diff --git a/docs/release-notes.html b/docs/release-notes.html
index bdcddbd8c..46179c156 100644
--- a/docs/release-notes.html
+++ b/docs/release-notes.html
@@ -145,6 +145,22 @@
Version 7.0.0
if necessary.
+
+
+ Updated the documentation to include the latest revisions of
+ draft-ietf-kitten-scram-2fa, draft-melnikov-scram-bis,
+ draft-melnikov-scram-sha-512, and draft-melnikov-scram-sha3-512 in the set of
+ LDAP-related specifications.
+
+
+
+
+ Updated the documentation to include draft-coretta-oiddir-radit,
+ draft-coretta-oiddir-radsa, draft-coretta-oiddir-radua,
+ draft-coretta-oiddir-roadmap, and draft-coretta-oiddir-schema in the set of
+ LDAP-related specifications.
+
+
diff --git a/docs/specs/draft-coretta-oiddir-radit-00.txt b/docs/specs/draft-coretta-oiddir-radit-00.txt
new file mode 100644
index 000000000..71cd282d3
--- /dev/null
+++ b/docs/specs/draft-coretta-oiddir-radit-00.txt
@@ -0,0 +1,2205 @@
+
+
+RADIT J. Coretta
+Internet-Draft February 29, 2024
+Intended status: Experimental
+Obsoletes: X660LDAP
+Expires: August 27, 2024
+
+
+ The OID Directory: The RA DIT
+ draft-coretta-oiddir-radit-00.txt
+
+Abstract
+
+ In service to the "OID Directory" ID series, this ID covers design
+ strategies and requirements relating to the Registration Authority
+ Directory Information Tree.
+
+ See the RADIR ID for a complete draft series manifest.
+
+Status of This Memo
+
+ This Internet-Draft is submitted in full conformance with the
+ provisions of BCP 78 and BCP 79.
+
+ Internet-Drafts are working documents of the Internet Engineering
+ Task Force (IETF). Note that other groups may also distribute
+ working documents as Internet-Drafts. The list of current Internet-
+ Drafts is at https://datatracker.ietf.org/drafts/current/.
+
+ Internet-Drafts are draft documents valid for a maximum of six months
+ and may be updated, replaced, or obsoleted by other documents at any
+ time. It is inappropriate to use Internet-Drafts as reference
+ material or to cite them other than as "work in progress."
+
+ This Internet-Draft will expire on August 27, 2024.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 1]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Conventions ................................................2
+ 1.2. Acronyms Used ..............................................3
+ 1.2.1. Definitions ...........................................3
+ 1.3. Intended Audience ..........................................3
+ 1.4. Allocations ................................................3
+ 2. Assessments .....................................................3
+ 2.1. Schema Availability ........................................4
+ 2.2. Spectral Coverage ..........................................4
+ 2.3. Content Capacity and Location ..............................5
+ 2.4. User Base ..................................................5
+ 2.5. Class and Attribute Usage ..................................5
+ 2.6. Content Sourcing ...........................................6
+ 3. The RA DIT ......................................................6
+ 3.1. Directory Models ...........................................7
+ 3.1.1. Choosing the Appropriate Model ........................7
+ 3.1.2. The Two Dimensional Model .............................7
+ 3.1.3. The Three Dimensional Model ...........................9
+ 3.2. Entry Content ..............................................9
+ 3.2.1. Registrants ..........................................10
+ 3.2.2. Registrations ........................................13
+ 3.2.3. Value Forms ..........................................23
+ 3.2.4. Special Attributes ...................................25
+ 4. IANA Considerations ............................................36
+ 5. Security Considerations ........................................36
+ 5.1. Access Control ............................................36
+ 5.2. Creation and Modification Identities ......................36
+ 6. References .....................................................36
+ 6.1. Normative References ......................................36
+ 6.2. Informative References ....................................37
+ Author's Address ..................................................38
+
+1. Introduction
+
+ The X.500 Directory Information Tree is an abstract data structure
+ comprised of hierarchical contexts called entries. Each entry bears
+ an unambiguous reference -- a distinguished name -- to its location
+ within the structure.
+
+ Within the terms of this ID series, this structure represents -- or
+ houses -- an information base of OID registrations and registrants
+ in the context of ITU-T Recommendations X.660 and X.680, et al.
+
+1.1. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
+ and "OPTIONAL" in this document are to be interpreted as described
+ in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in
+ all capitals, as shown here.
+
+Coretta Expires August 27, 2024 [Page 2]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+1.2. Acronyms Used
+
+ See Section 1.3 of the RADIR ID for all acronym references.
+
+1.2.1. Definitions
+
+ The composite acronym, "RA DIT", is hereby introduced within this ID.
+ The acronym abbreviates the 'Registration Authority Directory
+ Information Tree' term, which describes the directory tree structure
+ that has been created or leveraged for storage of registration and
+ registrant data in accordance with this ID series.
+
+ The composite acronym "RA DSA" used throughout this ID is defined in
+ Section 1.2.1 of the RADSA ID.
+
+ The composite acronym "RA DUA" used throughout this ID is defined in
+ Section 1.2.1 of the RADUA ID.
+
+1.3. Intended Audience
+
+ This ID is specifically geared towards X.500/LDAP professionals, such
+ as administrators, architects or application developers tasked with
+ managing and/or implementing an RA DIT.
+
+ General familiarity with the standards of X.500 and LDAP, as well as
+ with the RASCHEMA, RADUA and RADSA IDs is STRONGLY RECOMMENDED.
+
+1.4. Allocations
+
+ This specification extends the previously defined ID series OID root
+ '1.3.6.1.4.1.56521.101', defined in Section 1.6 of the RADIR ID, in
+ the following manner:
+
+ - 1.3.6.1.4.1.56521.101.3 (rA-DIT)
+ - 1.3.6.1.4.1.56521.101.3.1 (models)
+ - 1.3.6.1.4.1.56521.101.3.1.2 (twoDimensional)
+ - 1.3.6.1.4.1.56521.101.3.1.3 (threeDimensional)
+
+ OIDs defined in this ID correlate to their section numbers of origin.
+
+ Should this ID be elevated to RFC status, the aforementioned ID root
+ OID prefix shall be rendered obsolete in favor of an IANA-assigned
+ OID, at which point this ID will be updated to reference the literal
+ 'IANA-ASSIGNED-OID' placeholder prefix where appropriate.
+
+2. Assessments
+
+ Implementation of this ID should not be taken lightly. Certain key
+ design decisions need to be made well in advance of use.
+
+ To aid in this process, the following subsections outline relevant
+ assessment categories for consideration.
+
+Coretta Expires August 27, 2024 [Page 3]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+2.1. Schema Availability
+
+ Complete access and usage capabilities for all schema definitions
+ found throughout Section 2 of the RASCHEMA ID is REQUIRED for
+ the design and ongoing maintenance of the RA DIT.
+
+ Adopters MUST confirm positive access to these definitions.
+
+ Adopters are also advised to confirm positive support for DIT
+ Content Rule, DIT Structure Rule and Name Form definitions by the
+ respective RA DSA implementation if their use is necessary.
+
+ At an absolute minimum, access to all attribute types and object
+ classes defined within Sections 2.3 and 2.5 of the RASCHEMA ID
+ respectively are REQUIRED for the effective construction of the RA
+ DIT.
+
+2.2. Spectral Coverage
+
+ The overall "size" of the planned implementation is a very important
+ consideration. Adopters should decide how thorough their planned
+ RA DIT shall be in terms of content.
+
+ - Which of the three (3) ITU-T Rec. X.660 root arcs will
+ be implemented?
+ - Will subordinate registrations be retained indiscriminately, or
+ are only specific arcs targeted?
+
+ Root arc entries, ostensibly those bearing the 'rootArc' STRUCTURAL
+ class defined in Section 2.5.2 of the RASCHEMA ID, are intended to
+ store registrations of like ancestry only.
+
+ In the RECOMMENDED three dimensional model, this is REQUIRED. Here,
+ all registrations of the same ancestry or "lineage" of the desired
+ entry -- from root to immediate parent -- MUST be created in order to
+ conform to the requisite tree structure. In other words, if '1.3.6'
+ is desired for registration, '1.3' and '1' MUST exist hierarchically
+ beforehand, even if they are unnecessary in context.
+
+ When using the STRONGLY DISCOURAGED two dimensional model, only
+ specific (desired) registrations need to be created -- NOT their
+ entire ancestry. The result is a collection of sibling entries
+ with no hierarchically significant placement.
+
+ With these considerations in mind, adopters should decide the
+ extent to which adoption shall occur in terms of directory content
+ maintained and its effective footprint.
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 4]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+2.3. Content Capacity and Location
+
+ Adopters are advised to consider the long-term implications of
+ the planned RA DIT in terms of capacity provided by the hosting RA
+ DSA(s) and take measures to ensure a suitable operating environment.
+
+ Based on the assessments made in Section 2.2, adopters may wish
+ to consider whether a particularly large RA DIT may be better suited
+ for context segmentation, whether or not distribution is indicated,
+ to allow for larger portions of the RA DIT to function independently
+ and with dedicated resources and specialized security policies.
+
+ ITU-T Rec. X.518 defines the concepts of the distributed directory.
+
+2.4. User Base
+
+ The targeted user base of an implementation can influence its nature.
+
+ A private RA -- for example, one administered under the governance of
+ a private corporation for internal use -- may be exposed to a largely
+ vetted and fairly small user base. If so, it may be acceptable to
+ relax certain restrictions, such as registrant privacy controls.
+
+ In the case of public-facing RA -- for example, one meant to serve an
+ unvetted and potentially hostile user base -- the requirements for a
+ practical and secure implementation become far more complicated.
+
+ Lack of an effective access control model employed by the RA DSA MUST
+ preclude the storage of sensitive content within any RA DIT that is
+ potentially vulnerable to hostile entities. Design of the RA DIT in
+ this manner depends on positive support for suitable access controls
+ by the RA DSA. Adopters are advised to confirm availability and
+ effective operation of such controls under the expected conditions.
+
+ The effective mass and vitality of the user base is also a point of
+ consideration. Adopters are advised to consider whether subtrees
+ of a particularly volatile nature may be better suited for placement
+ within a separate RA DSA or environment, which may or may not involve
+ use of a distributed model or shadowed context.
+
+2.5. Class and Attribute Usage
+
+ Not all attribute types defined in the RASCHEMA ID are required
+ for use within an RA DIT. For example, only one (1) attribute type
+ -- 'n', per Section 2.3.1 of the RASCHEMA ID -- is truly REQUIRED
+ for all registrations. Naturally, such stringent use of the types
+ made available may result in an unhelpful implementation.
+
+ While attribute types have been defined for most contingencies, the
+ adoption of these types is entirely up to the adopter(s).
+
+
+
+Coretta Expires August 27, 2024 [Page 5]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Consult Section 2.3 of the RASCHEMA ID for the particulars of the
+ named attribute types in the following subsections.
+
+ Consult Section 2.5 of the RASCHEMA ID for definitions of object
+ class instances which allow assignment of these types to eligible
+ entries.
+
+ Consult Section 3.2 for examples of object class and attribute type
+ usage as complete entries, as well as an overview of use cases for
+ specific types.
+
+2.6. Content Sourcing
+
+ This ID acknowledges that -- even in complete implementations -- no
+ single RA manages ALL of the OID spectrum directly. Most, if not all
+ of this content is under the authority of external entities.
+
+ In lieu of this, this ID assumes some mechanism may be in place meant
+ to obtain and synchronize content from appropriate sources. While
+ the specifics are well outside the intended scope, this process may
+ resemble any of the following:
+
+ - Native replication agreements spanning implementations of this ID
+ - Regular data file receipt and processing (e.g.: LDIF, XML, CSV)
+ - Direct parsing of originating standard, ID or module
+ - Remote (proprietary) API requests
+ - Remote AXFR or IXFR requests [RFC5936] in the context of ORS
+
+ While the particulars of such synchronization and/or incorporation of
+ content external to this ID are well outside of the scope intended,
+ this ID acknowledges that such sourcing methods are often necessary.
+ Adopters SHOULD determine if any external registration content
+ is worthy of incorporation and in what manner.
+
+ Conversely, if the RA is responsible for any number of registrations
+ that are public-facing in nature, the RA SHOULD make registrations
+ available for consumption by external parties by some means.
+
+3. The RA DIT
+
+ The RA DIT is a traditional X.500/LDAP directory information tree
+ served by way of an RA DSA with which clients may interact.
+
+ The RA DIT may or may not contain unrelated content such as employee
+ accounts, user groups or system data. This ID series has no official
+ position as it relates to the presence of such content.
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 6]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.1. Directory Models
+
+ The appropriate DIT structure for any scenario depends upon the scope
+ of implementation in the long-term. Directory models defined within
+ this ID series are meant to provide an indication to clients (DUAs)
+ regarding the governing structure of the implementation.
+
+ DUAs optimized for use within the terms of this ID series, known as
+ RA DUAs, will use this information to define the operating methods
+ exercised during routine operation.
+
+3.1.1. Choosing the Appropriate Model
+
+ This introductory section aids the reader in choosing the appropriate
+ model for their implementation. Generally this decision is made well
+ in advance of any tangible implementation.
+
+ The three dimensional model, as defined in Section 3.1.3, is the most
+ likely candidate for adoption if ANY of the following are considered
+ TRUE:
+
+ - The RA is operating as an official, or widely recognized, public
+ service that conforms to all relevant standards
+ - Consistent, unambiguous DN-based registration references for an
+ entire ancestry is desired
+ - Reliable, bidirectional client-based conversion (or "resolution")
+ between DNs and numeric OIDs for an entire ancestry is desired
+ - RA DIT scalability and flexibility is a non-trivial concern
+ - The distribution (or "segmentation") of select DIT content is
+ in effect, or may be desirable, across multiple RA DSAs
+ - A single RA DIT is logically divided into multiple subordinate
+ naming contexts within an RA DSA
+ - The implementation will be thorough, spanning more than a single
+ root arc, with an ever-increasing number of registrations being
+ stored and served
+ - Collective Attribute support is desired
+ - Content privileges are complex, highly regimented and/or will
+ vary across different registration hierarchies
+ - Sparse or fractional replication agreements are possible
+ - Ranged registrations are present or expected
+
+ Should NONE of the above scenarios apply, the implementation is to
+ be regarded as non-standard and may be an appropriate candidate for
+ the two dimensional model described in Section 3.1.2.
+
+3.1.2. The Two Dimensional Model
+
+ The two dimensional model is advertised, or identified, using the
+ following OID assigned to an instance of 'rADirectoryMode':
+
+ 1.3.6.1.4.1.56521.101.3.1.2
+
+
+Coretta Expires August 27, 2024 [Page 7]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Per Section 3.1.1, this model is available for informal, unofficial
+ or otherwise non-standard implementations of this ID. Use of this
+ model is STRONGLY DISCOURAGED.
+
+ The two dimensional model describes a simple "list" of registration
+ entries, all accessible exactly one (1) level below the top-level
+ registration root. The concept of subtrees beyond this magnitude
+ does not apply in this model.
+
+ The ideal DN syntax for use with this model involves use of the
+ 'dotNotation' attribute type as the principal RDN component of the
+ entry DN.
+
+ For example, the following DN would reference the OID registration
+ for "dod":
+
+ dotNotation=1.3.6,ou=Registrations,o=rA
+
+ If the DN syntax used the 'identifier' value, it might appear as:
+
+ identifier=dod,ou=Registrations,o=rA
+
+ Registrations are stored with no regard for vertical or horizontal
+ relationships. Sibling, subordinate and superior registrations may
+ be stored within the same naming context and the same hierarchical
+ "level":
+
+ dotNotation=2.1,ou=Registrations,o=rA
+ dotNotation=1.3.6,ou=Registrations,o=rA
+ n=0,ou=Registrations,o=rA
+ dotNotation=1.3,ou=Registrations,o=rA
+ dotNotation=0.9,ou=Registrations,o=rA
+
+ This model does NOT scale well. Beyond the basic organization of OID
+ registrations within their respective roots, hierarchically-based OID
+ registration organization is NOT practical, as this technique would
+ almost certainly produce absurdly long and/or counterintuitive DNs.
+
+ Contiguity of superior registrations is not implicitly guaranteed as
+ it is when using the three dimensional model. For example, if the
+ registration for '1.3.6' ("dod") is present, this does not guarantee
+ the superior registration '1.3' ("identified-organization") exists in
+ the RA DIT.
+
+ This model is NEVER RECOMMENDED for official implementations, nor
+ in any scenario even approaching the severity of mission-critical.
+
+ Only private implementations of especially weak definition or those
+ of an ephemeral nature should ever truly consider adoption of this
+ directory model.
+
+
+
+Coretta Expires August 27, 2024 [Page 8]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.1.3. The Three Dimensional Model
+
+ The three dimensional model is advertised, or identified, using the
+ following OID assigned to an instance of 'rADirectoryModel':
+
+ 1.3.6.1.4.1.56521.101.3.1.3
+
+ The three dimensional model describes a registration hierarchy that
+ mirrors the hierarchical nature of the OIDs directly, with absolute
+ root arc registrations superior to all subordinate arc registrations.
+
+ Per Section 3.1.1, this model is STRONGLY RECOMMENDED for complete,
+ thorough or official implementations of this ID. It is also quite
+ suitable for general use, though at the risk of some administrative
+ tedium if a suitable RA DUA is not made available.
+
+ The three dimensional model imposes very strict and well-defined DN
+ syntax requirements. In particular, the 'n' attribute type is an
+ important component in the formation of a valid and unambiguous
+ reference to a single registration and its ancestry.
+
+ The result is a model that fosters seamless bidirectional conversion
+ -- performed by the RA DUA -- between DNs and numeric OIDs.
+
+ For example, the following DN represents OID '1.3.6.1.4.1.56521.999'.
+ In this syntax, a DN is divided into two (2) logical abstractions:
+
+ n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1 ,ou=Registrations,o=rA
+ ------------------------------------- ----------------------
+ Registration Ancestry Registration Base
+
+ The conversion process from OID to DN is as follows:
+
+ 1. Reverse OID (becomes 999.56521.1.4.1.6.3.1)
+ 2. Swap all ASCII "%x2e" (".") instances with ASCII "%x2c" (",")
+ 3. Preface each ASCII "%x2c"-delimited integer with 'n=', which
+ completes assembly of the registration ancestry
+ 4. Append ASCII "%x2c" (",") and appropriate registration base
+
+ In the obverse -- or "unreversed" -- context, the following process
+ converts a DN to a numeric OID:
+
+ 1. Discard registration base leading ASCII "%x2c" delimiter (","),
+ leaving only the registration ancestry
+ 2. Discard all occurrences of 'n='
+ 3. Swap all ASCII "%x2c" (",") instances with ASCII "%x2e" (".")
+ 4. Reverse values (becomes OID 1.3.6.1.4.1.56521.999)
+
+3.2. Entry Content
+
+ The following subsections discuss various topics that pertain to DIT
+ content management within the spirit of this ID series.
+
+Coretta Expires August 27, 2024 [Page 9]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Certain examples are defined for consumption by adopters of this ID.
+ These examples are expressed as LDIF, and may employ indenting and
+ line-wrapping of attribute values whose lengths exceed the maximum
+ size permitted by the RFC ID standard format.
+
+ This condition does not invalidate the usability or syntactical
+ conformity of these instances.
+
+3.2.1. Registrants
+
+ Registrants are documented authorities of various forms involved
+ in the ownership, allocation and/or general management of an OID.
+
+ Whether directly or through inheritance, all OIDs have an authority
+ of some form. This ID allows for flexible and scalable management
+ of such content.
+
+3.2.1.1. Registrant Strategy
+
+ Per ITU-T Rec. X.660, there are three (3) types of authorities:
+
+ - Current
+ - Previous (First)
+ - Sponsor
+
+ To parallel these authority types, three (3) AUXILIARY object classes
+ are defined within Section 2.5 of the RASCHEMA ID:
+
+ - 'currentAuthorityContext'
+ - 'firstAuthorityContext'
+ - 'sponsorContext'
+
+ Use of any number of these object classes will result in related
+ contact and identity attribute types being made available for use
+ within the class bearing entry.
+
+ Generally, authorities manifest as any of the following entities:
+
+ - An individual
+ - A public or private organization, institution or working group
+ - A document (e.g.: a standard or ID, e.g.: [RFC4519])
+
+ Implementations of this ID may choose either of the following models
+ to govern registrant-related DIT content:
+
+ - Dedicated (independent) entry model
+ - Combined (inline) entry model
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 10]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.1.1.1. Dedicated Registrants
+
+ In this model, every distinct registrant is expressed using a single
+ dedicated directory entry bearing the 'registrant' STRUCTURAL object
+ class and is uniquely identifiable by way of a 'registrantID' value,
+ ideally assigned as the leaf-node RDN component of the entry.
+
+ This is the RECOMMENDED strategy for all implementations and models
+ in which registrant information is present.
+
+ For any practical use, each 'registrant' entry SHOULD bear one (1) or
+ more of the following AUXILIARY object class definitions previously
+ mentioned:
+
+ - 'currentAuthorityContext'
+ - 'firstAuthorityContext'
+ - 'sponsorContext'
+
+ For example, consider the following 'registrant' entry describing the
+ author of this ID series:
+
+ dn: registrantID=a0efcce18a,ou=Registrants,o=rA
+ objectClass: registrant
+ objectClass: firstAuthorityContext
+ firstAuthorityStartTimestamp: 20210930124105Z
+ firstAuthorityCommonName: Jesse Coretta
+ firstAuthorityEmail: jesse.coretta@icloud.com
+
+ Use of the 'registrantID' attribute type as the principal RDN type
+ is STRONGLY RECOMMENDED as shown.
+
+
+ The concept of a dedicated registrant entry is unfixed. Attribute
+ types related to authority information extended via the RASCHEMA
+ ID are present largely for convenience and reasons of clarity.
+
+ Adopters of the RA DIT MAY choose to forego use of some or all of
+ these types in favor of those defined within official standards such
+ as [RFC4519] and [RFC4524].
+
+ It is RECOMMENDED that in this case, use of such attribute types that
+ serve as super types of the replaced RASCHEMA types be observed.
+ For example, the appropriate replacement type for 'sponsorCommonName'
+ is 'cn', because 'cn' is its super type.
+
+ Some types defined within the RASCHEMA ID are unique in nature and
+ may not be derived from a super type. An example of this is the
+ 'firstAuthorityStartTimestamp' attribute type. Continued use of
+ these types is likely indicated.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 11]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Use of the 'extensibleObject' AUXILIARY object class defined within
+ Section 4.3 of [RFC4512] is likely indicated where this replacement
+ strategy is employed. Continued use of the 'registrant' STRUCTURAL
+ object class is REQUIRED for compatibility reasons relating to the
+ RA DUA.
+
+ To offer a more complete example of this alternative use, the above
+ 'registrant' entry bearing the 'registrantID' value of 'a0efcce18a'
+ implements 'cn' and 'mail' over their sub typed counterparts defined
+ within the RASCHEMA ID.
+
+ dn: registrantID=e2ef220b3b,ou=Registrants,o=rA
+ objectClass: registrant
+ objectClass: extensibleObject
+ objectClass: firstAuthorityContext
+ firstAuthorityStartTimestamp: 20210930124105Z
+ cn: Jesse Coretta
+ mail: jesse.coretta@icloud.com
+
+ The drawback of this replacement strategy is that this 'registrant'
+ entry cannot combine the ITU-T Rec. X.660 authority classifications
+ within the bounds of a single 'registrant' entry any longer.
+
+ For example, observe how two (2) distinct authority contexts reside
+ within this single 'registrant' entry:
+
+ dn: registrantID=aec17eef17,ou=Registrants,o=rA
+ objectClass: registrant
+ objectClass: firstAuthorityContext
+ objectClass: currentAuthorityContext
+ currentAuthorityOrg: ITU-T SG 17 & ISO/IEC JTC 1/SC 6
+ firstAuthorityOrg: ITU-T SG 7 & ISO/IEC JTC 1/SC 33
+
+ If the implementation, instead, favors use of the indicated super
+ types, the context of the above 'registrant' entry will have to
+ be split into two (2) distinct entries:
+
+ dn: registrantID=b7ea16ef5e,ou=Registrants,o=rA
+ objectClass: registrant
+ objectClass: extensibleObject
+ objectClass: currentAuthorityContext
+ o: ITU-T SG 17 & ISO/IEC JTC 1/SC 6
+
+ dn: registrantID=e1f0ffb677,ou=Registrants,o=rA
+ objectClass: registrant
+ objectClass: extensibleObject
+ objectClass: firstAuthorityContext
+ o: ITU-T SG 7 & ISO/IEC JTC 1/SC 33
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 12]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ With a cogent "dedicated registrant" policy devised, 'registration'
+ entries may reference appropriate entries through DN referencing in
+ the context of appropriate authority classification by way of the
+ following attribute types:
+
+ - 'currentAuthority' and/or 'c-currentAuthority'
+ - 'firstAuthority' and/or 'c-firstAuthority'
+ - 'sponsor' and/or 'c-sponsor'
+
+ It is permitted for 'registration' entries to bear both collective
+ and non-collective equivalent instances of these attribute types.
+ For example, the presence of instances of both the 'sponsor' and
+ 'c-sponsor' types within a single 'registration' entry is permitted.
+
+ A practical use case might involve collective value assignment to a
+ large number of entries, with non-collective supplemental authority
+ references added in ad hoc fashion, as needed.
+
+3.2.1.1.2. Combined Registrants
+
+ In this model, 'registration' entries are assigned one (1) or more of
+ the following AUXILIARY object class definitions:
+
+ - 'currentAuthorityContext'
+ - 'firstAuthorityContext'
+ - 'sponsorContext'
+
+ Unlike the RECOMMENDED registrant approach shown in Section 3.2.1,
+ contact and identity attribute types are stored directly within the
+ given 'registration' entry. Essentially, this merges the ideas of
+ 'registration' entries and 'registrant' entries into a singular
+ context.
+
+ This model is highly inefficient, and would only apply to limited
+ use-cases within the STRONGLY DISCOURAGED two dimensional model,
+ and ONLY if the footprint is particularly small with registrant
+ data that is unique and non-repeating in form.
+
+ Limited examples of this registrant model are shown in Section 3.2.2.
+
+ In general, use of this model is STRONGLY DISCOURAGED.
+
+3.2.2. Registrations
+
+ Registrations are official allocations of ASN.1 object identifiers.
