<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-lamps-x509-pq-commit-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQCHC">X.509 Extensions for PQC or Composite Certificate Hosting Continuity</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-lamps-x509-pq-commit-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <postal>
          <street>7 HaPsagot St.</street>
          <city>Petah Tikva</city>
          <country>Israel</country>
        </postal>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="25"/>
    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 82?>

<t>This document specifies a new X.509 certificate extension, Post-Quantum or Composite Hosting Continuity (PQCHC), which enables a certificate subject to signal a intent to continue serving PQC or composite certificates for a defined continuity period after certificate expiration. This extension helps relying parties detect downgrade and man-in-the-middle (MitM) attacks during transition phases, where a cryptographically relevant quantum computer (CRQC) would make traditional certificates insecure.</t>
    </abstract>
  </front>
  <middle>
    <?line 86?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to post-quantum cryptography (PQC) will not happen
instantly. During the transition, servers are expected to host both
traditional and PQC or composite certificates. This dual-hosting
strategy ensures that services remain reachable by legacy clients that
do not yet support PQC while also providing PQ or PQ/T authentication
to updated clients. The decision to continue offering traditional
certificates often depends on the size of the installed legacy base,
the larger the base, the stronger the incentive to maintain
traditional certificate support for accessibility. Relevant work on
PQC certificates includes <xref target="I-D.ietf-lamps-dilithium-certificates"/>
for ML-DSA and <xref target="I-D.ietf-lamps-x509-slhdsa"/> for SLH-DSA and
<xref target="I-D.ietf-lamps-pq-composite-sigs"/> for composite certificates.</t>
      <t>However, the continued use of traditional certificates becomes
untenable once a cryptographically relevant quantum computer (CRQC) is
known to exist. A publicly available CRQC would render classical
public-key algorithms insecure, forcing server operators to revoke
traditional certificates immediately, even if this disrupts access for
legacy clients. In practice, though, the availability of a CRQC may
not be disclosed. Like a zero-day vulnerability, an adversary could
secretly use a CRQC to compromise traditional certificates without
alerting the wider ecosystem. In such a scenario, an attacker could
suppress PQC or composite certificates and present only traditional
ones to targeted clients, enabling an active MitM attack and giving the
attacker full control over the encrypted session. Relying parties need a
way to detect when a server that claims to support PQC or composite
certificates suddenly offers only traditional credentials.</t>
      <t>This document specifies a new X.509 certificate extension,
Post-Quantum/Composite Hosting Continuity (PQCHC), which enables a
certificate subject and its Certification Authority (CA) to assert an
intent to continue serving PQC or composite credentials for a
defined period beyond the nominal expiration of a certificate. This
extension provides an operational signal that helps relying parties
identify inconsistencies, for example, when a PQC-capable server
unexpectedly stops advertising PQC or composite certificates and to take
appropriate action to mitigate downgrade attacks.</t>
      <t>The PQCHC extension is protocol-agnostic and applies to any PKI-based
authentication context where a subject wishes to indicate continued
availability of PQC or composite credentials to relying parties.</t>
      <t>The PQCHC extension does not change certificate validation semantics
and does not extend a certificate's validity period. Instead, it
provides an informational assurance of server behavior to help relying
parties make security decisions during the transition to PQC.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="x509-certificate-extension">
      <name>X.509 Certificate Extension</name>
      <t>This section specifies the syntax and semantics of the PQC or composite
Hosting Continuity (PQCHC) extension for X.509 public key
certificates. This extension provides an informational assertion, made
by the certificate subject, regarding the continued availability of pure PQC or
composite credentials beyond the expiration date of the certificate
that contains the extension.</t>
      <section anchor="extension-overview">
        <name>Extension Overview</name>
        <t>The PQCHC extension is an optional, non-critical X.509 certificate
extension. When present, it indicates that the subject intends to
continue deploying and presenting valid PQC or composite certificates
both during the certificate’s validity period and for the declared
"continuityPeriod" after the certificate’s "notAfter" date.
This extension does not extend the certificate’s validity period and
does not modify path validation procedures as defined in <xref target="RFC5280"/>.</t>
        <t>The extension allows relying parties to detect inconsistencies during
the PQC migration phase. For example, if a server previously declared
an intent to keep its PQC certificate available for 12 months after
expiry but suddenly presents only a traditional certificate, a relying
party can infer potential misbehavior or active suppression of PQC
credentials.</t>
      </section>
      <section anchor="pqchc-ext">
        <name>PQCHC Certificate Extension Definition</name>
        <t>The PQCHC certificate extension <bcp14>MAY</bcp14> be included in public key
certificates <xref target="RFC5280"/>. The PQCHC certificate extension <bcp14>MUST</bcp14> be
