не указывать какой-либо интернет-стандарт. Распределение этого
    Памятка не ограничена.

Абстрактные

    В этом документе описывается расширение сертификата, чтобы явно указать
    гарантия, предоставляемая центром сертификации (CA) для
    сертификат, содержащий расширение.

=====================================

Network Working Group                                     D. Linsenbardt
Request for Comments: 4059                                    S. Pontius
Category: Informational                                      A. Sturgeon
                                                                  SPYRUS
                                                                May 2005

                Internet X.509 Public Key Infrastructure
                     Warranty Certificate Extension

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document describes a certificate extension to explicitly state
   the warranty offered by a Certificate Authority (CA) for the
   certificate containing the extension.

1.  Introduction

   The warranty certificate extension identifies the warranty policy
   associated with a X.509 public key certificate [X.509-97, PROFILE].
   Often the Certificate Authority (CA) will obtain an insurance policy
   to ensure coverage of the warranty.

   The certificate warranty provides an extended monetary coverage for
   the end entities.  The certificate warranty primarily concerns the
   use, storage, and reliance on a certificate by a subscriber, a
   relying party, and the CA.  It is common for a CA to establish
   reliance limits on the use of a certificate.  It is not uncommon for
   a CA to attempt through contractual means to exclude its liability
   entirely.  However, this undermines the confidence that commerce
   requires to gainfully use certificates.

   Alternatively a CA may provide extended coverage for the use of the
   certificate.  Usually, the subscriber pays for the extended warranty
   coverage.  In turn, subscribers are covered by an appropriately
   drafted insurance policy.  The certificate warranty is backed by an
   insurance policy issued by a licensed insurance company, which
   results in a financial backing that is far greater than that of the




Linsenbardt, et al.          Informational                      [Page 1]

RFC 4059             Warranty Certificate Extension             May 2005


   CA.  This extra financial backing provides a further element of
   confidence necessary to encourage the use of certificates in
   commerce.

   A relying party that has a warranty from a CA may obtain compensation
   from a CA depending on the conditions for such compensation expressed
   in either the CA's Certificate Policy, the CA's insurance policy, or
   both.  Evidence of an extended warranty, provided through the
   certificate extension, will give the relying party additional
   confidence that compensation is possible, and therefore will enhance
   trust in the process.  Risk for a non-subscriber relying party may be
   reduced by the presence of a warranty extension with an explicit
   warranty stated.  The warranty extension allows this aspect of risk
   management to be automated.

   When a certificate contains a warranty certificate extension, the
   extension MUST be non-critical, and MUST contain either a NULL to
   indicate that no warranty is provided or base warranty data to
   indicate that a warranty is provided.  The extension MAY contain
   optional qualifiers.

1.1.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  Warranty Extension Format

   Like all X.509 certificate extensions, the warranty certificate
   extension is defined using ASN.1 [X.208-88, X.209-88].

   The non-critical warranty extension is identified by id-pe-warranty.

   PKIX Object Identifier Registry
   id-pkix OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
              dod(6) internet(1) security(5) mechanisms(5) pkix(7) }

   PKIX Arcs
   id-mod  OBJECT IDENTIFIER ::= { id-pkix 0 }    -- modules
   id-pe   OBJECT IDENTIFIER ::= { id-pkix 1 }    -- private
   certificate extensions

   PKIX modules
   id-mod-warranty-extn         OBJECT IDENTIFIER ::= { id-mod 27 }

   id-pe-warranty OBJECT IDENTIFIER  ::=  { id-pe 16 }




Linsenbardt, et al.          Informational                      [Page 2]

RFC 4059             Warranty Certificate Extension             May 2005


   A non-null warranty always includes a base warranty.  The warranty
   information includes the period during which the warranty applies, a
   warranty value, and a warranty type.  The warranty type tells the
   warranty limit against claims.  The extension definition supports two
   alternatives: aggregated and per-transaction.  With aggregation,
   claims are fulfilled until a ceiling value is reached.  After that,
   no further claims are fulfilled.  With per-transaction, a ceiling
   value is imposed on each claim, but each transaction is considered
   independently.

   The warranty extension permits inclusion of two optional warranty
   qualifiers.  The first qualifier provides extended warranty
   information, the second provides a pointer to the warranty terms and
   conditions.

   When present, the extended warranty information provides information
   about coverage beyond the scope of the base warranty.  Like the base
   warranty information, the extended warranty information includes the
   period during which the warranty applies, a warranty value, and a
   warranty type.

   When present, the terms and conditions pointer provides a reference
   to a document containing the terms and conditions associated with the
   warranty.  The document may be a Certificate Policy that contains
   this information, a document specifically about the warranty, or a
   Relying Party Agreement.  The pointer is always a uniform resource
   locator (URL).  The URL MUST be a non-relative URL using the http
   scheme.  The URL MUST follow the URL syntax and encoding rules
   specified in RFC 3986 [URI].