+ Within the context of this ID, a registration manifests through a
+ directory entry bearing the 'registration' STRUCTURAL class and
+ any number of supporting attribute type instances.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 13]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.2.1. Root Arcs
+
+ Regardless of the implemented dimensional model, certain scenarios
+ will call for the creation of so-called root registrations, or root
+ arcs. These are special entries -- of which there can only be three
+ (3) -- meant to represent the absolute superior root context of any
+ and all registrations of origin.
+
+ The three (3) root arcs -- defined in ITU-T Rec. X.660 -- are covered
+ in the following subsections and are expressed as LDIF entries. Some
+ attribute values are both line-wrapped and indented due to character
+ lengths, which is permitted using LDIF.
+
+ These registration forms are dimension neutral, meaning they manifest
+ no differently regardless of directory model employed.
+
+ Root 'registration' entries are based upon the 'rootArc' STRUCTURAL
+ object class. Be advised that root registration entries cannot bear
+ instances of the 'dotNotation' attribute type due to syntactical
+ limitations. The standard OID syntax for LDAP requires at least two
+ (2) number form instances in dot notation for a legal OID value.
+
+ Because 'dotNotation' was defined upon this syntax, this precludes
+ any single root arc -- such as 2 -- being used to identify a root
+ OID. This is why the 'n' attribute type is RECOMMENDED for the leaf
+ node RDN component of all 'registration' entries -- including roots.
+
+ It is generally discouraged to use any attribute type OTHER THAN 'n'
+ for the RDN attribute type of the 'registration' DN within the three
+ dimensional model. Using types such as 'identifier', 'unicodeValue'
+ or others, can interfere with DN/OID conversion and extrapolation.
+
+3.2.2.1.1. ITU-T
+
+ dn: n=0,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: rootArc
+ objectClass: x660Context
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: International Telecommunication Union -
+ Telecommunication standardization sector (ITU-T)
+ unicodeValue: ITU-T
+ identifier: itu-t
+ iRI: /ITU-T
+ iRI: /ITU-R
+ aSN1Notation: {itu-t(0)}
+ secondaryIdentifier: ccitt
+ standardizedNameForm: {itu-t}
+ additionalUnicodeValue: ITU-R
+ registrationClassification: Standards development organization
+
+
+Coretta Expires August 27, 2024 [Page 14]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ This registration may also be expressed in minimalistic form:
+
+ dn: n=0,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: rootArc
+
+3.2.2.1.2. ISO
+
+ dn: n=1,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: rootArc
+ objectClass: x660Context
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: International Organization for Standardization (ISO)
+ unicodeValue: ISO
+ identifier: iso
+ iRI: /ISO
+ aSN1Notation: {iso(1)}
+ standardizedNameForm: {iso}
+ registrationClassification: Standards development organization
+
+ This registration may also be expressed in minimalistic form:
+
+ dn: n=1,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: rootArc
+
+3.2.2.1.3. Joint ISO/ITU-T
+
+ dn: n=2,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: rootArc
+ objectClass: x660Context
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: Areas of joint work between ISO/IEC (International
+ Organization for Standardization/International Electrotechnical
+ Commission) and ITU-T (International Telecommunication Union -
+ Telecommunication standardization sector), and other intl. work
+ firstAuthority: registrantID=e1f0ffb677,ou=Registrants,o=rA
+ currentAuthority: registrantID=b7ea16ef5e,ou=Registrants,o=rA
+ unicodeValue: Joint-ISO-ITU-T
+ identifier: joint-iso-itu-t
+ iRI: /Joint-ISO-ITU-T
+ aSN1Notation: {joint-iso-itu-t(2)}
+ secondaryIdentifier: joint-iso-ccitt
+ standardizedNameForm: {joint-iso-itu-t}
+ registrationClassification: Standards development organization
+
+
+
+
+Coretta Expires August 27, 2024 [Page 15]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ See Section 3.2.1.1.1 for authority entry examples referenced here.
+ If using the (generally) DISCOURAGED "combined registrants" strategy,
+ the following object classes and attribute types may be added to this
+ entry instead of the above authority-related DN references:
+
+ objectClass: firstAuthorityContext
+ objectClass: currentAuthorityContext
+ currentAuthorityOrg: ITU-T SG 17 & ISO/IEC JTC 1/SC 6
+ firstAuthorityOrg: ITU-T SG 7 & ISO/IEC JTC 1/SC 33
+
+ This registration may also be expressed in minimalistic form:
+
+ dn: n=2,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: rootArc
+
+3.2.2.2. Subordinate Arcs
+
+ Also referred to as 'sub arcs' and 'non-root arcs', these entries
+ represent the majority of content that comprises the typical RA DIT.
+
+ These registration forms -- unlike their root counterparts -- may
+ manifest in slightly different manners depending on the directory
+ model employed by the RA DIT in question. The following sections
+ that outline examples of these entries will include remarks which
+ relate to any indicated dimensional considerations. These sections
+ also cite certain well-known registrations relevant to the examples.
+
+ Subordinate arcs may incorporate additional attribute types and
+ object classes not permitted for use by root arcs described within
+ Section 3.2.2.1 -- whether due to schema restrictions or by virtue
+ of logical context.
+
+ In particular, arcs bear the 'arc' STRUCTURAL object class instead of
+ the 'rootArc' object class, and MAY bear one (1) of the following
+ AUXILIARY classes only, and would be based upon the leading digit of
+ the registration's effective OID:
+
+ - 'iTUTRegistration' (0)
+ - 'iSORegistration' (1)
+ - 'jointISOITUTRegistration' (2)
+
+ Additional permitted attribute types include, but are not limited to:
+
+ - 'dotNotation'
+ - 'isLeafNode'
+ - 'registrationRange'
+ - '[c-]topArc'
+ - '[c-]supArc'
+
+
+
+
+Coretta Expires August 27, 2024 [Page 16]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.2.2.1. Identified-Organization
+
+ dn: n=3,n=1,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x660Context
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: Organization identification schemes registered
+ according to ISO/IEC 6523-2
+ aSN1Notation: {iso(1) identified-organization(3)}
+ isFrozen: TRUE
+ dotNotation: 1.3
+ unicodeValue: Identified-Organization
+ registrationModified: 20120101000000Z
+ registrationCreated: 19870101000000Z
+ standardizedNameForm: {identified-organization}
+ iRI: /ISO/Identified-Organization
+
+ If using the STRONGLY DISCOURAGED two dimensional directory model,
+ "Identified-Organization" SHOULD express the RECOMMENDED DN syntax
+ for this model:
+
+ dotNotation=1.3,ou=Registrations,o=rA
+
+3.2.2.2.2. ASN.1
+
+ dn: n=1,n=2,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: jointISOITUTRegistration
+ objectClass: x660Context
+ objectClass: x680Context
+ n: 1
+ description: ASN.1 standards
+ aSN1Notation: {joint-iso-itu-t(2) asn1(1)}
+ dotNotation: 2.1
+ iRI: /ASN.1
+ longArc: /ASN.1
+ unicodeValue: ASN.1
+
+ If using the STRONGLY DISCOURAGED two dimensional directory model,
+ "ASN.1" SHOULD express the RECOMMENDED DN syntax indicated:
+
+ dotNotation=2.1,ou=Registrations,o=rA
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 17]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.2.2.3. X
+
+ dn: n=24,n=0,n=0,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iTUTRegistration
+ objectClass: x660Context
+ objectClass: x680Context
+ n: 24
+ description: Series X of ITU-T Recommendations "Data networks,
+ open system communications and security"
+ aSN1Notation: {itu-t(0) recommendation(0) x(24)}
+ dotNotation: 0.0.24
+ iRI: /ITU-T/Recommendations/X
+ standardizedNameForm: {x}
+ unicodeValue: X
+
+ If using the STRONGLY DISCOURAGED two dimensional directory model,
+ "X" SHOULD bear the RECOMMENDED DN syntax for this model:
+
+ dn: dotNotation=0.0.24,ou=Registrations,o=rA
+
+3.2.2.2.4. The "OID Directory"
+
+ This section describes a small portion of the OID registrations
+ officiated by this ID series. Note that the entire ancestry is
+ not shown for reasons of significant brevity.
+
+ The same twoDimensional DN syntax scheme shall apply, as mentioned
+ in previous sections, when using the STRONGLY DISCOURAGED two
+ dimensional directory model.
+
+ Note the referenced 'firstAuthority' entry DN, which bears the value
+ "a0efcce18a" for 'registrantID', is defined in Section 3.2.1.1.1.
+
+ dn: n=56521,n=1,n=4,n=1,n=6,n=3,n=1,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x660Context
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ firstAuthority: registrantID=a0efcce18a,ou=Registrants,o=rA
+ registrationURI: https://www.iana.org/assignments/enterprise-
+ numbers/
+ description: Jesse Coretta
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521}
+ dotNotation: 1.3.6.1.4.1.56521
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521
+
+
+
+Coretta Expires August 27, 2024 [Page 18]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ dn: n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: The OID Directory
+ identifier: oid-directory
+ nameAndNumberForm: oid-directory(101)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)}
+ dotNotation: 1.3.6.1.4.1.56521.101
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101
+
+ dn: n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: Directory Schema
+ identifier: schema
+ nameAndNumberForm: schema(2)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2
+
+ dn: n=3,n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: Attribute Types
+ identifier: attributeTypes
+ nameAndNumberForm: at(3)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2) attributeTypes(3)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2.3
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2/3
+
+
+
+
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 19]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ dn: n=1,n=3,n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: Number Form
+ isLeafNode: TRUE
+ identifier: n
+ secondaryIdentifier: numberForm
+ nameAndNumberForm: n(1)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2) attributeTypes(3) n(1)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2.3.1
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2/3/1
+
+ dn: n=5,n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: Object Classes
+ identifier: objectClasses
+ nameAndNumberForm: objectClasses(5)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2) objectClasses(5)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2.5
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2/5
+
+ dn: n=1,n=5,n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: Registration AUXILIARY Class
+ isLeafNode: TRUE
+ identifier: registration
+ nameAndNumberForm: registration(1)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2) objectClasses(5) registration(1)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2.5.1
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2/5/1
+
+
+
+
+Coretta Expires August 27, 2024 [Page 20]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ dn: n=7,n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: Name Forms
+ identifier: nameForms
+ nameAndNumberForm: nameForms(7)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2) nameForms(7)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2.7
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2/7
+
+ dn: n=1,n=7,n=2,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: Root Arc Name Form
+ isLeafNode: TRUE
+ identifier: nRootArcForm
+ nameAndNumberForm: nRootArcForm(1)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ schema(2) nameForms(7) nRootArcForm(1)}
+ dotNotation: 1.3.6.1.4.1.56521.101.2.7.1
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/2/7/1
+
+ dn: n=3,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: The RA DIT
+ identifier: rA-DIT
+ secondaryIdentifier: dIT
+ nameAndNumberForm: rA-DIT(3)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ rA-DIT(3)}
+ dotNotation: 1.3.6.1.4.1.56521.101.3
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/3
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 21]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ dn: n=1,n=3,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ description: Directory Models
+ identifier: models
+ nameAndNumberForm: models(1)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ rA-DIT(3) models(1)}
+ dotNotation: 1.3.6.1.4.1.56521.101.3.1
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/3/1
+
+ dn: n=2,n=1,n=3,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: The Two Dimensional Model
+ isLeafNode: TRUE
+ identifier: twoDimensional
+ nameAndNumberForm: twoDimensional(2)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ rA-DIT(3) models(1) twoDimensional(2)}
+ dotNotation: 1.3.6.1.4.1.56521.101.3.1.2
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/3/1/2
+
+ dn: n=3,n=1,n=3,n=101,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: x680Context
+ objectClass: registrationSupplement
+ description: The Three Dimensional Model
+ isLeafNode: TRUE
+ identifier: threeDimensional
+ nameAndNumberForm: threeDimensional(3)
+ aSN1Notation: {iso(1) identified-organization(3) dod(6)
+ internet(1) private(4) enterprise(1) 56521 oid-directory(101)
+ rA-DIT(3) models(1) threeDimensional(3)}
+ dotNotation: 1.3.6.1.4.1.56521.101.3.1.3
+ iRI: /ISO/Identified-Organization/6/1/4/1/56521/101/3/1/3
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 22]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.2.2.5. Registration Ranges
+
+ This section demonstrates finite and infinite registration ranges.
+
+ dn: n=0,n=171,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: registrationSupplement
+ description: Total/Infinite Range (1.3.6.1.4.1.56521.999.171.*)
+ registrationRange: -1
+
+ dn: n=10,n=401,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: iSORegistration
+ objectClass: registrationSupplement
+ description: Finite Range (1.3.6.1.4.1.56521.999.401.10-19)
+ registrationRange: 19
+
+3.2.3. Value Forms
+
+ Attribute type instances residing within the RA DIT may, or may not,
+ manifest in a few different ways, each of which are covered in the
+ following subsections.
+
+3.2.3.1. Composite
+
+ Consider the 'nameAndNumberForm' attribute type, per Section 2.3.19
+ of the RASCHEMA ID. This attribute type combines the 'identifier'
+ and 'n' attribute types to form a complete value, for instance:
+
+ identified-organization(3)
+
+ The RA DIT MAY opt for composite or "virtual" assembly of an instance
+ of this attribute type by the RA DUA. This negates the need for this
+ instance to be stored within an entry in literal fashion, though ONLY
+ if the aforementioned constituent types are present within the entry.
+
+ In addition to the 'nameAndNumberForm' attribute type, 'aSN1Notation'
+ also qualifies for this design strategy. This type is a sequence of
+ one (1) or more 'nameAndNumberForm' or 'numberForm' values -- whether
+ composite or literal -- as derived from multiple superior entries.
+ Note this is only practical within three dimensional implementations,
+ and only when the entire ancestry is thoroughly populated and mapped
+ spatially using attribute types extended via the 'spatialContext'
+ AUXILIARY object class.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 23]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ The most obvious benefit to the composite approach is the reduced
+ storage space required for preservation of literal attribute values.
+ The degree of "savings" is naturally proportional to the overall size
+ of the RA DIT.
+
+ A significant drawback, however, is (likely) limited client support.
+ In order for composite values to be extrapolated by any client, the
+ client must first be aware of the necessary "component" types which
+ are required in order to produce a composite value.
+
+ Performance may also be a concern when composite values are assembled
+ using a lengthy sequence of superior entries, or if the operational
+ state of the RA DSA is suboptimal in some manner.
+
+3.2.3.2. Literal
+
+ Contrary to the theory described in Section 3.2.3.1, literal values
+ are set to provide clients with access to needed information without
+ any "assembly" required. This is the standard approach to managing
+ an attribute type value.
+
+ The benefits and drawbacks of this approach are the direct inverse of
+ those described in Section 3.2.3.1. Storage space requirements would
+ increase, while client capability and performance issues are abated.
+
+ In general, this is the RECOMMENDED approach for RA DIT population
+ as opposed to composite values.
+
+3.2.3.3. Collective
+
+ Section 2.3 of the RASCHEMA ID defines collective attribute types
+ to parallel certain attribute types which may apply to a great many
+ entries in the context of a subtree within the RA DIT.
+
+ In thorough implementations of this ID series, this can often provide
+ considerable savings in terms of administrative effort in addition to
+ reduced risk relating to potentially content updates applied manually
+ to the RA DIT. In such cases, collective attributes are RECOMMENDED.
+
+ Every attribute type in collective form is conceptually based upon a
+ non-collective equivalent attribute type, both in use and in context
+ (e.g.: 'topArc' and 'c-topArc').
+
+ Configuration for [RFC3671] support varies across X.500/LDAP products
+ but most situations involve use of the 'subtreeSpecification' type in
+ some fashion. This type is used to limit the influence of collective
+ attribute operations within the context of a subtree.
+
+ While this ID series does not delve into the particulars of specific
+ implementation steps for any given X.500/LDAP product, it does offer
+ certain 'subtreeSpecification' examples where appropriate.
+
+
+Coretta Expires August 27, 2024 [Page 24]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Specific methodologies relating to use varies greatly among the
+ potential X.500/LDAP DSA products available today. For the purposes
+ of simplicity, this ID assumes that 'subtreeSpecification' instances
+ are assigned to subentries of the relevant directory entry.
+
+3.2.4. Special Attributes
+
+ This section outlines certain important attribute types extended via
+ Section 2.3 of the RASCHEMA ID.
+
+3.2.4.1. 'n'
+
+ This attribute type plays a CRUCIAL role with regards to the syntax
+ of DNs used in the three dimensional directory model. It is the only
+ attribute type defined in this ID REQUIRED for ALL registrations --
+ root or not -- without exception.
+
+ Instances of this attribute type SHALL NOT be negative, and SHALL NOT
+ appear on entries other than 'registration' entries. Instances of
+ this type MUST remain unique among horizontal (sibling) entries.
+
+ UUID-based OID registrations, by way of ITU-T Rec. [X.667], are
+ dependent upon proper underlying ASN.1 INTEGER syntax support. The
+ value of 'n' MUST be the integer form of the hexadecimal UUID value.
+
+ X.500/LDAP implementations or architectures incapable of supporting
+ unsigned integers greater than or equal to 128 bits in length are
+ ineligible for support and processing of such registrations by way
+ of this type.
+
+ Instances of this attribute type represent the start of a range of
+ registration allocations when present in entries that also bear an
+ instance of the 'registrationRange' attribute type, which signifies
+ the terminus of an allocated OID range.
+
+ This attribute type is defined in Section 2.3.1 of the RASCHEMA ID.
+
+3.2.4.2. 'dotNotation'
+
+ This attribute type plays a crucial role with regards to DN syntax
+ used in the two dimensional directory model described within the
+ RADIT ID. It cannot be assigned to registration entries which bear
+ the 'rootArc' STRUCTURAL object class.
+
+ Instances of this attribute type SHALL NOT appear on entries other
+ than 'registration' entries, and MUST be unique throughout an RA DIT.
+
+ Use of this attribute type is entirely OPTIONAL within RA DITs based
+ upon the RECOMMENDED three dimensional directory model.
+
+ This attribute type is defined in Section 2.3.2 of the RASCHEMA ID.
+
+
+Coretta Expires August 27, 2024 [Page 25]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.4.3. 'registrationInformation'
+
+ This attribute type allows extended information to be assigned to
+ any registration. It is based upon the ASN.1 OCTET STRING syntax.
+
+ While use of this syntax does allow for NULL values, it is considered
+ invalid within the context of this ID. In cases where no extended
+ information is available for a given registration, instances of this
+ attribute type SHOULD NOT be set for the entry.
+
+ This attribute type is defined in Section 2.3.9 of the RASCHEMA ID.
+
+3.2.4.4. 'registrationModified'
+
+ This attribute type identifies any number of generalized timestamps
+ that pinpoint previous modifications to a registration.
+
+ When appropriate, this attribute type may be used to represent the
+ "LAST-UPDATED" definition as shown in Section 2 of [RFC2578], but
+ may also be used to record any known modification date.
+
+ Whether multiple dates, or merely the most recent date, are stored in
+ the directory is entirely up to the administrator(s) involved.
+
+ This type is defined in Section 2.3.12 of the RASCHEMA ID.
+
+3.2.4.5. 'registrationRange'
+
+ This attribute type stores the numerical representation of the end
+ of an allocation range. The start of the range is defined using
+ the 'n' attribute type value.
+
+ The value of this attribute MUST always be greater than the value
+ of 'n' EXCEPT when using "-1".
+
+ For example, if a 'registrationRange' attribute value of '999' were
+ set for the OID '2.999.44', it MUST be interpreted as an entire range
+ of OIDs starting at '2.999.44' up to and including '2.999.999'. This
+ represents a finite range and means, without exception, that further
+ sibling allocations MUST be defined outside of this, and any other,
+ defined boundary.
+
+ Similarly, keeping with the same example above, if the value of "-1"
+ were used instead, this MUST be interpreted as an all-encompassing
+ OID range starting at '2.999.44' with no upper limit, representing
+ an infinite range. This means, without exception, that no further
+ sibling allocations greater than 'n' will be permitted.
+
+ This type is defined in Section 2.3.13 of the RASCHEMA ID.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 26]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.4.6. 'registrationStatus'
+
+ This attribute type associates a particular allocation status value
+ to a registration.
+
+ Multiple values can be provided, provided they remain meaningful in
+ the particular combination.
+
+ In most cases, the attribute type is used in order to mark an OID
+ registration as OBSOLETE, RESERVED, PRIVATE or DEALLOCATED.
+
+ Section 2 of [RFC2578] also defines "current" and "deprecated" for
+ use in this context.
+
+ Values of "active" or "in-force" may be used, though generally this
+ is OPTIONAL.
+
+ Absence of this attribute type within a given entry MAY be viewed
+ as an implied deference to the 'registrationStatus' value held by
+ a relevant ancestral registration, if applicable. In the absence
+ of information to the contrary, lack of this value could imply the
+ "active", "current" or "in-force" declarations, however this is not
+ definitive and may vary across implementations.
+
+ A value of "private" MAY be used a component in any access control
+ mechanics defined by the directory architect(s), but at the risk of
+ possible performance costs depending on implementation.
+
+ Other possible values not listed here MAY be used, however they would
+ be wholly proprietary in nature.
+
+ This type is defined in Section 2.3.14 of the RASCHEMA ID.
+
+3.2.4.7. 'registrationClassification'
+
+ This attribute type associates a classification with a registration.
+
+ While independent of the 'registrationStatus' attribute type defined
+ in Section 2.3.14, there may be cases of overlap with respect to the
+ declaration of obsolescence or deallocation for a given registration,
+ as both attribute types recognize and express such states.
+
+ This type is defined in Section 2.3.15 of the RASCHEMA ID.
+
+3.2.4.8. 'isLeafNode'
+
+ This attribute type serves to declare a registration as the terminus
+ of an ancestry using a Boolean TRUE or FALSE.
+
+ Absence of this attribute type SHOULD be interpreted as an implicit
+ FALSE value. This is the most common scenario.
+
+
+Coretta Expires August 27, 2024 [Page 27]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ A value of FALSE indicates there are no restrictions regarding the
+ allocation of child entries.
+
+ A value of TRUE indicates the registration SHALL NOT be a parent of
+ any subordinate registrations whatsoever.
+
+ Instances of this attribute type are not to be interpreted in any
+ recursive context. Leaf-node status of a registration precludes
+ any additional subtree context.
+
+ This attribute type is NOT intended to serve in a security capacity.
+ Presence of this attribute type is mainly used to alert any RA DUA
+ that is optimized for this ID that neither subordinate enumeration,
+ nor subordinate allocation, be attempted below the indicated entry.
+
+ A registration that lacks subordinate entries is not necessarily a
+ leaf-node. Lack of this status could mean subordinate allocations
+ might occur in the future. Leaf-node status is meant for use in
+ permanent contexts.
+
+ This type is defined in Section 2.3.16 of the RASCHEMA ID.
+
+3.2.4.9. 'isFrozen'
+
+ This attribute type serves to identify a registration as frozen using
+ a Boolean TRUE or FALSE.
+
+ The condition of a registration being frozen indicates allocations of
+ subordinate registrations of the bearer will not be honored.
+
+ The condition of a frozen state is not necessarily permanent.
+
+ A value of TRUE indicates that the given registration SHALL NOT honor
+ any subordinate allocations. Preexisting subordinate registration
+ entries will be unaffected and may be queried freely by the RA DUA.
+
+ Preexisting subordinate registration entries are considered frozen,
+ regardless of vertical distance from the bearer of this type.
+
+ A value of FALSE indicates there are no restrictions regarding the
+ allocation of any subsequent child entries.
+
+ An administratively-focused RA DUA MAY override the semantics of this
+ attribute type in the context of historical input or another similar
+ use case.
+
+ This type is defined in Section 2.3.17 of the RASCHEMA ID.
+
+3.2.4.10. 'longArc'
+
+ This attribute type allows Long Arc instances to be assigned to a
+ registration.
+
+Coretta Expires August 27, 2024 [Page 28]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Per [X.660], entries that bear values of this attribute type MUST
+ ONLY reside below the root joint-iso-itu-t(2) registration.
+
+ In other words, OID registrations subordinate to either the itu-t(0)
+ or iso(1) roots that bear a 'longArc' instance are considered bogus.
+
+ DUAs optimized for this ID SHALL NOT allow routine presentation or
+ modification (beyond corrective removal) of bogus 'longArc' values
+ in this context.
+
+ This type is defined in Section 2.3.20 the of the RASCHEMA ID.
+
+ The 'minArc' and 'c-minArc' attribute types are defined in Section
+ 2.3.27 and 2.3.28 of the RASCHEMA ID.
+
+ The 'maxArc' and 'c-maxArc' attribute types are defined in Section
+ 2.3.30 and 2.3.31 of the RASCHEMA ID.
+
+3.2.4.11. 'discloseTo'
+
+ This attribute type -- and its collective counterpart -- is used to
+ identify authorized readers of otherwise private entries, typically
+ registrations.
+
+ This MAY cover any depth of subordinate entry disclosures as seen fit
+ by the directory architect(s) or administrator(s).
+
+ Identities referenced through instances of this attribute type can be
+ single user entries, a 'groupOfNames'-based entry, per Section 3.5 of
+ [RFC4519], a current authority or sponsorship registrant, or even an
+ effective Proxy Authorization identity, per [RFC4370].
+
+ Write-based access SHOULD NOT be governed by this attribute type, as
+ that is an intended function of a (current) registration authority.
+
+ The 'discloseTo' and 'c-discloseTo' attribute types are defined in
+ Section 2.3.32 and 2.3.33 of the RASCHEMA ID respectively.
+
+3.2.4.12. 'registrantID'
+
+ This attribute type is meant for assignment to registrant entries for
+ the purpose of unambiguous reference.
+
+ In larger, more complete implementations of this specification, it
+ is RECOMMENDED that this attribute type be the primary identifier
+ (or, RDN) for dedicated registrant entries.
+
+ Combined registrant entries have no particular use for this attribute
+ type. Instances of this type SHALL NOT appear on entries bearing the
+ 'registration' ABSTRACT class, defined within Section 2.5.1 of the
+ RASCHEMA ID.
+
+
+Coretta Expires August 27, 2024 [Page 29]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ For distinguished registrants -- such as an RFC or ID -- the official
+ identifier MAY be used as an alternative to an auto-generated value.
+
+ This type is defined in Section 2.3.34 of the RASCHEMA ID.
+
+3.2.4.13. 'firstAuthority', 'currentAuthority' and 'sponsor'
+
+ These attribute types -- and their collective counterparts -- are for
+ use in identifying registrant entries which describe individuals,
+ groups and other entities that serve in authority over registrations.