identified by the following object identifier (OID):</t>
        <sourcecode type="asn.1"><![CDATA[
id-pe-pqchc OBJECT IDENTIFIER ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-pe(1) TBD2
}
]]></sourcecode>
        <t>The extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <sourcecode type="asn.1"><![CDATA[
PQCHC ::= SEQUENCE {
continuityPeriod INTEGER (0..MAX),
policyURI IA5String OPTIONAL
}
]]></sourcecode>
        <t>The extension value is an ASN.1 SEQUENCE containing:</t>
        <ul spacing="compact">
          <li>
            <t>continuityPeriod : an INTEGER (measured in days) indicating the number
of days after the certificate’s "notAfter" date that the subject intends
to continue presenting valid PQC/composite certificates. A value of zero explicitly
indicates that no intent exists beyond the certificate’s expiry.</t>
          </li>
          <li>
            <t>policyURI (<bcp14>OPTIONAL</bcp14>): an IA5String containing a URI where the operator publishes additional
information related to PQC deployment, such as migration information.</t>
          </li>
        </ul>
        <t>The extension <bcp14>MUST</bcp14> be marked non-critical so that relying parties that
do not understand it will ignore it, consistent with <xref target="RFC5280"/>
guidance for informational extensions.</t>
      </section>
      <section anchor="certificate-extension-processing">
        <name>Certificate Extension Processing</name>
        <t>When this extension is present:</t>
        <ul spacing="compact">
          <li>
            <t>The certificate subject asserts that the subject’s server(s) will continue
deploying and presenting valid PQC or composite
certificates for at least the indicated continuity period after this
certificate’s expiration.</t>
          </li>
          <li>
            <t>The extension is a CA-signed declaration of the subject's operational intent
and does not create a contractual service-level agreement between the subject
and any relying party. Relying parties <bcp14>MAY</bcp14> use the indicated "continuityPeriod" to
trigger local policy decisions, for example, by monitoring the revocation status
of the declared PQC or composite certificate. If, during the stated period, the
PQC or composite certificate remains unrevoked but is not observed in use, this
may indicate a downgrade and MitM attack.</t>
          </li>
        </ul>
        <t>The extension does not imply that the CA will automatically issue new certificates, nor does it extend the cryptographic validity of an expired certificate. Rather, it signals the server operator's operational intent to maintain PQC or composite credentials in parallel with traditional credentials for the indicated transition period.</t>
        <t>After successful certificate path validation <xref target="RFC5280"/>, a relying party that observes a certificate containing the PQCHC extension can cache the following information:</t>
        <ul spacing="compact">
          <li>
            <t>the server identity (as indicated in the certificate’s SubjectAltName),</t>
          </li>
          <li>
            <t>the PQC or composite algorithm identifier (e.g., an OID such as id-ml-dsa-44 <xref target="I-D.ietf-lamps-dilithium-certificates"/>) associated with the end-entity certificate,</t>
          </li>
          <li>
            <t>the remaining lifetime of the certificate at the time of observation (i.e., the time between observation and the certificate’s "notAfter" date).</t>
          </li>
        </ul>
        <t>The effective continuity window is the sum of the remaining lifetime and the "continuityPeriod". During this window, the relying party can expect the server to present certificates for the same subjectAltName that use the cached PQC or composite algorithm. If, within the effective continuity window, a relying party observes only a traditional certificate while the cached PQC/composite certificate remains unrevoked, the relying party <bcp14>SHOULD</bcp14> treat the behavior as suspicious and terminate the connection. The relying party <bcp14>MAY</bcp14> apply local downgrade-detection policy, which can range from logging or raising an alert, to attempting an alternate network path.</t>
        <t>If the operator changes from one PQC algorithm to another, the cached algorithm identifier will not match. In this case, the relying party <bcp14>MUST</bcp14> start a new continuity period. This also helps detect algorithm upgrades or downgrades (e.g., from ML-DSA-44 to ML-DSA-87).</t>
        <t>Note: PQCHC may also apply to PQC-to-PQC transitions. For example, an operator might switch from ML-DSA to SLH-DSA in response to deployment guidance. The security implications of treating PQC-to-PQC changes as continuity events remain an open question and require further analysis as NIST’s standardization process progresses.</t>
      </section>
    </section>
    <section anchor="applicability-and-deployment-considerations">
      <name>Applicability and Deployment Considerations</name>
      <t>PQCHC is an informational mechanism and not a cryptographic guarantee.
It must be combined with traditional mechanisms such as revocation checking.
Its effectiveness depends on both correct configuration by servers
and correct interpretation by relying parties.</t>
      <t>PQCHC can also appear in certificates used for CRL signing or OCSP response signing to assert that any successor certificate for these roles will use a PQC or composite algorithm. If, within the declared continuity period, a new CRL signing or OCSP responder certificate is issued using only a traditional algorithm, relying parties can interpret this as a potential downgrade.</t>