2.1.  Warranty Extension Syntax

   The syntax for the warranty extension is:

   Warranty  ::=  CHOICE  {
     none                 NULL,            -- No warranty provided
     wData                WarrantyData  }  -- Explicit warranty

   WarrantyData  ::=  SEQUENCE  {
     base                 WarrantyInfo,
     extended             WarrantyInfo OPTIONAL,
     tcURL                TermsAndConditionsURL OPTIONAL  }

   WarrantyInfo  ::=  SEQUENCE  {
     validity             WarrantyValidityPeriod,
     amount               CurrencyAmount,
     wType                WarrantyType  }




Linsenbardt, et al.          Informational                      [Page 3]

RFC 4059             Warranty Certificate Extension             May 2005


   WarrantyValidityPeriod  ::=  CHOICE  {
     sameAsCertificate    NULL,
     explicitPeriod       ValidityPeriod  }

   ValidityPeriod  ::=  SEQUENCE  {
     notBefore            GeneralizedTime,
     notAfter             GeneralizedTime  }

   -- CurrencyAmount specifies the currency and a monetary value.
   -- Currency codes are defined in [ISO4217].  The monetary value
   -- is: amount / (10 ** amtExp10), and the exponent MUST be the
   -- minor unit of currency specified in [ISO4217].

   CurrencyAmount  ::=  SEQUENCE  {
     currency             INTEGER (1..999),
     amount               INTEGER (0..MAX),
     amtExp10             INTEGER (0..MAX)  }

   WarrantyType  ::=  INTEGER  {
     aggregated           (0),
     perTransaction       (1)  }

   TermsAndConditionsURL  ::=  IA5String  -- MUST use http scheme

2.2.  Warranty Extension Semantics

   Warranty is a CHOICE; it is represented either by NULL or
   WarrantyData.  If the CA selects NULL, then the CA is explicitly
   stating that no warranty is provided.  If the CA selects
   WarrantyData, then the CA is explicitly stating that a warranty is
   provided, and the fields within the WarrantyData type MUST provide
   details about that warranty.

   WarrantyData MUST contain information about the base warranty.
   WarrantyData MAY contain information about an extended warranty.
   Both base warranty and extended warranty information is provided
   using the WarrantyInfo type.  WarrantyData MAY contain a URL that
   points to the terms and conditions of the warranty.  The URL is
   provided using the TermsAndConditionsURL type, which is an IA5
   string.  The IA5String MUST contain a URI [URI] using the http
   scheme, such as "http://www.example.com/warranty/t_and_c.html".

   WarrantyInfo MUST contain the warranty validity period, the currency
   amount of the warranty, and the type of warranty.  The warranty
   validity period is provided using the WarrantyValidityPeriod type.
   The currency amount of the warranty is provided using the
   CurrencyAmount type.  The type of warranty is provided using the
   WarrantyType type.



Linsenbardt, et al.          Informational                      [Page 4]

RFC 4059             Warranty Certificate Extension             May 2005


   WarrantyValidityPeriod is a CHOICE; it is represented either by NULL
   or ValidityPeriod.  If the CA selects NULL, then the validity periods
   of the warranty and the certificate MUST be exactly the same.  If the
   CA selects ValidityPeriod, then the CA is explicitly stating a
   warranty validity period that is different than the validity period
   of the certificate.  If the validity periods of the warranty and the
   certificate are the same, then the CA MUST select the NULL choice.
   The validity periods are expected to be the same in the vast majority
   of the cases.  ValidityPeriod is a SEQUENCE of two GeneralizedTime
   values.  The first (notBefore) GeneralizedTime value MUST indicate
   the date and time that the warranty becomes valid, and the second
   (notAfter) GeneralizedTime value MUST indicate the date and time that
   the warranty expires.

   CurrencyAmount is a SEQUENCE of three integers which together specify
   the currency and a monetary value.  The first integer (currency) MUST
   indicate the currency using one of the currency codes defined in
   [ISO4217].  The second integer (amount) MUST indicate the value of
   the warranty.  The third integer (amtExp10) MUST indicate the correct
   placement of the decimal point in the monetary value, and MUST be the
   minor unit of currency specified in [ISO4217].  For example
   $48,525.50 (in US dollars) is represented as:

      currency =      840
      amount   =  4852550
      amtExp10 =        2

   WarrantyType is an integer.  A value of zero indicates that claims
   against the warranty will be aggregated, and once the value of
   fulfilled claims reaches the warranty currency amount, then no
   further claim will be fulfilled.  A value of one indicates that each
   claim is handled independently, but no individual claim can exceed
   the warranty currency amount.  The CA MUST select either zero or one
   for this integer value.

3.  Security Considerations

   The procedures and practices employed by the CA MUST ensure that the
   correct values for the warranty are inserted in each issued
   certificate.  Relying parties and users may accept or reject a
   particular certificate for an intended use based on the information
   provided in warranty extension.  Incorrect representation of the
   actual warranty may result in otherwise avoidable warranty claims for
   the CA.