+
+ These attribute types are only intended for use in referencing
+ dedicated registrants, which each bear the 'registrant' STRUCTURAL
+ object class. Instances of these types are meant for assignment
+ to 'registration' entries of any kind.
+
+ The 'firstAuthority' and 'c-firstAuthority' attribute types are
+ defined in Sections 2.3.35 and 2.3.36 of the RASCHEMA ID.
+
+ The 'currentAuthority' and 'c-currentAuthority' attribute types are
+ defined in Sections 2.3.55 and 2.3.56 of the RASCHEMA ID.
+
+ The 'sponsor' and 'c-sponsor' attribute types are defined in Sections
+ 2.3.74 and 2.3.75 of the RASCHEMA ID.
+
+ Any combination of these attribute types and their collective forms
+ as instances within a common 'registration' entry is acceptable so
+ long as the respective reference values are unique in context.
+
+3.2.4.14. 'rADITProfile'
+
+ This attribute type references optimal 'rADUAConfig' configuration
+ settings stored within entries in an RA DIT. This information is
+ meant for direct consumption by RA DUAs.
+
+ Use of this attribute type is only meaningful in situations where
+ multiple independent RA DITs are served by a single RA DSA.
+
+ Instances of this type MUST NOT be assigned to entries which bear the
+ 'rARegistration' and/or 'rARegistrant' attribute types.
+
+ See the RADSA ID for details regarding use of this attribute type.
+
+ This type is defined in Section 2.3.94 of the RASCHEMA ID.
+
+3.2.4.15. 'rARegistrationBase' and 'rARegistrantBase'
+
+ These attribute types contain references to the registration and
+ registrant bases within an RA DIT. The RA DUA reads these values
+ to determine where particular operations shall be conducted.
+
+
+
+Coretta Expires August 27, 2024 [Page 30]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Instances of these types MUST NOT be assigned to entries which bear
+ the instances of the 'rADITProfile' attribute type.
+
+ See the RADSA ID for details regarding use of this attribute type.
+
+ These attribute types are defined in Sections 2.3.95 and 2.3.96 of
+ the RASCHEMA ID respectively.
+
+3.2.4.16. 'registeredUUID'
+
+ This attribute type is intended to store a UUID value in hexadecimal
+ form that is equivalent to the 'n' value held by the same entry.
+
+ For example, consider the registration "{joint-iso-itu-t(2) uuid(25)
+ ans(987895962269883002155146617097157934)}":
+
+ 'n' - 987895962269883002155146617097157934
+ 'registeredUUID' - 00be4308-0c89-1085-8ea0-0002a5d5fd2e
+
+ The two values are identical; 'n' is simply being represented as an
+ unsigned 128-bit integer and 'registeredUUID' is the equivalent value
+ represented via hexadecimal encoding.
+
+ This type is meant for use in the context of ITU-T Rec. X.667 and is
+ defined within Section 2.3.102 of the RASCHEMA ID.
+
+3.2.4.17. 'description'
+
+ The 'description' attribute type is defined within Section 2.5 of
+ [RFC4519] and clause 6.5.1 of ITU-T Rec. X.520. This attribute type
+ is included within the MAY clauses of certain object classes extended
+ by this ID series.
+
+ The purpose of the 'description' attribute type in the context of a
+ 'registration' entry is to assign the effective "title" of the entry.
+
+ For example, the 'description' of the '1.3.6.1.4.1.56521.101.3.1.3'
+ OID would read 'The Three Dimensional Model'. This value is meant
+ to be distinct from, and far less verbose than, any value assigned to
+ the 'registrationInformation' type.
+
+ While there is no specific use case for 'registrant' entries within
+ the terms of this ID series, the 'description' attribute type is
+ nonetheless permitted.
+
+3.2.4.18. 'seeAlso'
+
+ The 'seeAlso' attribute type is defined in Section 2.30 of [RFC4519]
+ and clause 6.10.6 of ITU-T Rec. X.520.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 31]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Under the terms of this ID series, the 'seeAlso' attribute type is
+ used to describe associations between multiple entries of related
+ context, and is made available through use of certain object classes
+ extended by this ID series.
+
+ To offer a practical use case, the OID which identifies the Kingdom
+ of the Netherlands Registration Authority (0.2.205) also refers to
+ the OID 0.2.204 and vice versa. This is the most common use case.
+
+ The 'seeAlso' attribute type may also be used to provide a reverse
+ associative context to registrants in terms of which registrations
+ are subject to its ministrations. This is the reversed concept of
+ 'firstAuthority', 'currentAuthority' and 'sponsor' type instances,
+ however this use case is typically not required outside of certain
+ audit related activities.
+
+3.2.4.19. Spatial References
+
+ Section 2.3 of the RASCHEMA ID extends eleven (11) attribute types
+ that describe both the horizontal and vertical arrangement of various
+ sibling, superior and subordinate registrations using the respective
+ DNs of entries. These attribute types may be used in any directory
+ model defined in this ID series, and many are extended by way of the
+ 'spatialContext' class defined in Section 2.5 of the RASCHEMA ID.
+
+ The RA DIT SHALL NOT utilize both a non-collective and collective
+ spatial attribute type of the same spirit. For example, it is NOT
+ permitted for a registration entry to bear instances of both the
+ 'topArc' and 'c-topArc' types -- regardless of respective values.
+
+ The RA DIT MAY, however, utilize both non-collective and collective
+ spatial types of differing forms. For example, it is permitted for a
+ registration to bear instances of the 'c-topArc' and 'supArc' types.
+
+ References of any attribute type prefaced with the 'c-' flag implies
+ Collective Attribute operation. Positive support for this feature on
+ part of the RA DSA(s) in question is REQUIRED for use of these types.
+
+ With the exception of the 'subArc' attribute type, all spatial types
+ extended through this ID series are meant for SINGLE-VALUE contextual
+ use cases -- including collective spatial types.
+
+3.2.4.19.1. Horizontal Sibling References
+
+ The 'minArc', 'maxArc', 'leftArc' and 'rightArc' attribute types are
+ defined in order to describe horizontal relationships among sibling
+ registrations. The following diagram describes these relationships:
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 32]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ example registration
+ (1.3.6.1.4.1.56521.999.140)
+ |
+ less than < | > greater than
+ +---+--------+---+---+---+--------+---+
+ | 0 |........|139|140|141|........|200|
+ +---+--------+---+---+---+--------+---+
+ | | | |
+ minimum left right maximum
+
+ To offer an example of these relationships expressed as an LDIF:
+
+ dn: n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: spatialContext
+ ou=Registrations,o=rA
+ leftArc: n=139,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ rightArc: n=141,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ minArc: n=0,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ maxArc: n=200,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+
+ The 'minArc' and 'maxArc' types describe the absolute extremes of a
+ set of sibling registrations, where 'minArc' describes the absolute
+ "first" registration in a set of sibling registrations and 'maxArc'
+ describes the absolute "final" registration. The 'c-minArc' and
+ 'c-maxArc' collective variants serve the same function, except they
+ are meant for assignment to an entire set of sibling registrations.
+
+ Determination of so-called "first" and "final" status is based upon
+ the lowest and highest values of the 'n' attribute type present in
+ the set of sibling registrations. The definitive values MUST ALWAYS
+ be consistent for ALL sibling registration entries without exception.
+
+ See the RADUA ID for considerations relating to RA DUA queries
+ of a set of siblings terminated using a 'registrationRange' value,
+ whether the range is finite or infinite in nature.
+
+ The 'leftArc' and 'rightArc' types describe the immediate sibling
+ registrations horizontally adjacent to the bearer. The 'leftArc'
+ type references the DN of the nearest sibling registration with an
+ 'n' value less than that of the bearer, while the 'rightArc' type
+ references the DN of the nearest sibling registration with an 'n'
+ value greater than that of the bearer.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 33]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Contrary to minimum and maximum values, the effective left and right
+ values are always registration specific, and shall not be considered
+ valid candidates for collective assignment. This exposes a potential
+ administrative challenge in the midst of many sibling entries.
+
+ In cases where 'leftArc' and 'minArc' would share a common value,
+ both values should be specified for optimal client support.
+
+ In cases where 'rightArc' and 'maxArc' would share a common value,
+ both values should be specified for optimal client support.
+
+3.2.4.19.1.1. Collective Use
+
+ The 'minArc' and 'maxArc' attribute types have collective variants,
+ identified by identical names prefaced with the requisite 'c-' flag.
+ Use of these collective attributes instead of their non-collective
+ incarnations can greatly ease the cost and tedium of the management
+ of potentially huge sets of sibling entries.
+
+ As the 'c-minArc' and 'c-maxArc' attribute types relate to a minimum
+ and maximum number form common to multiple siblings, the appropriate
+ 'subtreeSpecification' value MUST be limited to ONLY the immediate
+ children of the specified parent:
+
+ "{ base 'n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1',
+ minimum 1, maximum 1 }"
+
+3.2.4.19.2. Superior Vertical References
+
+ The 'supArc' and 'topArc' attribute types are used to reference the
+ DNs of the immediate superior registration as well as the appropriate
+ root registration.
+
+ dn: n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: spatialContext
+ topArc: n=1,ou=Registrations,o=rA
+ supArc: n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+
+ Superior vertical references, in general, are far simpler to manage
+ and implement as compared to subordinate vertical references because
+ of their unchanging nature.
+
+ In cases where 'supArc' and 'topArc' would share a common value,
+ both values should be specified for optimal client support.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 34]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+3.2.4.19.2.1. Collective Use
+
+ The collective form of these types, as identified by identical names
+ prefaced with the requisite 'c-' flag, serve an identical function
+ but on a grand scale. Using the 'c-topArc' attribute type can allow
+ potentially millions of subordinate registrations to bear the correct
+ root arc DN without the need for manual input.
+
+ As the 'c-supArc' attribute type relates to the immediate vertical
+ association, the appropriate 'subtreeSpecification' value MUST be
+ limited to ONLY the immediate children of the specified parent:
+
+ "{ base 'n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1',
+ minimum 1, maximum 1 }"
+
+ As the 'c-topArc' attribute type is in service to a vertically global
+ association for ALL subordinate registrations without exception, the
+ appropriate 'subtreeSpecification' value MUST NOT be limited to any
+ particular hierarchical depth. Assuming the three dimensional model
+ is in use, the 'subtreeSpecification' setting should reflect the
+ following value for all ISO ("{iso(1)}") registrations:
+
+ "{ base 'n=1' }"
+
+3.2.4.19.3. Subordinate Vertical References
+
+ The multi-valued 'subArc' attribute type defined in the RASCHEMA ID
+ allows the storage of immediate subordinate registration DNs for a
+ (parent) registration. Client architectures which read the values
+ assigned to this type will receive an effective "list" of any and
+ all subordinate registrations for the given registration.
+
+ This attribute type exists solely to facilitate a performant means of
+ subordinate registration DN enumeration. This is the RECOMMENDED
+ alternative to explicit List Operations, which may prove to be costly
+ in the midst of particularly large sets of subordinate registrations.
+
+ For instance:
+
+ dn: n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ objectClass: registration
+ objectClass: arc
+ objectClass: spatialContext
+ subArc: n=1,n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ subArc: n=2,n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+ subArc: n=3,n=140,n=999,n=56521,n=1,n=4,n=1,n=6,n=3,n=1,
+ ou=Registrations,o=rA
+
+
+
+Coretta Expires August 27, 2024 [Page 35]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ Instead, enumerated subordinate registration DNs may be retrieved
+ by way of the Read Operation of the superior entry. When retrieved,
+ the RA DUA reads subordinate entries using DN references alone.
+
+ One of the administrative challenges of this approach is the (proper)
+ ordering of respective DNs assigned to this type. Depending on the
+ manner in which data was originally written to the RA DIT, sequential
+ ordering of numeric (leaf-node) values may not manifest as expected.
+
+ Certain X.500/LDAP implementations allow sorting of DN-based entry
+ values, such as 'member' (per Section 2.17 of [RFC4519]) for large
+ groups or email distribution lists. Sorting of this form may be
+ possible, though at the risk of RA DSA performance penalties.
+
+ Alternatively, the RA DUA MAY perform the necessary sort operation if
+ it is given this capability.
+
+4. IANA Considerations
+
+ There are no requests to IANA in this document.
+
+5. Security Considerations
+
+5.1. Access Control
+
+ See Section 4.3 of the RADSA ID for access control considerations.
+
+5.2. Creation and Modification Identities
+
+ If the operational attributes 'creatorsName' and/or' 'modifiersName'
+ (as defined in Sections 3.4.1 and 3.4.3 of [RFC4512] respectively)
+ are exposed, directory architects MAY opt to use Proxy Authorization
+ Controls, per [RFC4370], to allow an asserted (proxied) identity to
+ effect the necessary changes without exposing the true identity.
+
+ An appropriate proxy identity could be the distinguished name of the
+ registrant referenced by the 'currentAuthority' or 'sponsor' types,
+ or even a given registration entry itself. In either case, this will
+ require [RFC4370] support -- a topic out of scope for this ID.
+
+6. References
+
+6.1. Normative References
+
+ RADIR Coretta, J., "The OID Directory: A Technical Roadmap",
+ draft-coretta-oiddir-roadmap, February 2024.
+
+ RADSA Coretta, J., "The OID Directory: The RA DSA",
+ draft-coretta-oiddir-radsa, February 2024.
+
+ RADUA Coretta, J., "The OID Directory: The RA DUA",
+ draft-coretta-oiddir-radua, February 2024.
+
+Coretta Expires August 27, 2024 [Page 36]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ RASCHEMA Coretta, J., "The OID Directory: The RA Schema",
+ draft-coretta-oiddir-schema, February 2024.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
+ Directory Access Protocol (LDAP)", RFC 3671, December
+ 2003.
+
+ [RFC4511] J. Sermersheim, Ed. "Lightweight Directory Access Protocol
+ (LDAP): The Protocol", RFC 4511, June 2006.
+
+ [RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): Directory Information Models", RFC 4512, June
+ 2006.
+
+ [RFC4517] Legg, Ed., S., "Lightweight Directory Access Protocol
+ (LDAP): Syntaxes and Matching Rules", RFC 4517, June
+ 2006.
+
+ [RFC4519] Sciberras, Ed., A., "Lightweight Directory Access Protocol
+ (LDAP): Schema for User Applications", RFC 4519, June
+ 2006.
+
+ [RFC4524] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): COSINE LDAP/X.500 Schema", RFC 4524, June 2006.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", RFC 8174, May 2017.
+
+ [X.660] International Telecommunication Union - Telecommunication
+ Standardization Sector, "General procedures and top arcs
+ of the international object identifier tree", ITU-T X.660,
+ July 2011.
+
+ [X.680] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Abstract Syntax Notation One
+ (ASN.1): Specification of basic notation", ITU-T X.680,
+ July 2002.
+
+6.2. Informative References
+
+ [RFC1155] Rose, M., "Structure and Identification of Management
+ Information for TCP/IP-based Internets", RFC 1155, May
+ 1990.
+
+ [RFC2696] C. Weider, A. Herron, A. Anantha, Microsoft, T. Howes
+ and Netscape, "LDAP Control Extension for Simple Paged
+ Results Manipulation", RFC 2696, September 1999.
+
+
+
+Coretta Expires August 27, 2024 [Page 37]
+
+Internet-Draft The OID Directory: RA DIT February 2024
+
+
+ [RFC4370] Weltman, R., "Lightweight Directory Access Protocol
+ (LDAP): Proxy Authorization Control", RFC 4370, February
+ 2006.
+
+ [X.500] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Overview of
+ concepts, models and services", ITU-T X.500, October 2019.
+
+ [X.501] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Models", ITU-T
+ X.501, October 2016.
+
+ [X.518] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Procedures for
+ distributed operation", ITU-T X.518, October 2019.
+
+ [X.525] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Replication",
+ ITU-T X.525, October 2019.
+
+ [X.672] International Telecommunication Union - Telecommunication
+ Standardization Sector, "OID resolution system: Problems,
+ requirements and potential solutions", ITU-T X.672, March
+ 2020.
+
+ [PRIVATE] IANA, "Private Enterprise Numbers",
+ https://www.iana.org/assignments/enterprise-numbers.
+
+Author's Address
+
+ Jesse Coretta
+ California, United States
+
+ Email: jesse.coretta@icloud.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 38]
diff --git a/docs/specs/draft-coretta-oiddir-radsa-00.txt b/docs/specs/draft-coretta-oiddir-radsa-00.txt
new file mode 100644
index 000000000..5e0093735
--- /dev/null
+++ b/docs/specs/draft-coretta-oiddir-radsa-00.txt
@@ -0,0 +1,697 @@
+
+
+RADSA J. Coretta
+Internet-Draft February 29, 2024
+Intended status: Experimental
+Obsoletes: X660LDAP
+Expires: August 27, 2024
+
+
+ The OID Directory: The RA DSA
+ draft-coretta-oiddir-radsa-00.txt
+
+Abstract
+
+ In service to the "OID Directory" ID series, this ID covers design
+ considerations and basic requirements for the server component of
+ the OID Directory Registration Authority client/server model.
+
+ See the RADIR ID for a complete draft series manifest.
+
+Status of This Memo
+
+ This Internet-Draft is submitted in full conformance with the
+ provisions of BCP 78 and BCP 79.
+
+ Internet-Drafts are working documents of the Internet Engineering
+ Task Force (IETF). Note that other groups may also distribute
+ working documents as Internet-Drafts. The list of current Internet-
+ Drafts is at https://datatracker.ietf.org/drafts/current/.
+
+ Internet-Drafts are draft documents valid for a maximum of six months
+ and may be updated, replaced, or obsoleted by other documents at any
+ time. It is inappropriate to use Internet-Drafts as reference
+ material or to cite them other than as "work in progress."
+
+ This Internet-Draft will expire on August 27, 2024.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 1]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Conventions ................................................2
+ 1.2. Acronyms Used ..............................................2
+ 1.2.1. Definitions ...........................................3
+ 1.3. Intended Audience ..........................................3
+ 2. The RA DSA ......................................................3
+ 2.1. Defined Parameters .........................................3
+ 2.2. Core Capabilities ..........................................4
+ 2.2.1. Schema Availability ...................................4
+ 2.2.2. Content Facility ......................................5
+ 2.2.3. Access Medium .........................................5
+ 2.2.4. Operations ............................................5
+ 2.3. Optimizations ..............................................6
+ 2.3.1. Collective Attributes .................................6
+ 2.3.2. Attribute Value Uniqueness ............................6
+ 2.3.3. Attribute Value Constraints ...........................7
+ 2.3.4. Proxy Authorization ...................................7
+ 2.3.5. Distribution ..........................................7
+ 2.3.6. Root DSE Extensibility ................................8
+ 2.3.7. Content Replication ...................................9
+ 3. IANA Considerations .............................................9
+ 4. Security Considerations .........................................9
+ 4.1. Confidentiality ............................................9
+ 4.2. Network Exposure ...........................................9
+ 4.3. Access Control ............................................10
+ 5. References .....................................................10
+ 5.1. Normative References ......................................10
+ 5.2. Informative References ....................................11
+ Author's Address ..................................................12
+
+1. Introduction
+
+ The X.500 Directory System Agent represents the provider of directory
+ services to be leveraged by clients. Within the context of this ID
+ series, it houses an information base and potentially extends certain
+ features meant to facilitate effective management of and/or access to
+ OID registration and registrant content.
+
+1.1. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
+ and "OPTIONAL" in this document are to be interpreted as described
+ in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in
+ all capitals, as shown here.
+
+1.2. Acronyms Used
+
+ See Section 1.3 of the RADIR ID for all acronym references.
+
+
+Coretta Expires August 27, 2024 [Page 2]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+1.2.1. Definitions
+
+ The composite acronym "RA DSA" is hereby introduced within this ID.
+ The acronym abbreviates the aforementioned 'Registration Authority
+ Directory System Agent' term, which describes the 'server' component
+ implied within the client/server model construct relevant to this ID
+ series.
+
+ The composite acronym "RA DIT" used throughout this ID is defined in
+ Section 1.2.1 of the RADIT ID.
+
+ The composite acronym "RA DUA" used throughout this ID is defined in
+ Section 1.2.1 of the RADUA ID.
+
+1.3. Intended Audience
+
+ This ID is intended for X.500/LDAP architects and administrative
+ personnel tasked with designing, supporting and/or maintaining any
+ number of RA DSAs within the terms of this ID series.
+
+ General familiarity with the broad X.500/LDAP specification, as well
+ as with the RASCHEMA, RADUA and RADIT IDs is STRONGLY
+ RECOMMENDED.
+
+2. The RA DSA
+
+ The RA DSA is a traditional X.500/LDAP server -- fully compliant with
+ the core standards defined throughout ITU-T Rec. [X.500], [RFC4510],
+ et al., that has been OPTIMIZED for use within the terms of this ID
+ series.
+
+2.1. Defined Parameters
+
+ The RA DSA MAY support either DAP or LDAP operation, or both. No
+ specific recommendations are made with regards to the nature of any
+ networking elements, such as use of the OSI stack or TCP/IP.
+
+ Native services and protocols managed in parallel by the RA DSA --
+ such as DOP or DSP -- have no specific function within the terms of
+ this ID series and thus are unimportant. Replication services such
+ as DISP, however, may be indicated in certain scenarios to enhance
+ the performance and reliability of an implementation; a concept that
+ is largely out of scope for this ID series.
+
+ No particular software license applied to the RA DSA is assumed.
+
+ Within the operational terms of this ID series, the RA DSA MUST fully
+ support the Search and Read operations -- as executed by any RA DUAs
+ interacting with the service -- for the purpose of entry retrieval as
+ it pertains to registration and registrant contexts.
+
+
+
+Coretta Expires August 27, 2024 [Page 3]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+ The RA DSA may or may not allow write-based operations -- such as Add
+ or Modify -- to be executed by client entities. This may be due to
+ the access control model employed by the RA DSA, shadowing contexts
+ or some other condition in effect.
+
+2.2. Core Capabilities
+
+ The core capabilities defined in this section represent features that
+ are assumed to be common to virtually any practical implementation of
+ the RA DSA component. These are REQUIRED in virtually all cases.
+
+2.2.1. Schema Availability
+
+ The RA DSA cannot effectively serve or manage an RA DIT without the
+ appropriate directory schema definitions. The RA DSA MUST allow for
+ the inclusion of such definitions.
+
+ Section 2 of the RASCHEMA ID defines many suitable attribute type,
+ object class and name form definitions for use in creating a viable
+ RA DIT to be served by way of the RA DSA. Examples involving use of
+ these definitions can be found throughout the RADIT ID as well
+ as this document.
+
+ The RA DSA MUST have up-to-date knowledge of all attribute types and
+ object classes defined in Sections 2.3 and 2.5 of the RASCHEMA ID
+ respectively. This is an absolute requirement. The RA DSA MUST also
+ be prepared to support sub typed attribute types. See the beginning
+ of Section 2.3 of the RASCHEMA ID for dependency details.
+
+ Sections 4.1.1 and 4.1.2 of [RFC4512] and clauses 13.3.3 and 13.4.8
+ of ITU-T Rec. [X.501] define the object class and attribute type
+ definition syntaxes respectively.
+
+ The inclusion of name form definitions defined in Section 2.7 of the
+ RASCHEMA ID is RECOMMENDED ONLY if support for DIT structure rules
+ is positive within the directory architecture. These name forms are
+ designed to enforce the certain recommended DN syntax schemes based
+ on the intended directory structure, however they serve no purpose if
+ they are not referenced by any DIT structure rules.
+
+ This ID series does not officially define any DIT structure rules,
+ leaving that task to RA DSA administrative personnel because of the
+ significant variations in their creation that are likely to manifest
+ among various implementations of this ID.
+
+ Section 4.1.7 of [RFC4512] and clause 13.7 of ITU-T Rec. [X.501]
+ cover the DIT structure rule and name form definitions.
+
+ No DIT content rule definitions are defined within this ID series for
+ the same reasons stated regarding DIT structure rules. These types
+ of definitions are better suited for tailored design rather than mass
+ adoption.
+
+Coretta Expires August 27, 2024 [Page 4]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+ DIT content rules are covered in Section 4.1.6 of [RFC4512] as well
+ as within clause 13.8 of ITU-T Rec. [X.501].
+
+2.2.2. Content Facility
+
+ The RA DSA has no practical purpose unless usable content exists and
+ is facilitated in some manner, likely for consumption by clients and
+ other DSAs.
+
+ Facilitation may involve local storage of content, or distributed
+ sourcing from external sources into a backend, or storage area.
+
+ This ID makes no recommendations that specifically influence the
+ design or operation of any content source facility. These concepts,
+ and the available options, may differ greatly among the various
+ X.500/LDAP DSA products available today.
+
+2.2.3. Access Medium
+
+ Although no specific medium or protocol is implied, this ID assumes
+ that any implemented RA DSA service is accessible and fosters some
+ manner of interaction with relevant individuals, entities or local
+ services.
+
+2.2.4. Operations
+
+ Depending on both the nature of the implementation and the RA DSA
+ itself, certain operations -- such as those defined throughout ITU-T
+ Rec. [X.511] and [RFC4511], et al -- to be executed by the RA DUA
+ MUST be supported.
+
+ This section identifies operations common between DAP and LDAP, and
+ establishes generalized terms for the purpose of brevity throughout
+ this ID. As these operations apply to both RA DUAs and RA DSAs, they
+ are cited through Sections 1.7 and 1.8 of the RADIR ID.
+
+ Note that operations not explicitly used for any procedure defined
+ in this ID series -- such as the Bind Operation -- are not covered.
+
+ The DAP Search, DAP List and LDAP Search operations are the most
+ critical of those required by the RA DUA construct, and is necessary
+ for a variety of procedures involving registration and registrant
+ contexts. Often, search operations may be used as a prelude to the
+ execution of other actions, such as registration allocations.
+
+ The DAP Add Entry or LDAP Add operations represent the means of
+ creating new registration and registrant entries within the RA DIT.
+
+ The DAP Modify DN or LDAP Modify DN operations are only used within
+ the terms of this ID series for the purpose of relocating submitted
+ registration or registrant entries previously located in a request
+ staging area following an approval process.
+
+Coretta Expires August 27, 2024 [Page 5]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+ The DAP Modify Entry or LDAP Modify operations are used for the
+ routine modification of authority-related contact information and
+ occasionally registrations.