      <t>PQCHC cannot detect all failure modes. In particular, if a server silently ceases to present PQC or composite certificates without revoking them, relying parties will continue to observe only traditional certificates and have no authoritative indication whether the change was intentional or the result of an attack. In such cases PQCHC can only highlight the inconsistency.</t>
      <t>Operators should choose "continuityPeriod" values that balance the detection benefit against operational flexibility. A "continuityPeriod" that is too short increases the window in which an attacker can cause an undetected downgrade; a "continuityPeriod" that is overly long may unduly constrain the operator's
ability to phase out an algorithm in response to new cryptanalytic evidence.</t>
    </section>
    <section anchor="sec-priv-cons">
      <name>Security Considerations</name>
      <section anchor="certificate-caching-versus-pqchc">
        <name>Certificate Caching Versus PQCHC</name>
        <t>This section compares PQCHC to relying solely on client-side caching of previously observed PQC certificates and describes how PQCHC mitigates downgrade attacks.</t>
        <t>A relying party could, in principle, remember that it previously observed a PQC or composite certificate and enforce that expectation in subsequent connections. However, such caching is limited by certificate expiration: once the cached certificate passes its "notAfter" date, the relying party can no longer rely on it for validation, and any enforced expectation is effectively lost. An attacker who can suppress PQC or composite certificates at that moment could cause a downgrade to traditional certificates without detection.</t>
        <t>The PQCHC extension mitigates this limitation by providing a CA-signed assertion that the subject intends to continue deploying valid PQC or composite certificates for the configured continuityPeriod beyond the certificate’s expiration. Because this assertion is signed by the issuing CA and carried in the certificate, it provides a durable, authenticated basis for relying parties to detect inconsistencies that simple client-side caching cannot address.</t>
      </section>
      <section anchor="downgrade-attack-detection">
        <name>Downgrade attack detection</name>
        <t>The PQCHC certificate extension provides a signal analogous to HTTP
Strict Transport Security (HSTS) mechanism. Once a relying party has
successfully observed a server presenting a PQC or composite certificate
containing the PQCHC extension, it can "pin" the expectation that the
server will continue to offer PQC or composite credentials until the date
indicated by the extension.</t>
        <t>This mechanism helps relying parties detect inconsistent server behavior:</t>
        <ul spacing="compact">
          <li>
            <t>If a PQC or composite certificate carrying PQCHC is expected to remain
valid until a stated date but is revoked early, the change can be
interpreted as a legitimate operational decision by the server
operator.</t>
          </li>
          <li>
            <t>If the certificate remains unrevoked yet is not observed by clients
in subsequent connections, this anomaly may indicate an active
downgrade attack in which a MitM suppresses the PQC or composite
certificate and presents only traditional credentials.</t>
          </li>
        </ul>
      </section>
      <section anchor="bootstrap-limitation">
        <name>Bootstrap limitation</name>
        <t>Like HSTS mechanism, the PQCHC extension cannot provide protection on
the very first connection. If an attacker successfully downgrades that
initial handshake so the client never sees a PQC or composite certificate
with PQCHC, the client will not learn the expected behavior and gains
no additional assurance from this extension.</t>
      </section>
      <section anchor="revocation-check">
        <name>Revocation check</name>
        <t>Because an active MitM can block PQC or composite certificates, relying
parties cannot confirm server behavior solely by observing TLS
handshakes. Certificate revocation remains the most reliable mechanism
for determining when a server has intentionally stopped using a
PQC or composite certificate.</t>
        <t>Revocation can be signaled through CRLs published by CAs, OCSP, Browser
curated revocation lists (e.g., CRLSet), or by relying on short-lived
certificates that naturally expire quickly. During the transition to PQC,
revocation information must remain verifiable by both legacy and upgraded
clients. This requires that CRLs and OCSP responses be signed using both
a traditional algorithm (e.g., RSA or ECDSA) for compatibility with legacy
clients, and a PQC or composite algorithm for protection against CRQC
adversaries. Legacy clients will continue to validate the traditional
signature, while PQ-aware clients <bcp14>MUST</bcp14> verify the PQC or composite
signature to ensure that revocation signaling itself cannot be forged.</t>
        <t>Curated browser/OS revocation lists can provide emergency coverage but
generally do not cover all domains, limiting their completeness. OCSP
stapling is also insufficient in this setting, since although an OCSP
response itself provides freshness, stapling relies on the server to
deliver that response and cannot guarantee that PQC certificates are
included when a CRQC-capable adversary acts as a MitM and suppresses them.</t>
        <t>The PQCHC extension provides an informational signal that can support
policy decisions, monitoring, and detection of possible
downgrades. However, it is not a cryptographic proof of server
behavior, and relying parties must continue to perform revocation
checks to verify certificate validity. When inconsistencies are
detected, relying parties may apply fallback mechanisms such as
attempting connection through a different network interface or a VPN
tunnel to help distinguish between genuine server changes and MitM
downgrade attack.</t>
        <t>A PQC certificate may be revoked for legitimate reasons such as key