Linsenbardt, et al.          Informational                      [Page 5]

RFC 4059             Warranty Certificate Extension             May 2005


4.  IANA Considerations

   Certificate extensions and extended key usage values are identified
   by object identifiers (OIDs).  The OIDs used in this document are
   derived from X.509 [X.509-97].  No further action by the IANA is
   necessary for this document or any anticipated updates.

5.  ASN.1 Module

   WarrantyExtn
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-warranty-extn(27) }

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN


   -- OID Arcs

   id-pe  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) 1 }

   -- Warranty Extension

   id-pe-warranty-extn  OBJECT IDENTIFIER  ::=  { id-pe 16 }

   Warranty ::= CHOICE  {
       none                 NULL,            -- No warranty provided
       wData                WarrantyData  }  -- Explicit warranty

   WarrantyData ::= SEQUENCE  {
       base                 WarrantyInfo,
       extended             WarrantyInfo OPTIONAL,
       tcURL                TermsAndConditionsURL OPTIONAL  }

   WarrantyInfo ::= SEQUENCE  {
       validity             WarrantyValidityPeriod,
       amount               CurrencyAmount,
       wType                WarrantyType  }

   WarrantyValidityPeriod ::= CHOICE  {
       sameAsCertificate    NULL,
       explicitPeriod       ValidityPeriod  }






Linsenbardt, et al.          Informational                      [Page 6]

RFC 4059             Warranty Certificate Extension             May 2005


   ValidityPeriod ::= SEQUENCE  {
       notBefore            GeneralizedTime,
       notAfter             GeneralizedTime  }

   -- CurrencyAmount specifies the currency and a monetary value.
   -- Currency codes are defined in [ISO4217].  The monetary value
   -- is: amount / (10 ** amtExp10), and the exponent MUST be the
   -- minor unit of currency specified in [ISO4217].

   CurrencyAmount ::= SEQUENCE  {
       currency             INTEGER (1..999),
       amount               INTEGER (0..MAX),
       amtExp10             INTEGER (0..MAX)  }

   WarrantyType ::= INTEGER {
       aggregated           (0),
       perTransaction       (1)  }

   TermsAndConditionsURL ::= IA5String

   END

6.  Normative References

   [ISO4217]   ISO. "Codes for the Representation of Currencies and
               Funds", ISO 4217. 1995.

   [PROFILE]   Housley, R., Ford, W., Polk, W., and D. Solo, "Internet
               X.509 Public Key Infrastructure Certificate and CRL
               Profile", RFC 2459, January 1999.

   [URI]       Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
               Resource Identifier (URI): Generic Syntax", STD 66, RFC
               3986, January 2005.

   [X.208-88]  CCITT.  Recommendation X.208: Specification of Abstract
               Syntax Notation One (ASN.1).  1988.

   [X.209-88]  CCITT.  Recommendation X.209: Specification of Basic
               Encoding Rules for Abstract Syntax Notation One (ASN.1).
               1988.

7. Informative References

   [X.509-97]  ITU-T.  Recommendation X.509: The Directory-
               Authentication Framework.  1997.





Linsenbardt, et al.          Informational                      [Page 7]

RFC 4059             Warranty Certificate Extension             May 2005


Acknowledgements

   This document was developed with the expertise and support of Russ
   Housley, Vigil Security LLC, and Dr. Adrian McCullagh, Freehills
   Australia.

Authors' Addresses

   Duane Linsenbardt
   SPYRUS
   2355 Oakland Road
   Suite 1
   San Jose CA 95131
   USA

   EMail: dlinsenbardt@spyrus.com


   Sue Pontius
   SPYRUS
   2355 Oakland Road
   Suite 1
   San Jose CA 95131
   USA

   EMail: spontius@spyrus.com


   Alice Sturgeon
   SPYRUS
   Suite 1502, 222 Queen St.,
   Ottawa ON K0A 2T0
   Canada

   EMail: asturgeon@spyrus.com
















Linsenbardt, et al.          Informational                      [Page 8]

RFC 4059             Warranty Certificate Extension             May 2005


Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







Linsenbardt, et al.          Informational                      [Page 9]




 DV SSL OV Сертификаты подтверждающие только Домен OV SSL OV Сертификаты подтверждающие Домен и Организацию EV SSL EV Зеленые усиленные сертификаты с указанием названия Организации подтверждают Домен и Организацию WC SSL wildcard Сертификаты защищающие все субдомены. Класс DV OV и EV SAN SSL SAN Мульти доменные  сертификаты защищающие несколько FQDN Доменов. Класс DV OV и EV PRO SSL SGC PRO сертификаты с технологией  Server Gated Cryptography. Класс  OV и EV CodeSign Сертификаты для подписи приложений и програмного кода MS, Java. Класс  OV и EV Email Сертификаты для подписи емаил smime. Класс  DV OV PDF Сертификаты для подписи документов PDF. Класс  OV PV Wi-Fi Сертификаты DigiCert для IoT и Wi Fi IoT Сертификаты DigiCert для IIoT ALL Все сертификаты DigiCert Familie: thawte, GeoTrust, DigiCert Купить сертификат

NO russia - мы не осблуживаем резидентов из россии Copyright © 1997-2024 adgrafics