+
+ The DAP Remove Entry or LDAP Delete operations are used for the
+ occasional removal of registrant information, and in considerably
+ rare cases the removal of registrations.
+
+2.3. Optimizations
+
+ Throughout this ID series, certain specialized capabilities are cited
+ in reference to a particular condition or task within the RA DIT and
+ the RA DUA. The following subsections briefly describe features that
+ may be facilitated by way of the RA DSA, and how they fit into the
+ "OID Directory" philosophy.
+
+ Please note that while some of these topics are DIT focused, certain
+ features must first be supported and somehow enabled within the RA
+ DSA(s) in question.
+
+ Directory architects may use these subsections when considering a
+ potential X.500/LDAP directory product for use related to this ID
+ series, given specific requirements.
+
+2.3.1. Collective Attributes
+
+ Attribute types can be applied for an entire subtree context by way
+ of collective attributes, defined within [RFC3671], [RFC3672] and
+ ITU-T Rec. [X.501].
+
+ In particularly large and mission-critical implementations of this ID
+ series, this may be a CRITICAL feature.
+
+ The RASCHEMA ID defines several collective types for use within the
+ terms of this ID series. The RADIT ID provides examples regarding
+ use of the 'subtreeSpecification' type to that end.
+
+2.3.2. Attribute Value Uniqueness
+
+ Depending on the indicated attribute type(s) and relative context, it
+ may be necessary to limit content to singular instances within the RA
+ DIT or a specific subtree. One example of this is ensuring that only
+ unique instances of the 'aSN1Notation' or 'iRI' attribute types exist
+ within the relevant portions of the directory.
+
+ If it is not possible to ensure uniqueness among specified values
+ as recommended by some reasonable means, this ID series may not be
+ practical for adoption in certain mission-critical scenarios.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 6]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+2.3.3. Attribute Value Constraints
+
+ The syntactical constraints afforded by the OID Directory schema, as
+ defined in Section 2 of the RASCHEMA ID, do not thoroughly conform
+ to the constraints defined by the underlying standards -- for example
+ ITU-T Recommendations [X.660] and [X.680] -- upon which this ID
+ series is conceptually based. This concern is mentioned in Section
+ 2.1 of the RASCHEMA ID.
+
+ Section 2.3 of the RASCHEMA ID references or defines appropriate
+ ABNF productions for every attribute type defined. This is done to
+ aid adopters in constraining values to conform with originating
+ standards, as opposed to reliance upon attribute syntax alone.
+
+ If it is not possible to constrain values using the ABNF productions
+ as recommended by some reasonable means, this ID series may not be
+ practical for adoption in certain mission-critical scenarios.
+
+2.3.4. Proxy Authorization
+
+ In certain implementations of this ID series, it may be advantageous
+ for the RA DSA to support the Proxy Authorization Control [RFC4370]
+ and the capability it extends.
+
+ In scenarios where end users are authorized to modify certain entries
+ for which they are authoritative or responsible in some manner, it is
+ often desirable for personal details -- such as a DN reference which
+ contains a full legal name -- to remain unexposed through instances
+ of certain attribute types such as 'modifiersName' or 'creatorsName'
+ that may be visible to a large user base.
+
+2.3.5. Distribution
+
+ Though not specifically recommended through this ID series, the RA
+ DIT may represent only a single component of a larger information
+ base. This may be especially common in the case of official public
+ facing RAs, where the information base as a whole is fractured in the
+ contexts of origin and authority.
+
+ Depending on the implementation factors, the nature of distribution
+ could manifest through any combination of referrals, chaining and
+ replication.
+
+ While no recommendations for or against any of these features can be
+ made, this ID series acknowledges the likelihood and importance of
+ such design strategies. At no point in this ID series do any of the
+ concepts or procedures set forth conflict with, preclude or require
+ any of these capabilities.
+
+ The concepts of the distributed directory are covered throughout
+ ITU-T Rec. [X.518]. Directory replication is discussed throughout
+ ITU-T Rec. [X.525].
+
+Coretta Expires August 27, 2024 [Page 7]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+2.3.6. Root DSE Extensibility
+
+ For advertisement of optimal settings for consumption by clients in
+ order to effectively interact with an RA DIT, the root DSE served by
+ the relevant RA DSA(s) MUST support entry extensions of the Root DSE.
+
+ This involves the addition of relevant attribute types extended by
+ way of the 'rADUAConfig' AUXILIARY object class defined in Section
+ 2.5 of the RASCHEMA ID.
+
+ RA DUAs that comply with Section 2.2.2 of the RADUA ID will attempt
+ retrieval of this additive content from the root DSE -- by way of the
+ Read Operation -- and will adjust their behaviors accordingly.
+
+ The root DSE is discussed in Section 5 of [RFC4512] and in Section 10
+ Clause 23.4.2 of ITU-T Rec. [X.501].
+
+ The following subsections offer examples regarding the extension of
+ the root DSE and the distinct RA DUA configuration options available.
+
+ These examples are expressed as LDIF. Note that other attribute type
+ and object class instances unrelated to this ID series may be present
+ within the root DSE and may be disregarded.
+
+2.3.6.1. Single RA DIT
+
+ The following example is the partial representation of the root DSE
+ as it pertains to the advertisement of RA DUA configuration settings
+ for implementations involving a single RA DIT.
+
+ dn:
+ objectClass: rADUAConfig
+ rARegistrationBase: ou=Registrations,o=rA
+
+2.3.6.2. Multiple RA DITs
+
+ The following example is the partial representation of the root DSE
+ as it pertains to the advertisement of RA DUA configuration settings
+ for implementations involving multiple RA DITs.
+
+ dn:
+ objectClass: rADUAConfig
+ rADITProfile: dc=example,dc=com
+ rADITProfile: o=example
+
+ The following examples are the example root suffix entries referenced
+ by way of the 'rADITProfile' attribute type instances added to the
+ root DSE.
+
+ These example entries have been modified to include the 'rADUAConfig'
+ AUXILIARY object class, which is expected and required by the RA DUA.
+
+
+Coretta Expires August 27, 2024 [Page 8]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+ dn: dc=example,dc=com
+ objectClass: domain
+ objectClass: rADUAConfig
+ rARegistrationBase: ou=Registrations,dc=example,dc=com
+
+ dn: o=example
+ objectClass: organization
+ objectClass: rADUAConfig
+ rARegistrationBase: ou=OIDs,o=example
+
+ The 'domain' STRUCTURAL object class is defined in Section 3.4 of
+ [RFC4524]. The 'organization' STRUCTURAL object class is defined
+ in Section 3.8 of [RFC4519].
+
+2.3.7. Content Replication
+
+ Depending on the desired fault tolerance of an implementation, as
+ well as the authoritative layout and placement of registration data,
+ use of a directory replication system -- such as DISP or some other
+ proprietary solution of similar design -- may be indicated.
+
+ This may be especially important in public-facing RA implementations
+ in which various registration subtrees are sourced from appropriate
+ authorities and served as shadowed information.
+
+ DISP originates in ITU-T Rec. [X.525].
+
+3. IANA Considerations
+
+ There are no requests to IANA in this document at this time.
+
+4. Security Considerations
+
+4.1. Confidentiality
+
+ Network security mechanisms -- such as TLS or IPSEC VPN -- may be
+ indicated when an RA DSA allows authenticated logins or disclosure
+ of sensitive entries by authorized parties. This is especially true
+ for cases in which the RA DUA is not local to the RA DSA.
+
+ This ID makes no recommendations regarding "Best Practices", strength
+ factors or key generation strategies, nor does any of subject matter
+ set forth in this ID necessarily rely on any such concepts.
+
+4.2. Network Exposure
+
+ Historically, it is unusual for an X.500/LDAP service to be directly
+ accessible over public networks in an overt or advertised fashion.
+
+ While there may be precedents for this sort of exposure, this ID has
+ no official position regarding this strategy.
+
+
+Coretta Expires August 27, 2024 [Page 9]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+ Depending on the scope of implementation as well as the potential use
+ of referrals and/or synchronization, limited levels of exposure could
+ be required of any number of RA DSAs.
+
+4.3. Access Control
+
+ It is RECOMMENDED that potentially sensitive content within an RA DIT
+ -- such as any personal authority contact details or private subtrees
+ of registrations -- be safeguarded from unauthorized access.
+
+ It is also RECOMMENDED that RA DIT content modifications be limited
+ only to authorized entities, such as administrative personnel and/or
+ parties serving in authority for the respective entries.
+
+ The topic of access control mechanisms available through the various
+ X.500/LDAP products available today is well outside of scope for this
+ ID series. Generally, adoption of the models defined in clause 8 of
+ ITU-T. Rec. [X.501], or some other mechanism, is indicated.
+
+5. References
+
+5.1. Normative References
+
+ RADIR Coretta, J., "The OID Directory: A Technical Roadmap",
+ draft-coretta-oiddir-roadmap, February 2024.
+
+ RADIT Coretta, J., "The OID Directory: The RA DIT",
+ draft-coretta-oiddir-radit, February 2024.
+
+ RADUA Coretta, J., "The OID Directory: The RA DUA",
+ draft-coretta-oiddir-radua, February 2024.
+
+ RASCHEMA Coretta, J., "The OID Directory: The RA Schema",
+ draft-coretta-oiddir-schema, February 2024.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
+ Directory Access Protocol (LDAP)", RFC 3671, December
+ 2003.
+
+ [RFC3672] Zeilenga, K., "Subentries in the Lightweight Directory
+ Access Protocol (LDAP)", RFC 3672, December 2003.
+
+ [RFC4511] J. Sermersheim, Ed. "Lightweight Directory Access Protocol
+ (LDAP): The Protocol", RFC 4511, June 2006.
+
+ [RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): Directory Information Models", RFC 4512, June
+ 2006.
+
+
+Coretta Expires August 27, 2024 [Page 10]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+ [RFC4519] Sciberras, Ed., A., "Lightweight Directory Access Protocol
+ (LDAP): Schema for User Applications", RFC 4519, June
+ 2006.
+
+ [RFC4370] Weltman, R., "Lightweight Directory Access Protocol
+ (LDAP): Proxy Authorization Control", RFC 4370, February
+ 2006.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", RFC 8174, May 2017.
+
+ [X.501] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Models", ITU-T
+ X.501, October 2019.
+
+ [X.511] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Abstract service
+ definition", ITU-T X.511, October 2019.
+
+ [X.518] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Procedures for
+ distributed operation", ITU-T X.518, October 2019.
+
+ [X.525] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Replication",
+ ITU-T X.525, October 2019.
+
+5.2. Informative References
+
+ [RFC4510] Zeilenga, K. "Lightweight Directory Access Protocol
+ (LDAP): Technical Specification Road Map", RFC 4510, June
+ 2006.
+
+ [RFC4524] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): COSINE LDAP/X.500 Schema", RFC 4524, June 2006.
+
+ [X.500] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Overview of
+ concepts, models and services", ITU-T X.500, October 2019.
+
+ [X.660] International Telecommunication Union - Telecommunication
+ Standardization Sector, "General procedures and top arcs
+ of the international object identifier tree", ITU-T X.660,
+ July 2011.
+
+ [X.680] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Abstract Syntax Notation One
+ (ASN.1): Specification of basic notation", ITU-T X.680,
+ July 2002.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 11]
+
+Internet-Draft The OID Directory: RA Server February 2024
+
+
+Author's Address
+
+ Jesse Coretta
+ California, United States
+
+ Email: jesse.coretta@icloud.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 12]
diff --git a/docs/specs/draft-coretta-oiddir-radua-00.txt b/docs/specs/draft-coretta-oiddir-radua-00.txt
new file mode 100644
index 000000000..b5bf82b64
--- /dev/null
+++ b/docs/specs/draft-coretta-oiddir-radua-00.txt
@@ -0,0 +1,1451 @@
+
+
+RADUA J. Coretta
+Internet-Draft February 29, 2024
+Intended status: Experimental
+Obsoletes: X660LDAP
+Expires: August 27, 2024
+
+
+ The OID Directory: The RA DUA
+ draft-coretta-oiddir-radua-00.txt
+
+Abstract
+
+ In service to the "OID Directory" ID series, this ID covers design
+ strategies, requirements and procedures for the client component of
+ the OID Directory Registration Authority client/server model.
+
+ See the RADIR ID for a complete draft series manifest.
+
+Status of This Memo
+
+ This Internet-Draft is submitted in full conformance with the
+ provisions of BCP 78 and BCP 79.
+
+ Internet-Drafts are working documents of the Internet Engineering
+ Task Force (IETF). Note that other groups may also distribute
+ working documents as Internet-Drafts. The list of current Internet-
+ Drafts is at https://datatracker.ietf.org/drafts/current/.
+
+ Internet-Drafts are draft documents valid for a maximum of six months
+ and may be updated, replaced, or obsoleted by other documents at any
+ time. It is inappropriate to use Internet-Drafts as reference
+ material or to cite them other than as "work in progress."
+
+ This Internet-Draft will expire on August 27, 2024.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 1]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Conventions ................................................2
+ 1.2. Acronyms Used ..............................................2
+ 1.2.1. Definitions ...........................................3
+ 1.3. Intended Audience ..........................................3
+ 1.5. Parameter Abstraction ......................................3
+ 2. The RA DUA ......................................................3
+ 2.1. Defined Parameters .........................................4
+ 2.2. Procedures .................................................5
+ 2.2.1. Schema Availability ...................................5
+ 2.2.2. Configuration .........................................5
+ 2.2.3. Queries ..............................................10
+ 2.2.4. New Allocations ......................................17
+ 2.2.5. Allocation Updates ...................................22
+ 3. IANA Considerations ............................................23
+ 4. Security Considerations ........................................23
+ 5. References .....................................................23
+ 5.1. Normative References ......................................23
+ 5.2. Informative References ....................................24
+ Author's Address ..................................................25
+
+1. Introduction
+
+ The X.500 Directory User Agent represents the client component within
+ the traditional client/server model that interacts with any number of
+ X.500 Directory System Agents for the purposes of information access.
+
+ Within the terms of this ID series, the Directory User Agent serves
+ as a client of OID registration and registrant content, as retrieved
+ from a Registration Authority Directory Information Tree.
+
+1.1. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
+ and "OPTIONAL" in this document are to be interpreted as described
+ in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in
+ all capitals, as shown here.
+
+1.2. Acronyms Used
+
+ See Section 1.3 of the RADIR ID for all acronym references. Also,
+ see Sections 1.7 and 1.8 of the RADIR ID for generalized terms and
+ descriptions of significance to this ID series.
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 2]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+1.2.1. Definitions
+
+ The composite acronym "RA DUA" is hereby introduced within this ID.
+ The acronym abbreviates the aforementioned 'Registration Authority
+ Directory User Agent' term, which describes the 'client' component
+ implied within the client/server model relevant to this ID series.
+
+ The composite acronym "RA DSA" used throughout this ID is defined in
+ Section 1.2.1 of the RADSA ID.
+
+ The composite acronym "RA DIT" used throughout this ID is defined in
+ Section 1.2.1 of the RADIT ID.
+
+1.3. Intended Audience
+
+ This ID is intended for application designers, X.500/LDAP architects,
+ and other personnel tasked with supporting or designing components
+ related to the RA client/server model in service to this ID series.
+
+ General familiarity with the broad X.500/LDAP specification, as well
+ all supporting IDs cited in Section 2 of the RADIR ID is STRONGLY
+ RECOMMENDED.
+
+1.4. Parameter Abstraction
+
+ For simplicity in describing certain request or argument parameters
+ involving either DAP or LDAP operations in this ID, a simplified
+ abstraction of ASN.1 parameters is shown to aid RA DUA adopter.
+
+ For example, the following structure may be used to outline the
+ parameters of a Read or Search Operation to be conducted as part
+ of an RA DUA managed procedure.
+
+ baseObject = dn ; DN: see RFC4514 and X.501
+ scope = 0/1/2 ; eq. X.511 'subset'
+ typesOnly = bool or int ; see. X.511 'EntryInformationSelection'
+ ; and RFC4512 'SearchRequest'
+ filter = filter ; see X.511 and RFC4515
+ attributes = selection(s); see. X.511 'EntryInformationSelection'
+ ; and RFC4512 'AttributeSelector'
+
+ While the abstraction has favored the use of LDAP-focused parameters
+ derived from [RFC4511], adopters MAY assume similar directives
+ are applicable within the context of DAP unless otherwise indicated.
+
+2. The RA DUA
+
+ The RA DUA is a traditional X.500/LDAP client -- supporting most or
+ all of the standard operations defined throughout clauses 9 through
+ 12 of ITU-T Rec. X.511, and throughout Section 4 of [RFC4511] --
+ that has been OPTIMIZED for use within the terms of this ID series.
+
+
+Coretta Expires August 27, 2024 [Page 3]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.1. Defined Parameters
+
+ The RA DUA is expected to support the directory protocols facilitated
+ by the endpoint RA DSA(s), whether DAP, LDAP or both. Support for
+ connectivity via the OSI networking stack, TCP/IP or IPC socket by
+ the RA DUA is determined by the operational requirements of the RA
+ DSA(s) in question.
+
+ Support for parallel X.500 protocols -- such as DOP or DSP -- is not
+ specifically indicated.
+
+ No recommendations are made regarding the "appearance" or interactive
+ nature of the RA DUA (i.e.: TUI vs. GUI), nor are any recommendations
+ made regarding the specific language or framework used in its design.
+
+ No particular software license applied to the RA DUA is assumed.
+
+ The intended application may be for any end user in general, or it
+ may be administratively focused. The RA DUA may be obtained by the
+ general public, or it may be wholly proprietary and for internal use
+ only.
+
+ The capabilities of the RA DUA MAY be flexible to suit the end user,
+ or it may be strictly regimented, allowing few variations of behavior
+ in routine operations.
+
+ In situations where an RA DUA is designed solely for the query and
+ presentation of entries with no possibility of support for entry
+ modifications, adopters MAY forego implementation of operational
+ capabilities that are Write-focused in nature.
+
+ Application designers SHOULD make use of ONLY industry-recognized
+ X.500/LDAP APIs, SDKs or libraries in a manner compliant with all
+ "Best Practices" suggested by both the maintainer(s) and the authors
+ of the standards indicated.
+
+ The RA DUA is not necessarily user-managed. An RA DUA may manifest
+ in "clientless" form -- for example, facilitated through a web-based
+ application interface residing on the RA DSA(s) directly, thus acting
+ in the context of an abstract protocol gateway. These strategies may
+ prove useful in reducing both the effort required by the end-user in
+ order to access the service, as well as the costs of supporting the
+ end user.
+
+ Regardless of the design and deployment philosophies employed, the
+ primary focus of the RA DUA -- with particular emphasis on any and
+ all proposed optimizations -- is to reduce the tedium of access and
+ administration of potentially large registration and authority bases,
+ and to introduce protective controls meant to ensure integrity of all
+ relevant content within the RA DIT.
+
+
+
+Coretta Expires August 27, 2024 [Page 4]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.2. Procedures
+
+ The RA DUA SHALL observe the procedures defined in the following
+ subsections as it pertains to the query, allocation and maintenance
+ of 'registration' and 'registrant' entries within an RA DSA.
+
+2.2.1. Schema Availability
+
+ The RA DUA MUST obtain -- or possess complete foreknowledge of -- all
+ schema definitions officially defined in Section 2 of the RASCHEMA
+ ID as well as the schema definitions serving as super types for many
+ of the attribute types defined in Section 2.3 of the RASCHEMA ID.
+
+ In addition, the RA DUA MUST both recognize and honor any additional
+ DIT content rules, DIT structure rules and/or (additional) name forms
+ created by the directory architects or administrators after-the-fact.
+
+ Obtaining the necessary schema definitions is typically conducted in
+ either of the following manners, shown in order of preference.
+
+ - Through a direct Read of the 'subschemaSubentry' of the RA DSA
+ - Through manual processing of the (approved) schema file(s) based
+ upon the complete contents of the RASCHEMA ID
+
+ When obtaining the schema through use of a Read or Search Operation,
+ the schema SHOULD be refreshed at the commencement of a new RA DUA
+ session. This accounts for changes to the schema definitions that
+ may have taken place during runtime.
+
+ If the RA DSA has no apparent knowledge of the definitions to be used
+ for the query and/or allocation of registrations and/or registrants
+ within the RA DIT, the RA DUA MUST abandon attempts to interact with
+ the RA DSA. It is RECOMMENDED that, in this case, the RA DUA present
+ the user with error information describing the problem. This could
+ suggest an RA DSA configuration problem, or possibly that the wrong
+ RA DSA has been targeted by the RA DUA.
+
+2.2.2. Configuration
+
+ There are two (2) modes of RA DUA configuration: automatic or manual.
+
+ Section 2.3 of the RASCHEMA ID introduces a small handful of types
+ intended for "advertisement" by the RA DSA and for consumption by the
+ RA DUA. These attributes are as follows:
+
+ - 'rARegistrationBase' ; ex.: ou=Registrations,o=rA
+ - 'rARegistrantBase' ; ex.: ou=Registrants,o=rA
+ - 'rADirectoryModel' ; ex.: 1.3.6.1.4.1.56521.101.3.1.3
+ - 'rAServiceMail' ; ex.: support@ra.example.com
+ - 'rAServiceURI' ; ex.: https://ra.example.com
+ - 'rADITProfile' ; ex.: dc=example,dc=com
+ - 'rATTL' ; ex.: 86400
+
+Coretta Expires August 27, 2024 [Page 5]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ These attribute types are extended through use of the 'rADUAConfig'
+ AUXILIARY object class. See Section 2.3.6 of the RADSA ID for
+ usable examples involving this class.
+
+ Auto-discovery of these attribute types will require disclosure
+ privileges for the root DSE and any other entries that bear the
+ 'rADUAConfig' object class.
+
+ Though the particulars of the root DSE are well outside the scope of
+ this ID series, it is typically accessed by way of the Read Operation
+ executed upon a NULL baseObject.
+
+ Retrieval SHOULD be made conditional using the 'rADUAConfig' object
+ class as the filter AVA, and SHOULD involve attribute selection of
+ the types shown below.
+
+ filter = objectClass=rADUAConfig ; Require 'rADUAConfig'
+ attributes = rARegistrationBase
+ rARegistrantBase
+ rADirectoryModel
+ rAServiceMail
+ rAServiceURI
+ rADITProfile
+ rATTL
+
+ If zero (0) entries are returned as a result of the Read Operation,
+ this indicates any of the following:
+
+ - The RA DSA is not available
+ - The root DSE is not accessible, possibly due to access rights
+ - The root DSE is accessible, but lacks the 'rADUAConfig' class
+
+ Given any of these conditions, automatic parameter input has failed.
+ The RA DUA has no alternative other than manual parameter input.
+
+ If one (1) entry is returned, the root DSE is accessible and has been
+ configured for automatic input. The RA DUA SHOULD choose to proceed
+ with configuration using the values provided.
+
+ See Section 2.3.6 of the RADSA ID regarding the possible methods
+ for implementation of this entry with respect to multiple RA DITs
+ served by an RA DSA as opposed to a single RA DIT.
+
+ If manual input of configuration values is required, typically this
+ would require foreknowledge of the correct values, or access to an
+ informational resource which makes those values available.
+
+ In this scenario, the RA DUA MUST request the user follow a procedure
+ for manual input prior to use. Lack of proper configuration values
+ precludes any RA DUA session.
+
+
+
+Coretta Expires August 27, 2024 [Page 6]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.2.2.1. Processing
+
+ Following value input -- whether automatic or manual -- the acquired
+ values MUST be processed and validated.
+
+ The following subsections cover each 'rADUAConfig'-extended attribute
+ type in the context of runtime configuration of the RA DUA.
+
+2.2.2.1.1. 'rADITProfile'
+
+ The 'rADITProfile' attribute type stores any number of DN values,
+ each acting as a reference to a DIT-housed 'rADUAConfig' entry
+ which contains the standard configuration parameters required by
+ the RA DUA.
+
+ The 'rADITProfile' attribute type is a CRITICAL component within any
+ implementation in which the following conditions apply:
+
+ - Multiple RA DITs reside on a single RA DSA, with each RA DIT
+ accessed using potentially different configuration values
+ - Single RA DITs which bear usable configuration settings within
+ DIT entry contexts -- as opposed to storage within the root DSE
+
+ In either case, the root DSE SHALL NOT contain any of the attribute
+ types extended by the MAY clauses of the 'rADUAConfig' AUXILIARY
+ object class OTHER THAN the 'rADITProfile', 'rATTL', 'rAServiceMail',
+ and 'rAServiceURI' attribute types.
+
+ Similarly, referenced 'rADUAConfig' entries within an RA DIT SHALL
+ NOT bear instances of the 'rADITProfile' attribute type.
+
+ Instances where these attribute types are improperly combined within
+ entries is considered a "Duplicate RA Context Error" and represents
+ a serious operational deficiency that MUST be reported to the end
+ user. The RA DUA SHOULD fail the session or (optionally) allow for
+ administrative override if corrective measures are to be taken.
+
+2.2.2.1.2. 'rARegistrationBase'
+
+ The 'rARegistrationBase' attribute type is the most CRITICAL of all
+ attribute types related to RA DUA configuration.
+
+ The purpose of this multi-valued type is to store the DN(s) in which
+ 'registration' entries are stored. This parameter is REQUIRED, as it
+ prevents the need for inefficient broad-level Search Operations,
+ potentially within a particularly large directory information tree.
+
+ The RA DUA MUST handle the instance value(s) as follows:
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 7]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ 1. Verify presence and accessibility of entries identified by the
+ respective DN values using the Read Operation
+ 2. Determine whether the given entries bear the 'registration'
+ ABSTRACT object class
+ 2a. If the named entries DO NOT bear the 'registration' class, the
+ RA DUA must interpret the entries as simple organizational
+ containers housing 'registration' entries one (1) level below
+ 2b. If the named entries bear the 'registration' class, this is
+ indicative of an official starting-point for registration
+ content within the "OID Directory"
+ 3. Preserve these DNs for the remainder of the session, as they
+ will influence the various operations that may take place
+
+ In the case of condition "2a", a read-only RA DUA MAY opt to fail the
+ session if no 'registration' entries reside exactly one (1) level
+ beneath the apparent "organizational container" entry. The RA DUA
+ MAY allow for administrative override of this behavior, thereby
+ allowing retroactive registration creation within an implementation
+ not yet populated.
+
+2.2.2.1.3. 'rARegistrantBase'
+
+ The 'rARegistrantBase' attribute type is OPTIONAL in terms of RA DUA
+ configuration. It identifies one (1) or more DNs which lead to the
+ location of authority-related entries within the RA DIT.