compromise, operational error, or migration to a new CA.
An operator using the PQCHC facility <bcp14>SHOULD</bcp14> obtain and serve a new PQC
certificate for the remainder of the declared continuity period. This enables
relying parties to continue to observe PQC
credentials without requiring real-time revocation checking to
distinguish legitimate operator actions from active downgrade attacks.
In addition, this simplifies PQCHC by focusing on continuity of
PQC credential availability rather than revocation mechanisms.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Relying parties need to perform certificate revocation checks to
determine whether the PQC or composite certificate has been intentionally
withdrawn by the server. Revocation mechanisms such as Online
Certificate Status Protocol (OCSP) queries to the CA can expose which
servers a client is contacting, leading to privacy leaks. To mitigate
this, revocation checking can be performed using privacy-preserving
techniques such as Oblivious HTTP (OHAI) <xref target="RFC9458"/>, where queries
are relayed through intermediaries in a way that hides the client
identity from the CA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>For the certificate extension in <xref target="pqchc-ext"/>, IANA is requested to
assign an object identifier (OID) for the extension (TBD2) with a
Description of "id-pe-pqchc". The OID for the extension should be
allocated in the "SMI Security for PKIX Certificate Extension"
registry (1.3.6.1.5.5.7.1).</t>
      <t>For the ASN.1 module in <xref target="pqchc-ansi"/> , IANA is requested to
assign an object identifier (OID) for the module identifier (TBD1)
with a Description of "id-mod-pqchc". The OID for the module should be
allocated in the "SMI Security for PKIX Module Identifier" registry
(1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Mike Ounsworth for the discussion, review and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="X680" target="https://www.itu.int/rec/T-REC-X.680">
        <front>
          <title>Information Technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.680"/>
        <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
      </reference>
      <reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
        <front>
          <title>Information Technology -- Abstract Syntax Notation One (ASN.1): ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.690"/>
        <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-dilithium-certificates">
        <front>
          <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
          <author fullname="Jake Massimo" initials="J." surname="Massimo">
            <organization>AWS</organization>
          </author>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="30" month="September" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-x509-slhdsa">
        <front>
          <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
          <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
            <organization>BSI</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
            <organization>genua GmbH</organization>
          </author>
          <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
            <organization>CryptoNext Security</organization>
          </author>
          <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
            <organization>BSI</organization>
          </author>
          <date day="30" month="June" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
        <front>
          <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="John Gray" initials="J." surname="Gray">
            <organization>Entrust Limited</organization>
          </author>
          <author fullname="Massimiliano Pala" initials="M." surname="Pala">
            <organization>OpenCA Labs</organization>
          </author>
          <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
            <organization>Bundesdruckerei GmbH</organization>
          </author>
          <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
            <organization>Cisco Systems</organization>
          </author>
          <date day="24" month="February" year="2026"/>
          <abstract>
            <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-15"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC9458">
        <front>
          <title>Oblivious HTTP</title>
          <author fullname="M. Thomson" initials="M." surname="Thomson"/>
          <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
          <date month="January" year="2024"/>
          <abstract>
            <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9458"/>
        <seriesInfo name="DOI" value="10.17487/RFC9458"/>
      </reference>
    </references>
    <?line 383?>

<section anchor="pqchc-ansi">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X680"/> and <xref target="X690"/>.</t>
      <sourcecode markers="true"><![CDATA[
PQCHC-Module-2026
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pqchc (TBD1) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
    FROM PKIX-CommonTypes-2009  -- in RFC 5912
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-mod(0)
        id-mod-pkixCommon-02(57) } ;

-- PKIX OID base arc and extension arc
id-pkix OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) }

id-pe OBJECT IDENTIFIER ::= { id-pkix 1 }

-- PQCHC extension
id-pe-pqchc OBJECT IDENTIFIER ::= { id-pe TBD2 }

PQCHC ::= SEQUENCE {
  continuityPeriod INTEGER (0..MAX),
    -- number of days beyond certificate notAfter
    -- a value of 0 indicates no post-expiry intent
  policyURI IA5String OPTIONAL
}

ext-PQCHC EXTENSION ::= {
  SYNTAX PQCHC
  IDENTIFIED BY id-pe-pqchc
}
   
END
]]></sourcecode>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
