2005
DOI: 10.17487/rfc4262
|View full text |Cite
|
Sign up to set email alerts
|

X.509 Certificate Extension for Secure/Multipurpose Internet Mail Extensions (S/MIME) Capabilities

Abstract: This document defines a certificate extension for inclusion of Secure/Multipurpose Internet Mail Extensions (S/MIME) Capabilities in X.509 public key certificates, as defined by RFC 3280. This certificate extension provides an optional method to indicate the cryptographic capabilities of an entity as a complement to the S/MIME Capabilities signed attribute in S/MIME messages according to RFC 3851.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…If the server is configured with an ECDSA signature certificate, either curve P-256 or curve P-384 should be used for the public key in the certificate. 12 TLS servers shall be configured with certificates issued by a CA that publishes revocation information in Online Certificate Status Protocol (OCSP) [63] responses. The CA may additionally publish revocation information in a certificate revocation list (CRL) [19].…”
Section: Server Keys and Certificatesmentioning
confidence: 99%
See 1 more Smart Citation
“…If the server is configured with an ECDSA signature certificate, either curve P-256 or curve P-384 should be used for the public key in the certificate. 12 TLS servers shall be configured with certificates issued by a CA that publishes revocation information in Online Certificate Status Protocol (OCSP) [63] responses. The CA may additionally publish revocation information in a certificate revocation list (CRL) [19].…”
Section: Server Keys and Certificatesmentioning
confidence: 99%
“…In addition, the revocation status of each certificate in the certification path shall be validated using the Online Certificate Status Protocol (OCSP) or a certificate revocation list (CRL). OCSP checking shall be in compliance with RFC 6960 [63]. 26 The CertificateVerify handshake message is sent to explicitly verify a client certificate that has a signing capability.…”
Section: Path Validationmentioning
confidence: 99%
“…S/MIME MUAs conforming to this specification MUST be able to interpret any S/MIME capabilities (defined in [RFC4262]) in any certificates that it receives through SMIMEA records.…”
Section: Email Address Variants and Internationalization Considerationsmentioning
confidence: 99%
“…When placed in an S/MIME message [SMIME-MSG] or in a certificate [RFC4262], it is always placed in a sequence of capabilities. This means that one could place the identifier for RSASSA-PSS in the sequence along with the identifier for MD5, SHA-1, and SHA-256.…”
Section: Rsassa-pss Signature Algorithm Capabilitymentioning
confidence: 99%