+
+ The RA DUA MUST handle the value(s) associated with this type as
+ follows:
+
+ 1. Verify presence and accessibility of entries identified by the
+ respective DN values using the Read Operation
+ 2. Compare the DN values to those within the 'rARegistrationBase'
+ attribute type instance
+ 2a. If the DN values are identical, this implies use of combined
+ authority/registration entries in a single location within the
+ RA DIT -- a procedure that is generally discouraged
+ 2b. If the DN values are different, this implies use of dedicated
+ authority entries, which bear the 'registrant' STRUCTURAL
+ object class and reside in a location separate from that which
+ houses entries bearing the 'registration' STRUCTURAL Object
+ Class
+ 2c. If no DN values are specified within the 'rARegistrantBase'
+ attribute type instance, the RA DUA MAY interpret this as an
+ indication that no authority information is available within
+ the RA DIT, and associated authority attribute types SHOULD
+ NOT be requested by the RA DUA
+
+ In the case of "2a", the RA DUA SHOULD include all attribute types
+ specified within the 'currentAuthorityContext', 'sponsorContext' and
+ 'firstAuthorityContext' 'MAY' clauses for subsequent Read Operations
+ of 'registration' entries.
+
+
+Coretta Expires August 27, 2024 [Page 8]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ In the case of "2b", the RA DUA SHOULD include all attribute types
+ specified within 'currentAuthorityContext', 'sponsorContext' and
+ 'firstAuthorityContext' 'MAY' clauses for subsequent Read Operations
+ of 'registrant' entries.
+
+ Dedicated authority entries bearing the 'registrant' STRUCTURAL
+ object class should be located exactly one (1) level below each
+ specified 'rARegistrantBase' DN value within the RA DIT.
+
+ Depending on the nature of implementation of this ID series, it may
+ or may not be advisable to populate the 'rARegistrantBase' Attribute
+ Type for consumption by all clients indiscriminately. See Section
+ 5.2 of the RADIT ID for security considerations on this topic.
+
+2.2.2.1.4. 'rADirectoryModel'
+
+ The 'rADirectoryModel' type describes the abstract structure of the
+ RA DIT in terms of 'registration' layout and probable DN syntax. The
+ employed model shall have a profound influence on the manner in which
+ the RA DUA shall interact with the RA DIT.
+
+ A specified directory model is REQUIRED for proper functioning of the
+ RA DUA, whether directly or indirectly. The decided model specifier,
+ which MUST be a numeric OID, is declared using the 'rADirectoryModel'
+ attribute type.
+
+ Sections 3.1.2 and 3.1.3 of the RADIT ID define two (2) official
+ directory models and DN syntax schemes identified by the following
+ numeric OIDs:
+
+ - 'twoDimensional' (1.3.6.1.4.1.56521.101.3.1.2)
+ - 'threeDimensional' (1.3.6.1.4.1.56521.101.3.1.3)
+
+ In virtually every case, the 'threeDimensional' model is STRONGLY
+ RECOMMENDED for implementation and use, however RA DUAs SHOULD be
+ prepared to incorporate other models that could be defined in any
+ future extensions to this ID series.
+
+ The RA DUA MUST support use of the 'threeDimensional' model without
+ exception and to the letter of every recommendation set forth within
+ this ID series.
+
+ As stated clearly and in no uncertain terms within the originating
+ document, the 'twoDimensional' model is STRONGLY DISCOURAGED aside
+ from use in non-standard or particularly unusual scenarios.
+
+ The RA DUA MAY support use of the 'twoDimensional' model at the
+ discretion of the application designer. Support for this model
+ is purely OPTIONAL.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 9]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ The RA DUA MUST handle the value of this instance as follows:
+
+ 1. Determine whether the 'rADirectoryModel' attribute type has
+ been set with an explicit numeric OID
+ 1a. If NO numeric OID has been specified, use of the RECOMMENDED
+ 'threeDimensional' model is to be enforced by DEFAULT
+ 1b. If a numeric OID has been specified, identify the value as a
+ known and supported model OID and adjust RA DUA behavior in
+ accordance with prescribed procedures of the RADIT ID
+ 1c. If a numeric OID has been specified and is not immediately
+ identifiable within the terms of this ID series -- such as
+ a future extension of this standard -- the RA DUA MAY defer
+ to the specifics of the recommendation or ID from which the
+ OID originates OR the RA DUA MAY choose to fail the session
+ 2. Preserve the value for the remainder of the session, as it
+ will influence the specifics of operations that may occur
+
+ In the case of condition "1c", if the RA DUA chooses to fail the
+ session, the RA DUA SHOULD present the user with an error message
+ indicating the encounter with an unknown or as-of-yet unsupported
+ directory model identifier.
+
+2.2.2.1.5. Additional Parameters
+
+ The 'rAServiceMail' attribute type, when defined, contains any number
+ of email addresses meant for support or request purposes. Use of
+ this type in the RA DIT is OPTIONAL, but SHOULD be recognized by the
+ RA DUA when present.
+
+ The 'rAServiceURI' attribute type, when defined, contains any number
+ of URI values related to the service, such as terms of use, support
+ information, documentation and other resources. Use of this type in
+ the RA DIT is OPTIONAL, but SHOULD be recognized by the RA DUA when
+ present.
+
+ The 'rATTL' attribute type, when defined for an entry bearing the
+ 'rADUAConfig' class, imposes a global entry caching TTL value meant
+ for consumption and observance by qualified RA DUA implementations.
+ See Section 2.2.3.4 for details and semantics regarding assignment
+ and precedence strategies for a TTL.
+
+2.2.3. Queries
+
+ This subsection covers strictly read-related operations, such as the
+ location and presentation of a given 'registration' entry.
+
+2.2.3.1. Retrieving Entries
+
+ The RECOMMENDED procedure for retrieving an entry -- in any directory
+ model defined in this ID series -- is a Read Operation of the entry
+ by way of its DN. This will return either one (1) entry, or none.
+
+
+Coretta Expires August 27, 2024 [Page 10]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ Foreknowledge of the DN is required for a Read Operation attempt of
+ this fashion.
+
+ If the entry is a 'registration', the DN may be resolved by way of
+ the associated numeric OID using the appropriate process defined in
+ Section 3.1.
+
+ 'registration' entries may reference other 'registration' entries
+ using the spatial attribute types defined in Section 2.3 of the
+ RASCHEMA ID and discussed further in Section 2.2.3.3.
+
+ 'registrant' entries, however, aren't resolvable in any standard
+ manner. These are dedicated authority entries that are normally
+ accessed through references held by any associated 'registration'
+ entries.
+
+ - 'firstAuthority' and/or 'c-firstAuthority'
+ - 'currentAuthority' and/or 'c-currentAuthority'
+ - 'sponsor' and/or 'c-sponsor'
+
+ However, in cases where direct referencing of DNs within the context
+ of a Read Operation is not practical, possibly due to any of the
+ following ...
+
+ - Lack of assigned spatial reference types
+ - An unsupported or incoherent DN syntax is indicated
+ - Administrative operations are underway
+
+ Use of a List Operation or subtree Search Operation may be indicated.
+
+ While this method of searching is not generally recommended within
+ the spirit of this ID series, the RA DUA MAY allow this capability
+ where appropriate.
+
+ If the RA DUA encounters difficulty relating to a particularly large
+ number of entries retrieved through a Search Operation, support for
+ Simple Paged Results Manipulation by the RA DUA may be indicated if
+ supported by the RA DSA. For details, see clause 7.9 of ITU-T Rec.
+ X.511 and the entirety of [RFC2696].
+
+2.2.3.2. Reading Entries
+
+ The following subsections outline the procedures involved in the
+ presentation and analysis of a 'registration' or 'registrant' entry
+ successfully retrieved by way of the Read or Search Operation.
+
+2.2.3.2.1. Entry 'objectClass' Analysis
+
+ Given a successfully conducted Read or Search Operation, and assuming
+ a single entry -- whether 'registration' or 'registrant' -- has been
+ returned, the RA DUA SHOULD first read the 'objectClass' values and
+ make note of all that originate in Section 2.5 of the RASCHEMA ID.
+
+Coretta Expires August 27, 2024 [Page 11]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ The 'registration' ABSTRACT object class is a required class for any
+ OID allocation. This class MUST only appear on entries which bear
+ the 'rootArc' or 'arc' STRUCTURAL class. It is a sub type of the
+ 'top' ABSTRACT class, defined in Section 2.4.1 of [RFC4512] and in
+ clause 13.3.3 of ITU-T Rec. X.501.
+
+ The 'registrant' STRUCTURAL object class is only used for dedicated
+ registrants, which are associated through DN references held by
+ associated 'registration' entries, if any. Appearance upon any
+ other form of entry is a suboptimal or illogical state.
+
+ Presence of the 'x660Context' and/or 'x680Context' AUXILIARY classes
+ for a 'registration' entry is permitted. These object classes extend
+ multiple attribute types which conceptually relate to ITU-T Rec.
+ X.660 and X.680 respectively.
+
+ Presence of the 'x667Context' AUXILIARY class for a 'registration'
+ entry is only expected in cases where an OID allocation involves a
+ 'registeredUUID' attribute type instance and where the assigned 'n'
+ value is the equivalent unsigned 128-bit integer.
+
+ Presence of the 'iTUTRegistration' AUXILIARY class is only permitted
+ for allocations bearing the 'arc' STRUCTURAL class and describe an
+ OID beginning with zero (0). It extends no attribute types.
+
+ Presence of the 'iSORegistration' AUXILIARY class is only permitted
+ for allocations bearing the 'arc' STRUCTURAL class and describe an
+ OID beginning with one (1) It extends no attribute types.
+
+ Presence of the 'jointISOITUTRegistration' AUXILIARY class is only
+ permitted for allocations bearing the 'arc' STRUCTURAL class and
+ describe an OID beginning with two (2). It extends the 'longArc'
+ attribute type.
+
+ Entries SHALL NOT bear more than one (1) of the 'iTUTRegistration',
+ 'iSORegistration' or 'jointISOITUTRegistration' classes.
+
+ Presence of the 'spatialContext' AUXILIARY class is only permitted
+ for 'registration' entries. It extends seven (7) spatial reference
+ attribute types used to describe arrangement of allocations within
+ the spectrum. Additional collective incarnations of some of these
+ attribute types may be indicated.
+
+ Presence of the 'registrationSupplement' AUXILIARY class is only
+ permitted for 'registration' entries. It extends miscellaneous
+ attribute types which extend from no official standards meant for
+ ease-of-use only.
+
+ Collective Attributes are described in [RFC3671].
+
+
+
+
+Coretta Expires August 27, 2024 [Page 12]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ Presence of the 'firstAuthorityContext', 'currentAuthorityContext',
+ and 'sponsorContext' AUXILIARY classes is permitted for 'registrant'
+ entries and 'registration' entries alike, and would depend upon the
+ 'registrant' model employed within the RA DIT. Each of these classes
+ extends several identity and contact related attribute types for use
+ within the context of sponsorship, current authorities and previous
+ authorities.
+
+ Presence of the 'rADUAConfig' AUXILIARY class SHOULD NOT be permitted
+ for 'registration' or 'registrant' entries and indicates a suboptimal
+ or illogical state.
+
+ Assuming no violations were perceived as outlined above, the state of
+ the entry's object class stack is apparently copacetic.
+
+2.2.3.2.2. Attribute Types Used
+
+ At a minimum, the RA DUA SHOULD only expect Attribute Types defined
+ within Section 2.3 of the RASCHEMA ID, and/or their respective
+ super types defined in [RFC4519], [RFC4524] and [RFC2079], to be
+ assigned to entries within the terms of this ID series.
+
+ See Section 3.2 of the RADIT ID for numerous examples regarding
+ various attribute type use cases and requirements.
+
+ The RA DIT MAY use other attribute type and object class definitions
+ unrelated to this ID series, for supplemental reasons, however their
+ incorporation would be wholly proprietary and would have no official
+ standing per this ID series.
+
+2.2.3.2.3. Value Syntax
+
+ Each attribute type, whether directly or indirectly, is governed via
+ a syntax definition in terms of the allowed value(s) to be set for
+ an entry.
+
+ As mentioned in Section 2.1 of the RASCHEMA ID, standard syntaxes
+ do not necessarily align perfectly with the syntactical requirements
+ of the standards upon which this ID series is based -- namely ITU-T
+ Recommendations X.660 and X.680.
+
+ To ease the difficulty in implementing an RA DUA which honors the
+ syntactical characteristics of the underlying subject matter -- as
+ opposed to only recognizing the syntax alone -- Section 2.3 of the
+ RASCHEMA ID includes ABNF productions for every attribute type
+ defined, whether by reference or in literal form, intended for use by
+ those tasked with implementation of this ID series in some manner.
+
+ The RA DUA MUST recognize these ABNF productions when reading values
+ that were retrieved through use of the Read or Search Operation.
+
+
+
+Coretta Expires August 27, 2024 [Page 13]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ The RA DUA MAY decide how to handle the case of reading a previously
+ set attribute value of invalid or non-compliant form. The RA DUA may
+ warn the end-user of a value that is not well-formed, or it may opt
+ to omit the value from visibility altogether. If the RA DUA is of an
+ administrative focus, the opportunity for corrective measures MAY be
+ facilitated.
+
+2.2.3.3. Navigating Registration Entries
+
+ Some of the more complete RA services, whether public or private,
+ may offer a simple interface to facilitate intuitive incremental
+ movement among registrations that are associated horizontally or
+ vertically in terms of "up", "down", "left", "right", "min", "max"
+ and "top".
+
+ Depending on the needs of the intended audience, as well as the
+ manner in which this specification is adopted, this can be an
+ exceptionally difficult feature to implement for the RA DUA, but
+ is one that can dramatically improve the user experience.
+
+ The RA DUA SHOULD NOT assume positive support for this practice in
+ all implementations of this ID series.
+
+2.2.3.3.1. Superior Vertical References
+
+ During the Read or Search Operation executed in order to obtain a
+ 'registration' entry, the RA DUA MAY request any of the following
+ attribute types:
+
+ - 'supArc'
+ - 'c-supArc'
+ - 'topArc'
+ - 'c-topArc'
+
+ The 'supArc' and 'c-supArc' attribute types describe the immediate
+ superior (parent) registration in terms of ancestral lineage. Only
+ one (1) of each of these attribute types should be present for any
+ given 'registration' entry, never both.
+
+ The 'topArc' and 'c-topArc' attribute types describe the absolute
+ root registration in terms of ancestral lineage. Only one (1) of
+ each of these attribute types should be present for any given
+ 'registration' entry, never both.
+
+ Use of Collective attribute types -- namely those prefaced using the
+ requisite 'c-' flag -- is not practical in the two dimensional model
+ and thus need not be requested.
+
+ At no point are the above attribute types to be requested for entries
+ that bear the 'rootArc' STRUCTURAL object class. Root registrations
+ do not have superiors.
+
+
+Coretta Expires August 27, 2024 [Page 14]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.2.3.3.2. Subordinate Vertical References
+
+ Subordinate vertical references tend to be the most challenging among
+ all the various attribute types related to spatial navigation within
+ the terms of this ID series.
+
+ The RA DUA MAY request the 'subArc' attribute type as part of the
+ Read or Search Operation used for retrieval of a 'registration'
+ entry from the RA DIT.
+
+ At no point should an entry bear the 'subArc' attribute type if it
+ bears an 'isLeafNode' instance with a value of TRUE. This indicates
+ an illogical RA DIT condition.
+
+ When defined, the 'subArc' attribute type instance SHOULD reflect
+ a complete manifest of all references for 'registration' entries
+ that are direct subordinates of the bearer. This instance SHOULD
+ be requested in baseObject-scoped context, and is the only multi
+ valued spatial attribute type defined within this ID series.
+
+ The RA DUA SHOULD prefer 'subArc' enumeration to a List Operation
+ beneath a 'registration'. This method of searching is a potentially
+ costly request in the face of particularly large sets of subordinate
+ 'registration' entries present within the RA DIT.
+
+ The RA DUA SHOULD be prepared to manually sort the set of 'subArc'
+ DN references based on its OID or NumberForm value, however this
+ responsibility may be handled by the RA DSA.
+
+2.2.3.3.3. Horizontal References
+
+ Horizontal (sibling) references describe both adjacent as well as
+ minimum and maximum 'registration' contexts.
+
+ During a Search Operation intended to obtain a 'registration' entry,
+ the RA DUA SHOULD request the following attribute types:
+
+ - 'leftArc'
+ - 'rightArc'
+ - 'minArc'
+ - 'c-minArc'
+ - 'maxArc'
+ - 'c-maxArc'
+
+ The 'leftArc' attribute type describes the sibling 'registration'
+ entry that is nearest but less than that of the bearer in terms of
+ Number Form ('n') numerical magnitude.
+
+ The 'rightArc' attribute type describes the sibling 'registration'
+ entry that is nearest but greater than that of the bearer in terms
+ of Number Form ('n') numerical magnitude.
+
+
+Coretta Expires August 27, 2024 [Page 15]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ The 'minArc' and 'c-minArc' attribute types are used to reference the
+ 'registration' entry bearing the lowest magnitude Number Form ('n')
+ value within a set of siblings. Only one (1) of these Attribute
+ Types should be present for any given 'registration' entry, never
+ both.
+
+ The 'maxArc' and 'c-maxArc' attribute types are used to reference the
+ 'registration' entry bearing the highest magnitude Number Form ('n')
+ value within a set of siblings. Only one (1) of these Attribute
+ Types should be present for any given 'registration' entry, never
+ both.
+
+2.2.3.4. Client Entry Caching
+
+ For particularly large or busy implementations of this ID series, the
+ RA DUA MAY support basic client-driven entry caching of any retrieved
+ 'registration' and 'registrant' entries by way of either the 'rATTL'
+ or 'c-rATTL' integer attribute types, as defined within Section 2.3
+ of the RASCHEMA ID.
+
+ A valid use case for caching involves serving IANA PEN registrations
+ [PRIVATE], which number in the tens of thousands. Caching may yield
+ tremendous savings in terms of resource utilization associated with
+ particularly large numbers of static entries being retrieved in a
+ repeating manner.
+
+ This ID makes no assumptions regarding the design or implementation
+ of the underlying caching subsystem. The only abstract requirement
+ relates to the ability to cache a single directory entry for a span
+ of time equivalent to the effective TTL value in minutes.
+
+ The RA DUA SHOULD allow for the user to determine whether an entry
+ being presented is derived from a cache.
+
+2.2.3.4.1. Semantics
+
+ An 'rATTL' may be found in the following contexts wherever the
+ 'rADUAConfig', 'registration' or 'registrant' classes are present.
+
+ - A root DSE
+ - An RA DIT context
+ - An individual leaf-node entry
+
+ The collective counterpart attribute type, 'c-rATTL', may be found on
+ all of the above EXCEPT the root DSE.
+
+ Presence of an instance of either of these attribute types for any
+ entry serves as an indicator to the RA DUA that a caching directive
+ may be in effect depending on the value.
+
+ The significance of value magnitude -- whether collective or not --
+ is as follows:
+
+Coretta Expires August 27, 2024 [Page 16]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ - A value less than or equal to "0" is equivalent to a TTL being
+ undefined: NO cached lifespan is specified
+ - A value greater than or equal to "1" indicates a TTL lifespan
+ expressed by that value (e.g.: "1440" for a 24-hour TTL)
+
+ Countdown of a timespan commences at the same time the indicated
+ entry is retrieved and cached by the RA DUA according to the value.
+
+ Presence of the 'rATTL' attribute type within the RA DSA's root DSE
+ indicates use of global caching, a condition in which all entries
+ are cached for a fixed amount of time unless they are subjected to
+ an individual override by the 'rATTL' or 'c-rATTL' types.
+
+ Presence of the 'rATTL' attribute type within separate 'rADUAConfig'
+ class profile instances indicates context-specific entry caching (for
+ example, a single RA DIT in the midst of others served by a common RA
+ DSA).
+
+ The 'c-rATTL' attribute type is only present for entries when served
+ by an RA DSA which supports collective attributes. No instance of
+ the 'c-rATTL' attribute type shall be present within the root DSE.
+
+ In the face of multiple overlapping TTLs implied for an entry, these
+ rules of precedence can guide the RA DUA in determining the correct
+ TTL:
+
+ - DSE-based TTL overrides nothing (lowest common denominator)
+ - Contextual TTL overrides DSE TTL
+ - Collective TTL overrides a subtree of a contextual TTL
+ - Non-collective leaf entry TTL overrides all of the above
+
+ If deemed appropriate within the spirit of an implementation, or if
+ potentially necessary in an administrative context, the RA DUA MAY
+ allow for arbitrary cache bypass, whereas the cached entry may be
+ refreshed ahead of its scheduled TTL expiry.
+
+2.2.4. New Allocations
+
+ The following subsections involve considerations and procedures which
+ are related to the incorporation of new registration allocations into
+ an RA DIT.
+
+ Each "OID Directory" implementation will almost certainly adopt only
+ certain attribute types for use in entries.
+
+ Such restrictions may be exercised based on use of only select object
+ classes within an entry, through observance of any DIT content rules
+ that may be in effect, or through a form of access control.
+
+ The RA DUA is expected to honor any policies imposed by the service
+ that would influence or mandate the composition of new entries in a
+ particular way.
+
+Coretta Expires August 27, 2024 [Page 17]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.2.4.1. Verification
+
+ Certain preallocation checks MUST be conducted prior to any attempt
+ at creating an allocation. The following subsections describe these
+ procedures. Please note that only the three dimensional directory
+ model is covered due to its STRONGLY RECOMMENDED status over the
+ alternative model.
+
+ While the RA DSA may implement 'registration' integrity controls of
+ its own, the RA DUA SHALL NOT rely on such elements to mitigate bogus
+ or ill-advised requests alone. The RA DUA is REQUIRED to submit only
+ well-formed and sanctioned requests, and SHALL NOT be designed under
+ the unfounded assumption that the RA DSA will conduct post-operative
+ or custodial amendments of any kind.
+
+ Adopters of the RA DUA construct should remember that the context of
+ an allocation request can greatly influence the perception of the
+ various outcomes discussed in the following subsections.
+
+ For example, consider the entry of retroactive 'registration' entries
+ -- obsolete and wholly invalid by today's standards -- by an end user
+ simply to build a thorough and well-formed implementation of the OID
+ spectrum, versus a new registration being created today, and governed
+ by today's standards. The two scenarios have radically different
+ implications, yet the effective action is unchanged.
+
+ Depending on the nature and intended audience of an RA DUA solution,
+ this distinction may be particularly important. It may prove useful
+ to allow for effective "overrides" for authorized identities or modes
+ of operating, for example, to allow the creation of registrations
+ beneath an obsolete superior context.
+
+ It is important to note that the procedures defined in the following
+ subsections do not account for any internal governance or approval
+ process related to allocation request handling.
+
+2.2.4.1.1. Ancestral Viability
+
+ Given an intended registration DN of:
+
+ n=9999,n=4,n=1,n=6,n=3,n=1,ou=Registrations,o=rA
+
+ The RA DUA MUST first verify the presence of the intended superior
+ registration DN.
+
+ n=4,n=1,n=6,n=3,n=1,ou=Registrations,o=rA
+
+ This search can be conducted using the following SearchRequest
+ parameters:
+
+
+
+
+Coretta Expires August 27, 2024 [Page 18]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ baseObject = n=4,n=1,n=6,n=3,n=1,ou=Registrations,o=rA
+ scope = 0
+ filter = objectClass=registration
+ attributes = registrationStatus
+ registrationClassification
+ isLeafNode
+ isFrozen
+ objectClass
+
+ If exactly one (1) entry is returned with no apparent error, the
+ superior entry is confirmed to be present. In this case, the RA DUA
+ should read the values of the requested attribute types.
+
+ If the 'registrationStatus' and/or 'registrationClassification' value
+ is OBSOLETE, DEALLOCATED or some other (known) declaration of a state
+ of non-operation, this MUST fail the allocation request unless the
+ attempt was made in (approved) retroactive context. The case folding
+ scheme in effect for these values is not significant.
+
+ Similarly, if the 'isFrozen' and/or 'isLeafNode' attribute types bear
+ a Boolean value of TRUE, the allocation request MUST fail unless the
+ attempt was made in (approved) retroactive context.
+
+ The error 'noSuchObject' indicates the requested entry was not found.
+ When using LDAP, this bears the resultCode value of "32".
+
+ 'noSuchObject' SHOULD be investigated by the RA DUA by way of an
+ ancestral traversal -- a process in which each successive ancestor
+ entry is subjected to a similar presence check as described above
+ in incremental fashion. Ordering of ancestral traversal checks is
+ not significant, as either ordering scheme will ultimately lead to
+ the same conclusion.
+
+ Each ancestor entry is referenced using a DN value which lacks the
+ leaf-node RDN component of the previously-checked descendant entry.
+
+ For instance, continuing with the above superior DN's lineage:
+
+ - n=1,n=6,n=3,n=1,ou=Registrations,o=rA
+ - n=6,n=3,n=1,ou=Registrations,o=rA
+ - n=3,n=1,ou=Registrations,o=rA
+ - n=1,ou=Registrations,o=rA
+
+ Following this procedure allows the RA DUA or the end user to locate
+ where the apparent ancestral discontinuity begins within the RA DIT.
+
+ The terminus of a registration lineage -- such as the one described
+ above -- is determined based on the presence of the STRUCTURAL object
+ class 'rootArc' for an entry (e.g.: "n=1,ou=Registrations,o=rA").
+
+
+
+
+Coretta Expires August 27, 2024 [Page 19]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.2.4.1.2. Number Form Uniqueness
+
+ Within a set of sibling 'registration' entries, it is CRITICAL that
+ any new allocation involve use of a horizontally-unique 'n' value.
+
+ Using one of the RECOMMENDED DN syntaxes described in Section 3.1,
+ the proper procedure simply involves a Read-based presence check of
+ the intended 'registration' DN.
+
+ For instance, if the desired allocation shall bear the DN:
+
+ n=9999,n=3,n=1,ou=Registrations,o=rA
+
+ A preemptive Read Operation MUST be executed in the following manner:
+
+ baseObject = n=9999,n=3,n=1,ou=Registrations,o=rA
+ scope = 0
+ typesOnly = TRUE
+ attributes = objectClass
+
+ Use of the 'typesOnly' option is merely for bandwidth efficiency,
+ as the goal of this request is to see if ANY entry exists by this
+ DN -- not to examine any particular attribute type values.
+
+ If zero (0) entries are returned alongside a 'noSuchObject' error,
+ the Number Form is unique.
+
+ Any non-zero number of entries that are returned with no apparent
+ error indicates the Number Form is NOT unique and the attempt at
+ allocation MUST fail. The RA DUA SHOULD inform the user of this
+ outcome.
+
+ There are no practical override use cases for this condition.
+
+ If using a 'registration' DN syntax other than those RECOMMENDED in
+ Section 3.1, use of a filter within a List Operation executed upon
+ the intended parent registration may be required at the risk of
+ performance penalties proportional to the number of entries present:
+
+ baseObject: = n=3,n=1,ou=Registrations,o=rA
+ scope = 1
+ typesOnly = TRUE
+ filter = n=9999
+ attributes = objectClass
+
+ The same entry count semantics as described above will apply.
+
+ See Section 2.2.4.1.3 for considerations regarding the presence
+ of ranges of allocations within the set of sibling registrations.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 20]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+2.2.4.1.3. Ranged Allocations
+
+ During the creation of new registrations, RA DUAs MUST preemptively
+ search for any range-based registrations present that might overlap
+ with the intended 'n' value of the entry. This requirement MAY be
+ relaxed if it is known that ranged allocations are not supported in
+ the target location.
+
+ For example, to determine if a ranged allocation resides within the
+ 1.3 OID registration that would overlap with a desired Number Form,
+ the RA DUA MUST perform a List Operation of the following form:
+
+ baseObject = n=3,n=1,ou=Registrations,o=rA
+ scope = 1
+ typesOnly = TRUE
+ filter = (&(n<=X)
+ (|(registrationRange>=X)(registrationRange=-1)))
+ attributes = registrationRange
+
+ Given these parameters, where the filter AVA "X" represents the 'n'
+ (Number Form) chosen -- for example "100" -- the search will return
+ zero (0) entries if no range violation is detected involving value
+ "X". This behavior is unchanged in the midst of multiple finite
+ and/or infinite ranges, regardless of contiguity.
+
+ Please note that integer "X" MUST be chosen or selected by some means
+ by the RA DUA or its end user for this procedure to work as intended.
+ "X" SHALL NOT be negative.
+
+ An infinite range SHALL ONLY appear once in any sibling context, and
+ the associated entry DN SHALL ALWAYS represent the true 'maxArc' or
+ 'c-maxArc' value in the same sibling context, if specified.
+
+ If ANY number of entries are returned as a result of this allocation
+ check, the registration MUST fail. The RA DUA MAY opt to make other
+ attempts using another Number Form in place of "X", or it may simply
+ inform the user of an overlapping allocation attempt.
+
+ This procedure assumes the preemptive Number Form Uniqueness check
+ procedures described in Section 2.2.4.1.2 have been conducted with
+ a favorable outcome as described.
+
+ However, in certain use cases, it may be advantageous to replace the
+ above 'filter' with:
+
+ (|(&(n<=X)(|(registrationRange>=X)(registrationRange=-1)))(n=X))
+
+ Doing so accomplishes the goals of this section and Section 2.2.4.1.2
+ in a single action.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 21]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ The RA DUA MAY opt to impose a 'typesOnly' value of FALSE to allow
+ the user to manually observe the range structure(s) present within
+ a set of siblings directly (by way of the 'registrationRange' type)
+ if and when an overlapping allocation attempt was made. This allows
+ the user to select an appropriate Number Form value in an informed
+ manner -- as opposed to trial-and-error methodology, for instance.
+
+2.2.4.2. Submission
+
+ Assuming the verification procedures covered in Section 2.2.4.1 were
+ of a favorable outcome, the submission of the allocation details may
+ be indicated.
+
+ This ID assumes that any requisite review or approval processes that
+ are practiced by those who serve in authority over the RA have been
+ performed.
+
+ Creation of a directory entry, based upon decided allocation details,
+ is the last step necessary for a proper submission. Please see the
+ RADIT ID for details and many examples regarding entry composition.
+
+ The Add Operation is the intended means for submission of the entry.
+
+ If the particular implementation of this ID series does not support
+ this operation in this manner, the RA DSA may be expected to support
+ another means out of scope for this ID series.
+
+ Upon submission of the composed entry to the receiving RA DSA, the
+ RA DUA SHOULD retrieve the newly added entry to verify attribute type
+ and object class content is present as intended. This should precede
+ any declarations of successful submission to the end user.
+
+2.2.5. Allocation Updates
+
+ Updates to 'registration' entries, as mentioned previously, is often
+ ill-advised outside of extraordinary circumstances, likely involving
+ corrections to entries deemed to be of poor form, or created in bad
+ faith. A general rule-of-thumb suggests that any 'registration' is
+ typically static.
+
+ Updates to 'registrant' entries or attributes, however, is far more
+ likely if contact information, which changes over time, is present.
+
+ Nevertheless, alterations to the content of entries in either context
+ is facilitated through use of the Modify Operation for any of the
+ following desired actions:
+
+ - Addition of object class values
+ - Addition of attribute type instances or values
+ - Removal of undesirable or invalid attribute instances or values
+ - Correction of bogus attribute type values
+ - Relegation of a currentAuthority to a firstAuthority
+
+Coretta Expires August 27, 2024 [Page 22]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ In an even more exceptional (and unlikely) scenario, the correction
+ of an invalid Number Form or OID RDN value is facilitated through
+ use of the Modify DN Operation, which is intended for the "renaming"
+ and/or "relocation" of a specified entry. This is almost certainly
+ an administratively focused use case.
+
+ The semantics for either of these operations are well outside the
+ scope of this ID series.
+
+3. IANA Considerations
+
+ There are no requests to IANA in this document at this time.
+
+4. Security Considerations
+
+ The RA DUA MUST possess the capability to honor any authentication
+ and/or confidentiality policies imposed by the RA DSA. This would
+ imply Bind and Unbind capabilities, at the least.
+
+ This may involve strategies related to TLS, 2FA, OTP and others. TLS
+ support may include facilities for mutual authentication. Support of
+ password-related operations -- such as those defined in [RFC3062] --
+ may be indicated.
+
+ Certain directory implementations may require these capabilities be
+ exercised prior to interaction with ANY facet of the directory -- no
+ matter how innocuous a request may be perceived (for instance, basic
+ query of the root DSE only). This is an especially common practice
+ in high-security X.500/LDAP implementations. Adopters are advised to
+ be prepared for such conditions.
+
+5. References
+
+5.1. Normative References
+
+ RADIR Coretta, J., "The OID Directory: A Technical Roadmap",
+ draft-coretta-oiddir-roadmap, February 2024.
+
+ RADIT Coretta, J., "The OID Directory: The RA DIT",
+ draft-coretta-oiddir-radit, February 2024.
+
+ RADSA Coretta, J., "The OID Directory: The RA DSA",
+ draft-coretta-oiddir-radsa, February 2024.
+
+ RASCHEMA Coretta, J., "The OID Directory: The RA Schema",
+ draft-coretta-oiddir-schema, February 2024.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 23]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ [RFC2696] C. Weider, A. Herron, A. Anantha, Microsoft, T. Howes
+ and Netscape, "LDAP Control Extension for Simple Paged
+ Results Manipulation", RFC 2696, September 1999.
+
+ [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
+ Directory Access Protocol (LDAP)", RFC 3671, December
+ 2003.
+
+ [RFC4511] J. Sermersheim, Ed. "Lightweight Directory Access Protocol
+ (LDAP): The Protocol", RFC 4511, June 2006.
+
+ [RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): Directory Information Models", RFC 4512, June
+ 2006.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", RFC 8174, May 2017.
+
+ [X.501] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Models", ITU-T
+ X.501, October 2019.
+
+ [X.511] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Abstract service
+ definition", ITU-T X.511, October 2019.
+
+5.2. Informative References
+
+ [PRIVATE] IANA, "Private Enterprise Numbers",
+ https://www.iana.org/assignments/enterprise-numbers.
+
+ [RFC2079] Smith, M., "Definition of an X.500 Attribute Type and an
+ Object Class to Hold Uniform Resource Identifiers (URIs)",
+ RFC 2079, January 1997.
+
+ [RFC3062] Zeilenga, K., "LDAP Password Modify Extended Operation",
+ RFC 3062, February 2001.
+
+ [RFC4519] Sciberras, Ed., A., "Lightweight Directory Access Protocol
+ (LDAP): Schema for User Applications", RFC 4519, June
+ 2006.
+
+ [RFC4524] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): COSINE LDAP/X.500 Schema", RFC 4524, June 2006
+
+ [X.500] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Overview of
+ concepts, models and services", ITU-T X.500, October 2019.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 24]
+
+Internet-Draft The OID Directory: RA Client February 2024
+
+
+ [X.660] International Telecommunication Union - Telecommunication
+ Standardization Sector, "General procedures and top arcs
+ of the international object identifier tree", ITU-T X.660,
+ July 2011.
+
+ [X.680] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Abstract Syntax Notation One
+ (ASN.1): Specification of basic notation", ITU-T X.680,
+ July 2002.
+
+Author's Address
+
+ Jesse Coretta
+ California, United States
+
+ Email: jesse.coretta@icloud.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 25]
diff --git a/docs/specs/draft-coretta-oiddir-roadmap-00.txt b/docs/specs/draft-coretta-oiddir-roadmap-00.txt
new file mode 100644
index 000000000..ffbce0ba4
--- /dev/null
+++ b/docs/specs/draft-coretta-oiddir-roadmap-00.txt
@@ -0,0 +1,754 @@
+
+
+RADIR J. Coretta
+Internet-Draft February 29, 2024
+Intended status: Experimental
+Obsoletes: X660LDAP
+Expires: August 27, 2024
+
+
+ The OID Directory:
+ A Technical Roadmap
+ draft-coretta-oiddir-roadmap-00.txt
+
+Abstract
+
+ This ID outlines a series of experimental standards documents which
+ define the abstracts of the "OID Directory": a proposed philosophy
+ and set of procedures used to facilitate the storage and management
+ of the "OID spectrum" -- in part or in whole -- within an X.500/LDAP
+ service implementation.
+
+Status of This Memo
+
+ This Internet-Draft is submitted in full conformance with the
+ provisions of BCP 78 and BCP 79.
+
+ Internet-Drafts are working documents of the Internet Engineering
+ Task Force (IETF). Note that other groups may also distribute
+ working documents as Internet-Drafts. The list of current Internet-
+ Drafts is at https://datatracker.ietf.org/drafts/current/.
+
+ Internet-Drafts are draft documents valid for a maximum of six months
+ and may be updated, replaced, or obsoleted by other documents at any
+ time. It is inappropriate to use Internet-Drafts as reference
+ material or to cite them other than as "work in progress."
+
+ This Internet-Draft will expire on August 27, 2024.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 1]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Relation to draft-coretta-x660-ldap ........................2
+ 1.2. Conventions ................................................3
+ 1.3. Acronyms Used ..............................................4
+ 1.4. Intended Audience ..........................................4
+ 1.5. Alternatives ...............................................5
+ 1.6. Allocations ................................................5
+ 1.7. Key Citations and Generalizations ..........................5
+ 1.8. Common Operations and Concepts .............................7
+ 1.8.1. Read and Search .......................................7
+ 1.8.2. Modify ................................................9
+ 1.8.3. Add ...................................................9
+ 1.8.4. Delete ................................................9
+ 1.8.5. Modify DN ............................................10
+ 2. Supporting IDs .................................................10
+ 2.1. 'draft-coretta-oiddir-schema' .............................10
+ 2.2. 'draft-coretta-oiddir-radua' ..............................10
+ 2.3. 'draft-coretta-oiddir-radsa' ..............................11
+ 2.4. 'draft-coretta-oiddir-radit' ..............................11
+ 3. IANA Considerations ............................................11
+ 4. Security Considerations ........................................11
+ 5. References .....................................................11
+ 5.1. Normative References ......................................11
+ 5.2. Informative References ....................................11
+ 6. Ongoing Collaborative Resources ................................13
+ 6.1. The 'oid-directory' Repositories ..........................13
+ 6.2. The 'oid.directory' Internet Domain .......................13
+ Author's Address ..................................................13
+
+1. Introduction
+
+ This ID series combines relevant components of ITU-T Recommendations
+ [X.500], [X.660], [X.680], [RFC4510] and many others to define models
+ and procedures of the "OID Directory" construct.
+
+ The "OID Directory" is the X.500/LDAP facility for managing the "OID
+ Spectrum" -- in part or in whole -- in the context of Registration
+ Authority operations, whether public or private.
+
+ Additionally, unofficial components have been devised or appropriated
+ specifically to aid adopters in overcoming various feasibility and
+ logistical challenges that may arise during an implementation.
+
+ This ID series OBSOLETES all revisions of 'draft-coretta-x660-ldap'
+ (X660LDAP). See Section 1.1 for details.
+
+ This ID series -- as a whole -- is EXPERIMENTAL. Implementations of
+ any component set forth within this series SHOULD NOT manifest EXCEPT
+ for any testing or proof-of-concept efforts.
+
+
+Coretta Expires August 27, 2024 [Page 2]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+1.1. Relation to 'draft-coretta-x660-ldap'
+
+ This ID was first published towards the end of 2020 under the formal
+ name 'draft-coretta-x660-ldap' (X660LDAP) and had reached nine (9)
+ revisions. It originally held the title:
+
+ "Lightweight Directory Access Protocol (LDAP) Procedures and
+ Schema Definitions for the Storage of X.660 Registration
+ Information"
+
+ Subsequent community feedback -- although generally favorable --
+ suggested that some of the proposed subject matter was external to
+ the core precepts of ITU-T Rec. [X.660], which confused some readers.
+
+ Eventually, it was decided this document should be re-submitted with
+ a more generalized title. This single change satisfied nearly all
+ instances of criticism while preserving the intended spirit of the
+ ID without misleading readers as it relates to the true scope of
+ relevant standards.
+
+ Furthermore, it was decided that, due to the overall breadth and
+ complexity of the standards proposed, the ID should be divided into
+ multiple supporting IDs in a more focused manner. This has the
+ secondary effect of allowing potential extensions of this concept
+ in the future to be set forth in a more modular manner.
+
+ Aside from the correction of typographical and formatting errors
+ previously identified, the following additional changes have been
+ made to the new ID(s):
+
+ - Collective Attribute [RFC3671] support within this ID series is
+ now more well-defined.
+
+ - Administrative procedures and considerations have been expanded
+ throughout many areas of the ID series.
+
+ - The scope of potential candidates for adoption of the ID series
+ has been expanded in Section 1.4.
+
+ - Added new schema definitions and optimized several existing
+ definitions within the RASCHEMA ID.
+
+ - A short list of alternative solutions to this ID series has been
+ added in Section 1.5.
+
+ - The status of the ID is 'Experimental' (prev. 'Standards Track').
+
+ - Citations and references now favor current editions of certain
+ ITU-T Recommendations of relevance.
+
+ - Author's physical address has reduced specificity.
+
+
+Coretta Expires August 27, 2024 [Page 3]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+1.2. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
+ and "OPTIONAL" in this document are to be interpreted as described
+ in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in
+ all capitals, as shown here.
+
+ The convention "ID series" describes the entire suite of IDs which
+ constitute the overall philosophy of the "OID Directory". The term
+ implies not only those IDs cited in Section 2, but also any future
+ IDs that may be submitted as extensions by any author.
+
+ The conventions "OID spectrum" and "OID tree" -- while not defined in
+ any document within this standard -- are terms used frequently within
+ the ID series. These terms describe the hypothetical data structure
+ that houses or represents all known public or private registrations
+ that have ever been allocated.
+
+1.3. Acronyms Used
+
+ The "OID Directory" ID series makes reference to many acronyms, each
+ of which are defined as follows:
+
+ 2FA Two-Factor Authentication
+ ABNF Augmented Backus-Naur Form
+ API Application Programming Interface
+ ASCII American Standard Code for Information Interchange
+ ASN.1 Abstract Syntax Notation one
+ AVA Attribute Value Assertion
+ AXFR (DNS) Authoritative Zone Transfer
+ DAP Directory Access Protocol
+ DIB Directory Information Base
+ DISP Directory Information Shadowing Protocol
+ DIT Directory Information Tree
+ DN Distinguished Name
+ DNS Domain Name System
+ DOP Directory Operational Binding Management Protocol
+ DSA Directory System Agent
+ DSE DSA-Specific Entry
+ DSP Directory System Protocol
+ DUA Directory User Agent
+ GUI Graphical User Interface
+ GUID Globally Unique Identifier
+ ID Internet Draft (of this series)
+ IPC Interprocess Communication
+ IRI Internationalized Resource Identifier
+ IXFR (DNS) Incremental Zone Transfer
+ LDAP Lightweight Directory Access Protocol
+ LDIF LDAP Data Interchange Format
+ OID ASN.1 Object Identifier
+ ORS OID Resolution Service
+
+Coretta Expires August 27, 2024 [Page 4]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ OTP One-Time Pass
+ PEN IANA Private Enterprise Number
+ RA Registration Authority
+ RDN Relative Distinguished Name
+ SDK Software Development Kit
+ TLS Transport Layer Security
+ TTL Time to Live
+ TUI Textual User Interface
+ URI Uniform Resource Identifier
+ UUID Universal Unique Identifier
+
+1.4. Intended Audience
+
+ This ID series will be most useful to an RA of any context, whether
+ public or private. This was, and shall always be, the primary goal
+ of this effort.
+
+ Other potential candidates include, but are not limited to:
+
+ - Hardware manufacturers
+ - Weather Services
+ - Major internet technology companies
+ - Internet Service Providers
+ - Military/Allied directories
+ - Healthcare service providers
+ - Mainstream directory software product maintainers/vendors
+ - ASN.1 professionals, particularly developers tasked with
+ maintaining certain types of encoders and decoders
+
+ Sufficed to say, any entity or individual that directly queries or
+ uses ASN.1 object identifier information in frequent or critical
+ fashion may be a candidate for this ID series.
+
+1.5. Alternatives
+
+ Alternatives to this ID series include, but are not limited to:
+
+ - Implementation of ORS, per [X.672]
+ - Use of proprietary end-user applications
+ - Use of third party OID registration authority websites
+ - Reference raw ASN.1 definitions or relevant standards
+ - Implementation of a custom, in-house solution
+
+1.6. Allocations
+
+ This ID series has been allocated the following numeric OID prefix:
+
+ - 1.3.6.1.4.1.56521.101
+
+ Other IDs in this series extend this registration further.
+
+
+
+Coretta Expires August 27, 2024 [Page 5]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ Should this ID series be elevated to RFC status, the aforementioned
+ OID prefix shall be rendered obsolete in favor of an IANA-assigned
+ OID, at which point this ID series will be updated to reference the
+ literal 'IANA-ASSIGNED-OID' placeholder prefix where appropriate.
+
+1.7. Key Citations and Generalizations
+
+ Certain constructs and operations are cited frequently throughout
+ this ID series, each of which are covered below.
+
+ Generalized phrasing is meaningful only within the bounds of this ID
+ series and only where specificity is not relevant in context.
+
+ The DAP Modify Operation is defined in clause 12.3 of ITU-T Rec.
+ X.511. The LDAP Modify Operation is defined in Section 4.6 of
+ [RFC4511]. The term "Modify Operation" is used to describe either
+ of these operations.
+
+ The DAP Modify DN Operation is defined in clause 12.4 of ITU-T Rec.
+ X.511. The LDAP Modify DN Operation is defined within Section 4.9
+ of [RFC4511]. The term "Modify DN Operation" is used to describe
+ either of these operations.
+
+ The DAP Search Operation is defined in clause 11.2 of ITU-T Rec.
+ X.511. The DAP List Operation, considered an alternative form of
+ DAP Search, is defined in clause 11.1 of ITU-T Rec. X.511. The
+ LDAP Search Operation is defined in Section 4.5 of [RFC4511]. The
+ term "Search Operation" is used to describe either DAP or LDAP Search
+ Operations. Similarly, "List Operation" is the term used to describe
+ either the DAP List Operation or an LDAP Search Operation using the
+ singleLevel scope.
+
+ The DAP Read Operation is defined in clause 10.1 of ITU-T Rec. X.511.
+ The term "Read Operation" is used to describe either this operation
+ or a baseObject-scoped LDAP Search Operation.
+
+ The DAP Remove Entry Operation is defined in clause 12.2 of ITU-T
+ Rec. X.511. The LDAP Delete Operation is defined in Section 4.8 of
+ [RFC4511]. The term "Delete Operation" is used to describe either
+ of these operations.
+
+ The DAP Add Entry Operation is defined in clause 12.1 of ITU-T Rec.
+ X.511. The LDAP Add Operation is defined within Section 4.7 of
+ [RFC4511]. The term "Add Operation" is used to describe either
+ of these operations.
+
+ The DAP SearchArgumentData.subset parameter is defined in clause
+ 11.2.1 of ITU-T Rec. X.511. The LDAP SearchRequest.scope parameter
+ is defined in Section 4.5.1 of [RFC4511]. The terms "scope" and
+ "scoped" describe either of these components in the context of a
+ "Search Operation".
+
+
+Coretta Expires August 27, 2024 [Page 6]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ The DAP EntryInformationSelection ASN.1 SET is defined in clause 7.6
+ of ITU-T Rec. X.511. The LDAP SearchRequest.attributeSelector is
+ defined in Section 4.5.1.8 in [RFC4511]. The terms "selection" and
+ "selector" describe either of these components in the context of
+ refining the presentation of attribute types derived from entries
+ obtained by way of the Search or Read Operations.
+
+ The DAP EntryInformationSelection.infoTypes.attributeTypesOnly
+ parameter is defined within clause 7.6 of ITU-T Rec. X.511. The
+ equivalent LDAP SearchRequest.typesOnly parameter is defined in
+ Section 4.5.1 of [RFC4511]. The term 'typesOnly' refers to either
+ of these constructs in the context of occluding values during the
+ presentation of entries retrieved using Read or Search Operations.
+
+ The concepts of DIT Content Rules, DIT Structure Rules and Name Forms
+ are defined throughout Section 6 of ITU-T Rec. X.501 and in Section
+ 4.1 of [RFC4512].
+
+ The term "Write Operation" is an informal term used within this ID
+ series. In context, it can be used to refer to any of "Modify DN",
+ "Modify", "Add" and "Delete" operation generalizations defined above
+ wherever specificity is not required.
+
+ The root DSE is discussed in Section 5 of [RFC4512] and within clause
+ 23.4.2 of ITU-T Rec. X.501.
+
+ The 'subschemaSubentry' is defined in Section 4.2 of [RFC4512].
+
+ Collective attributes, including associated subtree and subentry
+ mechanics -- including the 'subtreeSpecification' attribute type --
+ are defined throughout [RFC3671], [RFC3672] and ITU-T Rec. X.501.
+
+1.8. Common Operations and Concepts
+
+ The following subsections describe where the standard DAP and LDAP
+ Operations itemized in Section 1.7 apply within this ID series, and
+ in what manner.
+
+ Not all Operations will necessarily have a direct correlation to any
+ specific procedures set forth within this ID series. For instance,
+ none of the procedures have any specific associations with Extended,
+ Bind or Unbind Operations defined within both ITU-T Rec. X.511 and
+ RFC4511.
+
+1.8.1. Read and Search
+
+ The Search and Read Operations are the most critical used within this
+ ID series, regardless of the nature of implementation.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 7]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ The Read Operation is used to retrieve or "call" specific individual
+ entries from the RA DIT. This requires foreknowledge of the target
+ DN, but is RECOMMENDED as standard procedure in the intended spirit
+ of this ID series. This operation should ONLY return either one (1)
+ entry or none.
+
+ The Search Operation is used to retrieve multiple entries within a
+ request, typically in the context of a directory subtree. Specific
+ foreknowledge of the desired entries is not required, however input
+ of SearchRequest (LDAP) or SearchArgumentData (DAP) will require
+ added specificity in terms of the scope (LDAP) or subset (DAP) in
+ use, the filter supplied, and other parameters such as a selector.
+
+ The Search Operation is usually discouraged for use by end users
+ unless baseObject-scoped. Use in administratively-focused RA DUA
+ implementations is acceptable.
+
+ The following subsections cover relevant parameters extended by the
+ SearchRequest and SearchArgumentData constructs.
+
+1.8.1.1. baseObject
+
+ The baseObject parameter defined within the SearchRequest (LDAP) and
+ SearchArgumentData constructs defines the Name of the targeted entry
+ as a DN.
+
+ There is no default value within the context of this ID series, as
+ this will be influenced based on the activities of the RA DUA.
+
+1.8.1.2. scope and subset
+
+ The scope of a Search Operation defines the depth of the intended
+ operation in terms of 'baseObject' (0), 'singleLevel' (1) and
+ 'wholeSubtree' (2).
+
+ The default scope or subset for the RA DUA SHOULD be 'baseObject'.
+ This is analogous to the Read Operation. The RA DUA MAY allow user
+ override of this parameter when appropriate.
+
+1.8.1.3. typesOnly and attributeTypesOnly
+
+ During the presentation of a retrieved entry, the specification of
+ (LDAP) typesOnly or (DAP) attributeTypesOnly parameters results in
+ the discarding of values.
+
+ This is often desirable in cases where the presence of entries alone
+ is the focus -- not their content.
+
+1.8.1.4. filter
+
+ Use of a filter adds conditions to the successful matching of entries
+ to be retrieved by way of the Read or Search Operations.
+
+Coretta Expires August 27, 2024 [Page 8]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ Although generally not required of the user, certain procedures set
+ forth in this ID require use of a filter, for example during a range
+ check to be conducted prior to allocation of an OID. Generally the
+ RA DUA is expected to manage such activities.
+
+ The RA DUA may allow user-defined statements to be used for routine
+ or administrative operation, if appropriate.
+
+1.8.1.5. attribute selection
+
+ The attribute selection parameters may be used to specify desired
+ attribute types to be retrieved, if defined, as a result of a Read
+ or Search Operation upon an entry.
+
+ Use of a selector by the RA DUA in virtually all cases is STRONGLY
+ RECOMMENDED.
+
+ The RA DUA MAY allow user-defined overrides, such as '+', '*', '1.1'
+ or explicit attribute type descriptions if appropriate in context.
+
+1.8.2. Modify
+
+ The Modify Operation is usually among the lesser-used operations in
+ the terms of this ID series.
+
+ Aside from unusual or extraordinary circumstances, 'registration'
+ entries themselves are not typically edited.
+
+ 'registrant' entries, however, may be prone to updates, as they will
+ contain contact information -- such as email addresses and telephone
+ numbers -- for the respective authority.
+
+ The nature of this ID series does not impose any particular practice
+ or recommended procedure relating to the Modify Operation itself.
+
+ Modification operations, in general, SHOULD be limited to authorized
+ personnel or the respective "owners" of certain 'registration' and/or
+ 'registrant' entries as deemed appropriate.
+
+1.8.3. Add
+
+ The Add Operation is used for the creation of new 'registration' or
+ 'registrant' entries.
+
+ Generally this operation would be conducted by either the owner of
+ the respective allocation, or the RA administrative personnel in the
+ event the RA DSA supports this operation.
+
+ The addition of new 'registration' entries MUST ONLY occur below the
+ appropriate 'rARegistrationBase' value. Similarly, the addition of
+ new 'registrant' entries MUST ONLY occur below the appropriate
+ 'rARegistrantBase' value.
+
+Coretta Expires August 27, 2024 [Page 9]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ RA DUAs MUST observe the MAY and MUST clauses of the object class
+ definitions within Section 2.5 of the RASCHEMA ID. These provide
+ a rough inventory of the absolute minimum requirements for entry
+ composition, as well as the OPTIONAL types available for use.
+
+ The RA DUA MUST be prepared to observe additional restrictions or
+ extensions that may be imposed through the use of DIT Content Rules,
+ DIT Structure Rules and Name Forms held by the RA DSA. This will
+ influence the content of entries as well as the entry's DN structure.
+
+1.8.4. Delete
+
+ The Delete Operation is among the least-used operations within the
+ terms of this ID series.
+
+ 'registration' entries themselves are generally not deleted outright,
+ especially when public-facing. Any given 'registration' entry SHOULD
+ be labeled as OBSOLETE, DEALLOCATED or some other such designation of
+ non-operation and left intact indefinitely. The act of deleting a
+ 'registration' entry directly is often discouraged outside of unusual
+ or extraordinary circumstances, and may have disastrous consequences
+ if executed in cavalier fashion.
+
+ The same point may or may not apply to 'registrant' entries. Given
+ the costs associated with modern storage options, RAs may not deem it
+ worthwhile to preserve so-called orphaned 'registrant' entries -- in
+ other words, 'registrant' entries not currently serving in authority
+ for any registrations. Use of the Delete Operation may be indicated.
+
+ This ID series makes no recommendation on the proper usage of the
+ Delete Operation by appropriate personnel in the event of unusual or
+ extraordinary circumstances. Beyond purely administrative concerns,
+ RA DUA adopters are STRONGLY ADVISED to consider the specifics of
+ how and when deletion support should or should not be supported.
+
+1.8.5. Modify DN
+
+ The Modify DN Operation is likely the least-used operation within the
+ terms of this ID series.
+
+ Aside from unrelated administrative uses of this operation, such as
+ an effort to "move" entries from "ou=OIDs,o=rA" into a newly created
+ context "ou=Registrations,o=rA", or for the correction of a bogus DN,
+ the Modify DN operation is not indicated within the ID series.
+
+2. Supporting IDs
+
+ The following subsections each identify and describe various IDs
+ that comprise and support this proposed standard as a whole.
+
+ Should any of these IDs be updated or revised in any way, the highest
+ revision number supersedes any previous revision.
+
+Coretta Expires August 27, 2024 [Page 10]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+2.1. 'draft-coretta-oiddir-schema'
+
+ The 'draft-coretta-oiddir-schema' ID contains many useful definitions
+ that comprise the supporting schema for the so-called RA DIT.
+
+ This ID is hereafter cited and referenced as RASCHEMA.
+
+2.2. 'draft-coretta-oiddir-radua'
+
+ The 'draft-coretta-oiddir-radua' ID describes the RA client within
+ the traditional client/server model in terms of high-level concepts
+ and procedures for proper interaction with the RA DSA.
+
+ This ID is hereafter cited and referenced as RADUA.
+
+2.3. 'draft-coretta-oiddir-radsa'
+
+ The 'draft-coretta-oiddir-radsa' ID describes the RA server within
+ the traditional client/server model in terms of high-level concepts
+ and procedures for managing activities related to the RA DUA and RA
+ DIT.
+
+ This ID is hereafter cited and referenced as RADSA.
+
+2.4. 'draft-coretta-oiddir-radit'
+
+ The 'draft-coretta-oiddir-radit' ID defines guidelines and procedures
+ relating to the so-called RA DIT in terms of design considerations,
+ model structures, storage and operating states, et al.
+
+ This ID is hereafter cited and referenced as RADIT.
+
+3. IANA Considerations
+
+ There are no requests to IANA in this document at this time.
+
+4. Security Considerations
+
+ See the RADUA, RADSA and RADIT IDs for security considerations.
+
+5. References
+
+5.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", RFC 8174, May 2017.
+
+
+
+
+Coretta Expires August 27, 2024 [Page 11]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+5.2. Informative References
+
+ RADIT Coretta, J., "The OID Directory: The RA DIT",
+ draft-coretta-oiddir-radit, February 2024.
+
+ RADSA Coretta, J., "The OID Directory: The RA DSA",
+ draft-coretta-oiddir-radsa, February 2024.
+
+ RADUA Coretta, J., "The OID Directory: The RA DUA",
+ draft-coretta-oiddir-radua, February 2024.
+
+ RASCHEMA Coretta, J., "The OID Directory: The Schema",
+ draft-coretta-oiddir-schema, February 2024.
+
+ [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
+ Directory Access Protocol (LDAP)", RFC 3671, December
+ 2003.
+
+ [RFC3672] Zeilenga, K., "Subentries in the Lightweight Directory
+ Access Protocol (LDAP)", RFC 3672, December 2003.
+
+ [RFC4510] Zeilenga, K. "Lightweight Directory Access Protocol
+ (LDAP): Technical Specification Road Map", RFC 4510, June
+ 2006.
+
+ [RFC4511] J. Sermersheim, Ed. "Lightweight Directory Access Protocol
+ (LDAP): The Protocol", RFC 4511, June 2006.
+
+ [RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): Directory Information Models", RFC 4512, June
+ 2006.
+
+ [X.500] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Overview of
+ concepts, models and services", ITU-T X.500, October 2019.
+
+ [X.501] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Models", ITU-T
+ X.501, October 2019.
+
+ [X.511] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Abstract service
+ definition", ITU-T X.511, October 2019.
+
+ [X.660] International Telecommunication Union - Telecommunication
+ Standardization Sector, "General procedures and top arcs
+ of the international object identifier tree", ITU-T X.660,
+ July 2011.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 12]
+
+Internet-Draft The OID Directory: Roadmap February 2024
+
+
+ [X.667] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Information technology -
+ Procedures for the operation of object identifier
+ registration authorities: Generation of universally unique
+ identifiers and their use in object identifiers", ITU-T
+ X.667, October 2012.
+
+ [X.672] International Telecommunication Union - Telecommunication
+ Standardization Sector, "OID resolution system: Problems,
+ requirements and potential solutions", ITU-T X.672, March
+ 2020.
+
+ [X.680] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Abstract Syntax Notation One
+ (ASN.1): Specification of basic notation", ITU-T X.680,
+ July 2002.
+
+6. Ongoing Collaborative Resources
+
+ This section contains information regarding resources, repositories
+ and websites related to ongoing collaboration and participation for
+ community members and experts alike with respect to this ID series.
+
+6.1. The 'oid-directory' Repositories
+
+ The following URL refers to a GitHub repository dedicated solely for
+ management of each ID in the (immediate) series:
+
+ https://github.com/oid-directory/id
+
+ The following URL refers to a GitHub repository dedicated for content
+ relating to the RASCHEMA ID:
+
+ https://github.com/oid-directory/definitions
+
+ Individuals or other parties interested in participating in this ID
+ series are encouraged to visit any or all of these repositories.
+
+6.2. The 'oid.directory' Internet Domain
+
+ The public internet domain 'oid.directory' has been reserved for any
+ relevant endeavors related to the ID series in the future.
+
+ Should the ID be accepted and elevated to the status of RFC, this
+ domain may be turned over to an appropriate entity or working group.
+
+Author's Address
+
+ Jesse Coretta
+ California, United States
+
+ Email: jesse.coretta@icloud.com
+
+Coretta Expires August 27, 2024 [Page 13]
diff --git a/docs/specs/draft-coretta-oiddir-schema-01.txt b/docs/specs/draft-coretta-oiddir-schema-01.txt
new file mode 100644
index 000000000..59cde136f
--- /dev/null
+++ b/docs/specs/draft-coretta-oiddir-schema-01.txt
@@ -0,0 +1,3246 @@
+
+
+RASCHEMA J. Coretta
+Internet-Draft February 29, 2024
+Intended status: Experimental
+Obsoletes: X660LDAP
+Expires: August 27, 2024
+
+
+ The OID Directory: The Schema
+ draft-coretta-oiddir-schema-01.txt
+
+Abstract
+
+ In service to the "OID Directory" ID series, this ID declares schema
+ definitions for use within an implementation of the Registration
+ Authority Directory Information Tree.
+
+ See the RADIR ID for a complete draft series manifest.
+
+Status of This Memo
+
+ This Internet-Draft is submitted in full conformance with the
+ provisions of BCP 78 and BCP 79.
+
+ Internet-Drafts are working documents of the Internet Engineering
+ Task Force (IETF). Note that other groups may also distribute
+ working documents as Internet-Drafts. The list of current Internet-
+ Drafts is at https://datatracker.ietf.org/drafts/current/.
+
+ Internet-Drafts are draft documents valid for a maximum of six months
+ and may be updated, replaced, or obsoleted by other documents at any
+ time. It is inappropriate to use Internet-Drafts as reference
+ material or to cite them other than as "work in progress."
+
+ This Internet-Draft will expire on August 27, 2024.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 1]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+Table of Contents
+
+ 1. Introduction ....................................................4
+ 1.1. Conventions ................................................5
+ 1.2. Acronyms Used ..............................................5
+ 1.3. Allocations ................................................5
+ 1.4. Well-Known Numeric OIDs ....................................5
+ 2. Schema Definitions ..............................................6
+ 2.1. LDAP Syntaxes ..............................................6
+ 2.2. Matching Rules .............................................6
+ 2.3. Attribute Types ............................................6
+ 2.3.1. 'n' ...................................................7
+ 2.3.2. 'dotNotation' .........................................7
+ 2.3.3. 'iRI' .................................................7
+ 2.3.4. 'aSN1Notation' ........................................8
+ 2.3.5. 'unicodeValue' ........................................8
+ 2.3.6. 'additionalUnicodeValue' ..............................9
+ 2.3.7. 'identifier' ..........................................9
+ 2.3.8. 'secondaryIdentifier' ................................10
+ 2.3.9. 'registrationInformation' ............................10
+ 2.3.10. 'registrationURI' ...................................10
+ 2.3.11. 'registrationCreated' ...............................11
+ 2.3.12. 'registrationModified' ..............................11
+ 2.3.13. 'registrationRange' .................................12
+ 2.3.14. 'registrationStatus' ................................12
+ 2.3.15. 'registrationClassification' ........................12
+ 2.3.16. 'isLeafNode' ........................................13
+ 2.3.17. 'isFrozen' ..........................................13
+ 2.3.18. 'standardizedNameForm' ..............................13
+ 2.3.19. 'nameAndNumberForm' .................................14
+ 2.3.20. 'longArc' ...........................................14
+ 2.3.21. 'supArc' ............................................15
+ 2.3.22. 'c-supArc' ..........................................15
+ 2.3.23. 'topArc' ............................................16
+ 2.3.24. 'c-topArc' ..........................................16
+ 2.3.25. 'subArc' ............................................17
+ 2.3.26. 'leftArc' ...........................................17
+ 2.3.27. 'minArc' ............................................17
+ 2.3.28. 'c-minArc' ..........................................18
+ 2.3.29. 'rightArc' ..........................................18
+ 2.3.30. 'maxArc' ............................................19
+ 2.3.31. 'c-maxArc' ..........................................19
+ 2.3.32. 'discloseTo' ........................................20
+ 2.3.33. 'c-discloseTo' ......................................20
+ 2.3.34. 'registrantID .......................................20
+ 2.3.35. 'currentAuthority' ..................................21
+ 2.3.36. 'c-currentAuthority' ................................21
+ 2.3.37. 'currentAuthorityStartTimestamp' ....................22
+ 2.3.38. 'currentAuthorityCommonName' ........................22
+ 2.3.39. 'currentAuthorityCountryCode' .......................22
+ 2.3.40. 'currentAuthorityCountryName' .......................23
+ 2.3.41. 'currentAuthorityEmail' .............................23
+
+Coretta Expires August 27, 2024 [Page 2]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ 2.3.42. 'currentAuthorityFax' ...............................23
+ 2.3.43. 'currentAuthorityLocality' ..........................24
+ 2.3.44. 'currentAuthorityMobile' ............................24
+ 2.3.45. 'currentAuthorityOrg' ...............................25
+ 2.3.46. 'currentAuthorityPOBox' .............................25
+ 2.3.47. 'currentAuthorityPostalAddress' .....................25
+ 2.3.48. 'currentAuthorityPostalCode' ........................26
+ 2.3.49. 'currentAuthorityState' .............................26
+ 2.3.50. 'currentAuthorityStreet' ............................26
+ 2.3.51. 'currentAuthorityTelephone' .........................27
+ 2.3.52. 'currentAuthorityTitle' .............................27
+ 2.3.53. 'currentAuthorityURI' ...............................27
+ 2.3.54. 'firstAuthority' ....................................28
+ 2.3.55. 'c-firstAuthority' ..................................28
+ 2.3.56. 'firstAuthorityStartTimestamp' ......................29
+ 2.3.57. 'firstAuthorityEndTimestamp' ........................29
+ 2.3.58. 'firstAuthorityCommonName' ..........................29
+ 2.3.59. 'firstAuthorityCountryCode' .........................30
+ 2.3.60. 'firstAuthorityCountryName' .........................30
+ 2.3.61. 'firstAuthorityEmail' ...............................31
+ 2.3.62. 'firstAuthorityFax' .................................31
+ 2.3.63. 'firstAuthorityLocality' ............................31
+ 2.3.64. 'firstAuthorityMobile' ..............................32
+ 2.3.65. 'firstAuthorityOrg' .................................32
+ 2.3.66. 'firstAuthorityPOBox' ...............................32
+ 2.3.67. 'firstAuthorityPostalAddress' .......................33
+ 2.3.68. 'firstAuthorityPostalCode' ..........................33
+ 2.3.69. 'firstAuthorityState' ...............................34
+ 2.3.70. 'firstAuthorityStreet' ..............................34
+ 2.3.71. 'firstAuthorityTelephone' ...........................34
+ 2.3.72. 'firstAuthorityTitle' ...............................35
+ 2.3.73. 'firstAuthorityURI' .................................35
+ 2.3.74. 'sponsor' ...........................................35
+ 2.3.75. 'c-sponsor' .........................................36
+ 2.3.76. 'sponsorStartTimestamp ..............................36
+ 2.3.77. 'sponsorEndTimestamp ................................37
+ 2.3.78. 'sponsorCommonName' .................................37
+ 2.3.79. 'sponsorCountryCode' ................................37
+ 2.3.80. 'sponsorCountryName' ................................38
+ 2.3.81. 'sponsorEmail' ......................................38
+ 2.3.82. 'sponsorFax' ........................................38
+ 2.3.83. 'sponsorLocality' ...................................39
+ 2.3.84. 'sponsorMobile' .....................................39
+ 2.3.85. 'sponsorOrg' ........................................39
+ 2.3.86. 'sponsorPOBox' ......................................40
+ 2.3.87. 'sponsorPostalAddress' ..............................40
+ 2.3.88. 'sponsorPostalCode' .................................41
+ 2.3.89. 'sponsorState' ......................................41
+ 2.3.90. 'sponsorStreet' .....................................41
+ 2.3.91. 'sponsorTelephone' ..................................42
+ 2.3.92. 'sponsorTitle' ......................................42
+ 2.3.93. 'sponsorURI' ........................................42
+
+Coretta Expires August 27, 2024 [Page 3]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ 2.3.94. 'rADITProfile' ......................................43
+ 2.3.95. 'rARegistrationBase' ................................43
+ 2.3.96. 'rARegistrantBase' ..................................43
+ 2.3.97. 'rADirectoryModel' ..................................44
+ 2.3.98. 'rAServiceMail' .....................................44
+ 2.3.99. 'rAServiceURI' ......................................44
+ 2.3.100. 'rATTL' ............................................45
+ 2.3.101. 'c-rATTL' ..........................................45
+ 2.3.102. 'registeredUUID' ...................................46
+ 2.4. Matching Rule Uses ........................................46
+ 2.5. Object Classes ............................................46
+ 2.5.1. 'registration' .......................................46
+ 2.5.2. 'rootArc' ............................................46
+ 2.5.3. 'arc' ................................................47
+ 2.5.4. 'x660Context .........................................47
+ 2.5.5. 'x667Context .........................................47
+ 2.5.6. 'x680Context .........................................47
+ 2.5.7. 'iTUTRegistration' ...................................48
+ 2.5.8. 'iSORegistration' ....................................48
+ 2.5.9. 'jointISOITUTRegistration' ...........................49
+ 2.5.10. 'spatialContext' ....................................49
+ 2.5.11. 'registrationSupplement' ............................50
+ 2.5.12. 'firstAuthorityContext' .............................50
+ 2.5.13. 'currentAuthorityContext' ...........................51
+ 2.5.14. 'sponsorContext' ....................................51
+ 2.5.15. 'registrant' ........................................52
+ 2.5.16. 'rADUAConfig' .......................................52
+ 2.6. DIT Content Rules .........................................52
+ 2.7. Name Forms ................................................53
+ 2.7.1. 'nRootArcForm' .......................................53
+ 2.7.2. 'nArcForm' ...........................................53
+ 2.7.3. 'dotNotationArcForm' .................................53
+ 2.8. DIT Structure Rules .......................................53
+ 3. IANA Considerations ............................................54
+ 4. Security Considerations ........................................54
+ 5. References .....................................................54
+ 5.1. Normative References ......................................54
+ 5.2. Informative References ....................................55
+ Author's Address ..................................................56
+
+1. Introduction
+
+ The information bases meant to house registration and registrant data
+ by way of modern directory standards as outlined within this series
+ is dependent upon a comprehensive directory schema.
+
+ The schema is used to define content and -- to a degree -- structure
+ within the directory.
+
+ In context, the definitions set forth are based on concepts derived
+ from ITU-T Recommendations [X.660], [X.680], [RFC2578] et al.
+
+
+Coretta Expires August 27, 2024 [Page 4]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The intended end result is a directory service specially suited to
+ operate as an object identifier registration authority service.
+
+1.1. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
+ and "OPTIONAL" in this document are to be interpreted as described
+ in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in
+ all capitals, as shown here.
+
+1.2. Acronyms Used
+
+ See Section 1.3 of the RADIR ID for all acronym references.
+
+1.3. Allocations
+
+ This specification extends the previously defined ID series OID root
+ '1.3.6.1.4.1.56521.101', defined in Section 1.6 of the RADIR ID:
+
+ - 1.3.6.1.4.1.56521.101.2 (schema)
+ - 1.3.6.1.4.1.56521.101.2.3 (attributeTypes)
+ - 1.3.6.1.4.1.56521.101.2.5 (objectClasses)
+ - 1.3.6.1.4.1.56521.101.2.7 (nameForms)
+
+ All OIDs defined in this ID correlate to the section numbers in which
+ they originate. For example, the 'n' attribute type defined within
+ Section 2.3.1 is associated with the OID 1.3.6.1.4.1.56521.101.2.3.1.
+
+ Should this ID be elevated to RFC status, the aforementioned ID root
+ OID prefix shall be rendered obsolete in favor of an IANA-assigned
+ OID, at which point this ID will be updated to reference the literal
+ 'IANA-ASSIGNED-OID' placeholder prefix, where appropriate.
+
+1.4. Well-Known Numeric OIDs
+
+ This ID references several well-known numeric OIDs defined by other
+ parties or institutions, particularly as it pertains to the content
+ within all of Section 2.3. These numeric OIDs are shown below:
+
+ - 1.3 (Identified-Organization, per clause A.4.2 of ITU-T Rec.
+ [X.660])
+
+ - 1.3.6 (dod, per Section 3.1 of [RFC1155])
+
+ - 1.3.6.1 (Internet OID, per Section 3.1 of [RFC1155])
+
+ - 1.3.6.1.1.16.1 (UUID syntax, matching rule and ordering rule, per
+ Sections 2.1, 2.2 and 2.3 of [RFC4530] respectively)
+
+ - 1.3.6.1.4.1.1466.115.121.1.12 (DN syntax and matching rule, per
+ Section 4.2.15 of [RFC4517])
+
+Coretta Expires August 27, 2024 [Page 5]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ - 1.3.6.1.4.1.1466.115.121.1.24 (Generalized Time syntax, per
+ Section 3.3.13 of [RFC4517])
+
+ - 1.3.6.1.4.1.1466.115.121.1.27 (Integer syntax, per Section 3.3.16
+ of [RFC4517])
+
+ - 1.3.6.1.4.1.1466.115.121.1.38 (OID syntax, per Section 3.3.26
+ [RFC4517])
+
+ - 1.3.6.1.4.1.1466.115.121.1.40 (Octet String syntax, per Section
+ 3.3.25 of [RFC4517])
+
+2. Schema Definitions
+
+ This section discusses the particulars of the LDAP schema definitions
+ made available through this ID.
+
+ These schema definitions described in this section are provided using
+ LDAP description formats [RFC4512]. These elements are line-wrapped
+ and indented for readability when needed.
+
+2.1. LDAP Syntaxes
+
+ No LDAP syntaxes are defined anywhere in this ID series. However,
+ the topic of syntax is a recurring theme in ITU-T Recommendations
+ [X.660], [X.680] and many other standards relevant to this series.
+
+ This section serves only to advise the reader to consider the many
+ defined (or cited) ABNF productions throughout Section 2.3. While
+ the base LDAP syntaxes used within this ID are often insufficient
+ in enforcing complete compliance with relevant syntax standards,
+ most modern X.500/LDAP products support use of constraining rules
+ of some form to narrow their scope.
+
+ While the particulars of such product features are out of scope for
+ this ID series, the reader is nonetheless advised to make an effort
+ to sufficiently constrain attribute value input so as to honor the
+ relevant standard(s) in question.
+
+2.2. Matching Rules
+
+ No LDAP matching rule definitions are defined anywhere in this
+ ID series.
+
+2.3. Attribute Types
+
+ The following subsections detail one hundred two (102) LDAP attribute
+ types created for use within implementations of this specification.
+
+ Please note that a great many of these attribute type definitions are
+ sub types of attribute types defined in the following Standards, and
+ as such are considered dependencies:
+
+Coretta Expires August 27, 2024 [Page 6]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ - [RFC2079] for URI support
+ - [RFC4519] for so-called "core" schema elements
+ - [RFC4524] for Cosine schema elements
+
+ If the nature of a particular directory implementation precludes the
+ use of sub typed attributes, this specification may not be practical
+ for adoption.
+
+2.3.1. 'n'
+
+ The 'n' attribute type allows the assignment of an unsigned integer
+ used to represent the Number Form of a registration per ITU-T Rec.
+ [X.680].
+
+ A practical ABNF production, labeled 'number', is defined in Section
+ 1.4 of [RFC4512].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.1
+ NAME ( 'n' 'numberForm' )
+ DESC 'X.680, cl. 32.3: NumberForm'
+ EQUALITY integerMatch
+ ORDERING integerOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
+ SINGLE-VALUE )
+
+ Examples: "56521", "0"
+
+2.3.2. 'dotNotation'
+
+ The 'dotNotation' attribute type allows the assignment of one (1) OID
+ to any non root registration.
+
+ A practical ABNF production, labeled 'numericoid', is defined within
+ Section 1.4 of [RFC4512].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.2
+ NAME 'dotNotation'
+ DESC 'X.680: OID in dotted notation'
+ EQUALITY objectIdentifierMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
+ SINGLE-VALUE )
+
+ Examples: "1.3.6.1", "2.999"
+
+2.3.3. 'iRI'
+
+ The 'iRI' attribute type allows the assignment of one (1) or more
+ OID-IRI values to a registration.
+
+ A practical ABNF production for this attribute type, as derived from
+ clause 34.3 of ITU-T Rec. [X.680], is as follows:
+
+
+Coretta Expires August 27, 2024 [Page 7]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ subArcId = SOLIDUS arcId [ subArcId ]
+ arcId = SOLIDUS ( intUV / nintUV )
+ nintUV = 1*iunreserved ; non-integer unicode value
+ intUV = number ; integer unicode value
+
+ SOLIDUS = "%x2f" ; "/"
+
+ The 'number' ABNF production originates in Section 1.4 of [RFC4512].
+ The 'iunreserved' ABNR production originates within Section 2.2 of
+ [RFC3987].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.3
+ NAME 'iRI'
+ DESC 'X.680, cl. 34: OID-IRI'
+ EQUALITY octetStringMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
+
+ Examples: "/ITU-T", "/ISO/Identified-Organization", "/ASN.1"
+
+2.3.4. 'aSN1Notation'
+
+ The 'aSN1Notation' attribute type allows the assignment of an OID in
+ ASN.1, or ITU-T Rec. [X.680] ObjectIdentifierValue, notation.
+
+ A practical ABNF production for this attribute type is as follows:
+
+ asn1notation = LCURL forms RCURL
+ forms = nanf *( SPACE nanf )
+
+ SPACE = "%x20" ; " "
+ LCURL = "%x7b" ; "{"
+ RCURL = "%x7d" ; "}"
+
+ The 'nanf' ABNF originates in Section 2.3.19.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.4
+ NAME 'aSN1Notation'
+ DESC 'X.680, cl. 32.3: ObjectIdentifierValue'
+ EQUALITY caseIgnoreMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
+ SINGLE-VALUE )
+
+ Examples: "{itu-t(0)}", "{iso(1) identified-organization(3)}"
+
+2.3.5. 'unicodeValue'
+
+ The 'unicodeValue' attribute type allows the assignment of a single
+ non-integer Unicode label to a registration, per ITU-T Rec. [X.660].
+
+ A practical ABNF production for this attribute type is as follows:
+
+ uval = 1*iunreserved
+
+Coretta Expires August 27, 2024 [Page 8]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The ABNF production 'iunreserved' is defined in Section 2.2 of
+ [RFC3987].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.5
+ NAME 'unicodeValue'
+ DESC 'X.660, cl. 7.5: non-integer Unicode label'
+ EQUALITY octetStringMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
+ SINGLE-VALUE )
+
+ Examples: "ITU-T", "Identified-Organization"
+
+2.3.6. 'additionalUnicodeValue'
+
+ The 'additionalUnicodeValue' attribute type allows for the assignment
+ of one (1) or more additional non-integer Unicode labels, per clause
+ 3.5.2 of ITU-T Rec. [X.660], to a registration.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 2.3.5.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.6
+ NAME 'additionalUnicodeValue'
+ DESC 'X.660, cl. 3.5.2: additional non-integer Unicode labels'
+ EQUALITY octetStringMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
+
+2.3.7. 'identifier'
+
+ The 'identifier' attribute type allows for the assignment of one (1)
+ non-numeric, non-Unicode identifier, or nameForm, to a registration.
+
+ Per clause 12.3 of ITU-T Rec. [X.680]:
+
+ An "identifier" shall consist of an arbitrary number (one or more)
+ of letters, digits, and hyphens. The initial character shall be a
+ lower-case letter. A hyphen shall not be the last character. A
+ hyphen shall not be immediately followed by another hyphen.
+
+ As a practical ABNF production, the above clause translates as
+ follows:
+
+ identifier = leadkeychar *keychar
+ leadkeychar = LOWER
+ keychar = *( [ HYPHEN ] ( ALPHA / DIGIT ) )
+
+ ALPHA = ( LOWER / UPPER ) ; a-z / A-Z
+ UPPER = "%x41-%x5a" ; A-Z
+ LOWER = "%x61-%x7a" ; a-z
+ DIGIT = "%x30-%x39" ; 0-9
+ HYPHEN = "%x2d" ; "-"
+
+
+Coretta Expires August 27, 2024 [Page 9]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'name', as defined in Section 2.18 of [RFC4519],
+ is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.7
+ NAME ( 'identifier' 'nameForm' )
+ DESC 'X.680, cl. 12.3: Identifier'
+ SUP name
+ SINGLE-VALUE )
+
+ Examples: "itu-t", "iso"
+
+2.3.8. 'secondaryIdentifier'
+
+ The 'secondaryIdentifier' attribute type allows the assignment of
+ one (1) or more additional secondary non-numeric non-Unicode values,
+ per clause 3.5.1 of ITU-T Rec. [X.660], to a registration.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 2.3.7.
+
+ The attribute type 'name', as defined in Section 2.18 of [RFC4519],
+ is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.8
+ NAME 'secondaryIdentifier'
+ DESC 'X.660, cl. 3.5.1: Additional Identifiers'
+ SUP name )
+
+ Examples: "enterprises", "ccitt"
+
+2.3.9. 'registrationInformation'
+
+ The 'registrationInformation' attribute type allows the OPTIONAL
+ assignment of octet-based values intended for extended information
+ relating to the registration in question.
+
+ The 'OCTET' ABNF production defined in Section 1.4 of [RFC4512] is
+ applicable in any non-zero quantity or combination, as no defined
+ syntax or standard exists to govern this type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.9
+ NAME 'registrationInformation'
+ DESC 'Extended octet-based registration data'
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
+
+ Example: "Acme, Co., Research & Development, Copyright (c) 2024"
+
+
+2.3.10. 'registrationURI'
+
+ The 'registrationURI' attribute type allows for the assignment of one
+ (1) or more URI values, with optional labels, to a registration.
+
+Coretta Expires August 27, 2024 [Page 10]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'labeledURI', as defined in [RFC2079], is a super
+ type of this attribute type.
+
+ A practical ABNF production for this attribute type is defined within
+ Appendix A of [RFC3986].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.10
+ NAME 'registrationURI'
+ DESC 'Uniform Resource Identifier for a registration'
+ SUP labeledURI )
+
+ Examples: "http://example.com Example", "ftp://example.com"
+
+2.3.11. 'registrationCreated'
+
+ The 'registrationCreated' attribute type allows for the assignment
+ of a generalized timestamp indicating the date and time at which a
+ registration was, or will be, created or officiated.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.11
+ NAME 'registrationCreated'
+ DESC 'Generalized timestamp for a registration creation'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
+ SINGLE-VALUE )
+
+ Examples: "19800229114853Z", "20130109033116Z"
+
+2.3.12. 'registrationModified'
+
+ The 'registrationModified' attribute type allows for the assignment
+ of one (1) or more generalized timestamp values indicating the dates
+ and times of all applied updates to a registration.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.12
+ NAME 'registrationModified'
+ DESC 'Generalized timestamps for registration modifications'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )
+
+ Examples: "19951231115959Z", "20130109033116Z"
+
+
+
+
+Coretta Expires August 27, 2024 [Page 11]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.13. 'registrationRange'
+
+ The 'registrationRange' attribute type allows for the expression of
+ an OID sibling allocation range, such as "100" to indicate 'up to
+ 100', or "-1" to indicate 'to infinity'.
+
+ A practical ABNF production, labeled 'number', is defined in Section
+ 1.4 of [RFC4512]. This satisfies the unsigned form of instances of
+ this type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.13
+ NAME 'registrationRange'
+ DESC 'Numerical registration range expression'
+ EQUALITY integerMatch
+ ORDERING integerOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
+ SINGLE-VALUE )
+
+ Examples: "-1", "1999", "1000000"
+
+2.3.14. 'registrationStatus'
+
+ The 'registrationStatus' attribute type allows for the assignment of
+ status information meant to define the state of the registration.
+
+ A practical ABNF production for the super type, 'description', is
+ found within Section 3.3.6 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.14
+ NAME 'registrationStatus'
+ DESC 'Current registration status'
+ SUP description )
+
+ Examples: "OBSOLETE", "DEALLOCATED", "RESERVED"
+
+2.3.15. 'registrationClassification'
+
+ The 'registrationClassification' attribute type allows a registration
+ to bear an informal classification value, thereby describing an OID's
+ context or category.
+
+ A practical ABNF production for the super type, 'description', can be
+ found within Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.15
+ NAME 'registrationClassification'
+ DESC 'Known registration classification'
+ SUP description
+ SINGLE-VALUE )
+
+ Examples: "Standard", "Individual", "ASN.1 Modules"
+
+
+Coretta Expires August 27, 2024 [Page 12]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.16. 'isLeafNode'
+
+ The 'isLeafNode' attribute type allows for the assignment of a single
+ Boolean value indicative of whether a registration can be a parent to
+ any subordinate registrations.
+
+ A practical ABNF production for this attribute type is found within
+ Section 3.3.3 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.16
+ NAME 'isLeafNode'
+ DESC 'Whether a registration may allocate sub arcs'
+ EQUALITY booleanMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
+ SINGLE-VALUE )
+
+ Examples: "TRUE", "FALSE", or Undefined (implies "FALSE")
+
+2.3.17. 'isFrozen'
+
+ The 'isFrozen' attribute type allows for the assignment of a single
+ Boolean value indicative of whether a registration can be a parent
+ to any further subordinate registrations beyond those that already
+ exist at present.
+
+ A practical ABNF production for this attribute type is found within
+ Section 3.3.3 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.17
+ NAME 'isFrozen'
+ DESC 'Whether additional sub arcs are permitted'
+ EQUALITY booleanMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
+ SINGLE-VALUE )
+
+ Examples: "TRUE", "FALSE", or Undefined (implies "FALSE")
+
+2.3.18. 'standardizedNameForm'
+
+ The 'standardizedNameForm' attribute type allows for the assignment
+ of one (1) or more Standardized NameForm values, per clauses A.2 and
+ A.3 of ITU-T Rec. [X.660], to a registration only if its 'identifier'
+ value is considered standardized.
+
+ A practical ABNF production for this attribute type is as follows:
+
+ stdnf = LCURL nonfs RCURL
+ nonfs = nonf *( SPACE nonf )
+ nonf = ( identifier / number ) ; name OR number
+
+
+
+
+Coretta Expires August 27, 2024 [Page 13]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ SPACE = "%x20" ; " "
+ LCURL = "%x7b" ; "{"
+ RCURL = "%x7d" ; "}"
+
+ The 'identifier' ABNF originates in Section 2.3.7. The 'number' ABNF
+ production can be found within Section 1.4 of [RFC4512].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.18
+ NAME 'standardizedNameForm'
+ DESC 'X.660, cl. A.2-A-3: Standardized Identifier or NameForm'
+ EQUALITY caseExactMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
+
+ Examples: "{itu-t}", "{0 0 d}"
+
+2.3.19. 'nameAndNumberForm'
+
+ The 'nameAndNumberForm' attribute type allows for the assignment of
+ an ITU-T Rec. [X.680] NameAndNumberForm value to a registration.
+
+ A practical ABNF production for this attribute type is as follows:
+
+ nonf = ( nanf / number ) ; nanf OR numberForm
+ nanf = name LPAREN number RPAREN ; name AND numberForm
+ name = identifier ; name form
+
+ LPAREN = "%x28" ; "("
+ RPAREN = "%x29" ; ")"
+
+ The 'identifier' ABNF production can be found in Section 2.3.7. The
+ 'number' ABNF production is defined in Section 1.4 of [RFC4512].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.19
+ NAME 'nameAndNumberForm'
+ DESC 'X.680, cl. 32.3: NameAndNumberForm'
+ EQUALITY caseExactMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
+ SINGLE-VALUE )
+
+ Examples: "private(4)", "itu-t(0)", "56521"
+
+2.3.20. 'longArc'
+
+ The 'longArc' attribute type allows for the assignment of one (1) or
+ more so-called "Long Arc" well-known identifiers to a registration.
+
+ A practical ABNF production for this attribute type is as follows:
+
+ longArc = SOLIDUS ( intUV / nintUV )
+ nintUV = 1*iunreserved ; non-integer unicode value
+ intUV = number ; integer unicode value
+
+
+Coretta Expires August 27, 2024 [Page 14]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.20
+ NAME 'longArc'
+ DESC 'X.660, cl. A.7: Long Arc'
+ EQUALITY octetStringMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
+
+ Examples: "/Example", "/Ejemplo"
+
+2.3.21. 'supArc'
+
+ The 'supArc' attribute type allows for the assignment of an LDAP DN
+ value to any non-root registration, thereby identifying the DN of the
+ immediate superior (parent) registration.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.21
+ NAME 'supArc'
+ DESC 'Immediate superior registration DN'
+ SUP distinguishedName
+ SINGLE-VALUE )
+
+ Example: "n=1,n=2,ou=Registrations,o=rA"
+
+2.3.22. 'c-supArc'
+
+ The 'c-supArc' attribute type is the manifestation of the 'supArc'
+ attribute type defined in Section 2.3.21 with Collective Attribute
+ [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MUST NOT be present for entries that also bear
+ a 'supArc' attribute type instance. The value MUST be singular.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.22
+ NAME 'c-supArc'
+ DESC 'Collective immediate superior registration DN'
+ SUP distinguishedName
+ COLLECTIVE )
+
+
+Coretta Expires August 27, 2024 [Page 15]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ Example: "n=1,n=2,ou=Registrations,o=rA"
+
+2.3.23. 'topArc'
+
+ The 'topArc' attribute type allows for the assignment of an LDAP DN
+ value to any non-root registration, thereby identifying the superior
+ root registration.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.23
+ NAME 'topArc'
+ DESC 'Superior root registration DN'
+ SUP distinguishedName
+ SINGLE-VALUE )
+
+ Example: "n=2,ou=Registrations,o=rA"
+
+2.3.24. 'c-topArc'
+
+ The 'c-topArc' attribute type is the manifestation of the 'topArc'
+ attribute type defined in Section 2.3.23 with Collective Attribute
+ [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MUST NOT be present for entries that also bear
+ a 'topArc' attribute type instance. The value MUST be singular.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.24
+ NAME 'c-topArc'
+ DESC 'Collective superior root registration DN'
+ SUP distinguishedName
+ COLLECTIVE )
+
+ Example: "n=2,ou=Registrations,o=rA"
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 16]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.25. 'subArc'
+
+ The 'subArc' attribute type allows for the assignment of one (1) or
+ more LDAP DN values to a registration as a manifest of subordinate
+ registrations residing exactly one (1) logical level below, if any.
+
+ In robust implementations of this ID that cover most (or all) of the
+ OID Tree, use of this attribute type will require careful, long-term
+ planning.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.25
+ NAME 'subArc'
+ DESC 'Subordinate registration DN'
+ SUP distinguishedName )
+
+ Example: "n=1,n=6,n=3,n=1,ou=Registrations,o=rA"
+
+2.3.26. 'leftArc'
+
+ The 'leftArc' attribute type allows for the assignment of a DN value
+ to a registration, referencing a registration positioned to the left
+ side of the bearer in terms of (lesser) 'n' magnitude.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.26
+ NAME 'leftArc'
+ DESC 'Nearest antecedent registration DN'
+ SUP distinguishedName
+ SINGLE-VALUE )
+
+ Example: "n=5,n=2,ou=Registrations,o=rA"
+
+2.3.27. 'minArc'
+
+ The 'minArc' attribute type allows for the assignment of a DN value
+ to a registration. The value SHOULD reference the entry which bears
+ the lowest 'n' value of any of its siblings.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+
+Coretta Expires August 27, 2024 [Page 17]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.27
+ NAME 'minArc'
+ DESC 'First or left-most sibling registration DN'
+ SUP distinguishedName
+ SINGLE-VALUE )
+
+ Example: "n=0,n=2,ou=Registrations,o=rA"
+
+2.3.28. 'c-minArc'
+
+ The 'c-minArc' attribute type is the manifestation of the attribute
+ type 'minArc', defined in Section 2.3.27 with Collective Attribute
+ [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MUST NOT be present for entries that also bear
+ a 'minArc' attribute type instance. The value MUST be singular.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.28
+ NAME 'c-minArc'
+ DESC 'Collective first or left-most sibling registration DN'
+ SUP distinguishedName
+ COLLECTIVE )
+
+ Example: "n=0,n=2,ou=Registrations,o=rA"
+
+2.3.29. 'rightArc'
+
+ The 'rightArc' attribute type allows for the assignment of a DN value
+ to a registration, referencing a registration positioned to the right
+ side of the bearer in terms of (greater) 'n' magnitude.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 18]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.29
+ NAME 'rightArc'
+ DESC 'Nearest subsequent registration DN'
+ SINGLE-VALUE
+ SUP distinguishedName )
+
+ Example: "n=2,n=2,ou=Registrations,o=rA"
+
+2.3.30. 'maxArc'
+
+ The 'maxArc' attribute type allows for the assignment of a DN value
+ to a registration. The value SHOULD reference the entry which bears
+ the highest 'n' value of any of its siblings.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.30
+ NAME 'maxArc'
+ DESC 'Final or right-most sibling registration DN'
+ SUP distinguishedName
+ SINGLE-VALUE )
+
+ Example: "n=999,n=2,ou=Registrations,o=rA"
+
+2.3.31. 'c-maxArc'
+
+ The 'c-maxArc' attribute type is the manifestation of the attribute
+ type 'maxArc', defined in Section 2.3.30 with Collective Attribute
+ [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ This attribute type MUST NOT be present for entries that also bear
+ a 'maxArc' attribute type instance. The value MUST be singular.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.31
+ NAME 'c-maxArc'
+ DESC 'Collective final or right-most sibling registration DN'
+ SUP distinguishedName
+ COLLECTIVE )
+
+ Example: "n=999,n=2,ou=Registrations,o=rA"
+
+
+
+Coretta Expires August 27, 2024 [Page 19]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.32. 'discloseTo'
+
+ The 'discloseTo' attribute type allows for the assignment of one (1)
+ or more LDAP DN values to a registration, each of which reference an
+ identity that is authorized to access one (1) or more confidential
+ registrations in read-only fashion.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.32
+ NAME 'discloseTo'
+ DESC 'Authorized registration reader'
+ SUP distinguishedName )
+
+ Example: "cn=AuthorizedReader,ou=Groups,o=rA"
+
+2.3.33. 'c-discloseTo'
+
+ The 'c-discloseTo' attribute type is the COLLECTIVE manifestation of
+ the attribute type 'discloseTo', defined in Section 2.3.32.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MAY be present for entries that also bear a
+ 'discloseTo' attribute type instance.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.33
+ NAME 'c-discloseTo'
+ DESC 'Collective authorized registration reader'
+ SUP distinguishedName
+ COLLECTIVE )
+
+ Example: "cn=ClearanceLevel4,ou=Groups,o=rA"
+
+2.3.34. 'registrantID'
+
+ The 'registrantID' attribute type is intended to allow for singular
+ assignment of a UUID, GUID or some other auto-generated value to a
+ registrant entry.
+
+ No specific syntax is implied for values of this type.
+
+Coretta Expires August 27, 2024 [Page 20]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.34
+ NAME 'registrantID'
+ DESC 'Unambiguous identifier assigned to an authority'
+ EQUALITY octetStringMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
+ SINGLE-VALUE )
+
+ Examples: "rfc4519", "65116e61-cc02-4c50-bde7-5bdaf4e973e4"
+
+2.3.35. 'currentAuthority'
+
+ The 'currentAuthority' attribute type allows for the assignment of
+ one (1) or more DN values to a registration.
+
+ The value(s) of this attribute type are meant to refer to distinct
+ entries that contain current registrant authority information for
+ the registration to which it is linked.
+
+ This attribute type is only required if registrant information is not
+ stored within a given registration directly.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.35
+ NAME 'currentAuthority'
+ DESC 'DN for a registrant serving as the current authority'
+ SUP distinguishedName )
+
+ Example: "registrantID=XYZ,ou=Registrants,o=rA"
+
+2.3.36. 'c-currentAuthority'
+
+ The 'c-currentAuthority' attribute type is the manifestation of the
+ 'currentAuthority' attribute type, defined in Section 2.3.35 with
+ Collective Attribute [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MAY be present for entries that also bear
+ a 'currentAuthority' attribute type instance.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+
+Coretta Expires August 27, 2024 [Page 21]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.36
+ NAME 'c-currentAuthority'
+ DESC 'Collective DN for a current authority'
+ SUP distinguishedName )
+
+ Example: "registrantID=XYZ,ou=Registrants,o=rA"
+
+2.3.37. 'currentAuthorityStartTimestamp'
+
+ The 'currentAuthorityStartTimestamp' attribute type allows for the
+ assignment of a generalized timestamp value to a current registration
+ authority. The value is indicative of the date and time at which the
+ current registration authority was, or will be, officiated.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.37
+ NAME 'currentAuthorityStartTimestamp'
+ DESC 'Registration authority commencement timestamp'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
+ SINGLE-VALUE )
+
+ Example: "19951231115959Z"
+
+2.3.38. 'currentAuthorityCommonName'
+
+ The 'currentAuthorityCommonName' attribute type allows for the
+ assignment of a common name to a current authority entry.
+
+ The attribute type 'cn', as defined in Section 2.3 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.38
+ NAME 'currentAuthorityCommonName'
+ DESC 'Common Name for a current authority'
+ SUP cn
+ SINGLE-VALUE )
+
+ Example: "Jesse Coretta", "Jane Smith"
+
+2.3.39. 'currentAuthorityCountryCode'
+
+ The 'currentAuthorityCountryCode' attribute type allows for the
+ assignment of a country code to a current authority entry.
+
+ The attribute type 'c', as defined in Section 2.2 of [RFC4519],
+ is a super type of this attribute type.
+
+Coretta Expires August 27, 2024 [Page 22]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ A practical ABNF production is found in Section 3.3.4 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.39
+ NAME 'currentAuthorityCountryCode'
+ DESC 'Country Code for a current authority'
+ SUP c
+ SINGLE-VALUE )
+
+ Examples: "US", "CA"
+
+2.3.40. 'currentAuthorityCountryName'
+
+ The 'currentAuthorityCountryName' attribute type allows for the
+ assignment of a country name to a current authority entry.
+
+ The attribute type 'co', as defined in Section 2.4 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.40
+ NAME 'currentAuthorityCountryName'
+ DESC 'Country name for a current authority'
+ SUP co
+ SINGLE-VALUE )
+
+ Examples: "United States", "Canada"
+
+2.3.41. 'currentAuthorityEmail'
+
+ The 'currentAuthorityEmail' attribute type allows for the assignment
+ of an email address to the current registration authority entry.
+
+ The attribute type 'mail', as defined in Section 2.16 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'IA5String'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.41
+ NAME 'currentAuthorityEmail'
+ DESC 'Email address for a current authority'
+ SUP mail
+ SINGLE-VALUE )
+
+ Example: "jesse.coretta@icloud.com"
+
+2.3.42. 'currentAuthorityFax'
+
+ The 'currentAuthorityFax' attribute type allows for the assignment
+ of a facsimile telephone number to a current authority entry.
+
+
+Coretta Expires August 27, 2024 [Page 23]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'facsimileTelephoneNumber', as defined in Section
+ 2.10 of [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production can be found within Section 3.3.11 of
+ [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.42
+ NAME 'currentAuthorityFax'
+ DESC 'Facsimile telephone number for a current authority'
+ SUP facsimileTelephoneNumber
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.43. 'currentAuthorityLocality'
+
+ The 'currentAuthorityLocality' attribute type allows for a locality
+ name to be assigned to a current authority entry.
+
+ The attribute type 'l', as defined in Section 2.16 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.43
+ NAME 'currentAuthorityLocality'
+ DESC 'Locality name for a current authority'
+ SUP l
+ SINGLE-VALUE )
+
+ Example: "Palm Springs", "Anna Maria Island"
+
+2.3.44. 'currentAuthorityMobile'
+
+ The 'currentAuthorityMobile' attribute type allows for the assignment
+ of a mobile telephone number to a current authority entry.
+
+ The attribute type 'mobile', as defined in Section 2.18 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'PrintableString'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.44
+ NAME 'currentAuthorityMobile'
+ DESC 'Mobile telephone number for a current authority'
+ SUP mobile
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+
+
+Coretta Expires August 27, 2024 [Page 24]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.45. 'currentAuthorityOrg'
+
+ The 'currentAuthorityOrg' attribute type allows for the assignment of
+ an organization name to a current authority entry.
+
+ The attribute type 'o', as defined in Section 2.19 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.45
+ NAME 'currentAuthorityOrg'
+ DESC 'Organization name for a current authority'
+ SUP o
+ SINGLE-VALUE )
+
+ Example: "Acme, Co."
+
+2.3.46. 'currentAuthorityPOBox'
+
+ The 'currentAuthorityPOBox' attribute type allows for the assignment
+ of a post office box number to a current authority entry.
+
+ The attribute type 'postOfficeBox', as defined in Section 2.25 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.46
+ NAME 'currentAuthorityPOBox'
+ DESC 'Post office box number for a current authority'
+ SUP postOfficeBox
+ SINGLE-VALUE )
+
+ Examples: "555", "475"
+
+2.3.47. 'currentAuthorityPostalAddress'
+
+ The 'currentAuthorityPostalAddress' attribute type allows for the
+ assignment of a complete postal address to a current authority entry.
+ This single attribute may be used instead of other individual address
+ component attribute types, but will require field parsing on part of
+ the client.
+
+ The attribute type 'postalAddress', as defined in Section 2.23 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.28 in [RFC4517].
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 25]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.47
+ NAME 'currentAuthorityPostalAddress'
+ DESC 'Full postal address for a current authority'
+ SUP postalAddress
+ SINGLE-VALUE )
+
+ Example: "1 Fake St$Anytown$CA$12345$US"
+
+2.3.48. 'currentAuthorityPostalCode'
+
+ The 'currentAuthorityPostalCode' attribute type allows for a postal
+ code to be assigned to a current authority entry.
+
+ The attribute type 'postalCode', as defined in Section 2.23 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.48
+ NAME 'currentAuthorityPostalCode'
+ DESC 'Postal code for a current authority'
+ SUP postalCode
+ SINGLE-VALUE )
+
+ Examples: "92262", "34216"
+
+2.3.49. 'currentAuthorityState'
+
+ The 'currentAuthorityState' attribute type allows for a state or
+ province name to be assigned to a current authority entry.
+
+ The attribute type 'st', as defined in Section 2.33 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.49
+ NAME 'currentAuthorityState'
+ DESC 'State or province name for a current authority'
+ SUP st
+ SINGLE-VALUE )
+
+ Examples: "California", "North Dakota"
+
+2.3.50. 'currentAuthorityStreet'
+
+ The 'currentAuthorityStreet' attribute type allows for the assignment
+ of a street name and number to a current authority entry.
+
+ The attribute type 'street', as defined in Section 2.34 of [RFC4519],
+ is a super type of this attribute type.
+
+
+Coretta Expires August 27, 2024 [Page 26]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.50
+ NAME 'currentAuthorityStreet'
+ DESC 'Street name and number for a current authority'
+ SUP street
+ SINGLE-VALUE )
+
+ Example: "1 Fake Street"
+
+2.3.51. 'currentAuthorityTelephone'
+
+ The 'currentAuthorityTelephone' attribute type allows for a telephone
+ number to be assigned to a current authority entry.
+
+ The attribute type 'telephoneNumber', as defined in Section 2.35 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'PrintableString'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.51
+ NAME 'currentAuthorityTelephone'
+ DESC 'Telephone number assigned to a current authority'
+ SUP telephoneNumber
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.52. 'currentAuthorityTitle'
+
+ The 'currentAuthorityTitle' attribute type allows for the assignment
+ of an official or professional title to a current authority entry.
+
+ The attribute type 'title', as defined in Section 2.38 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.52
+ NAME 'currentAuthorityTitle'
+ DESC 'Title assigned to a current authority'
+ SUP title
+ SINGLE-VALUE )
+
+ Example: "Chief Engineer"
+
+2.3.53. 'currentAuthorityURI'
+
+ The 'currentAuthorityURI' attribute type allows for the assignment of
+ one (1) or more URI values to a current authority entry.
+
+
+Coretta Expires August 27, 2024 [Page 27]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'labeledURI', as defined in [RFC2079], is a super
+ type of this attribute type.
+
+ A practical ABNF production for this attribute type is defined within
+ Appendix A of [RFC3986].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.53
+ NAME 'currentAuthorityURI'
+ DESC 'Uniform Resource Identifier for a current authority'
+ SUP labeledURI )
+
+ Example: "http://example.com Example", "http://example.com"
+
+2.3.54. 'firstAuthority'
+
+ The 'firstAuthority' attribute type allows for the assignment of one
+ (1) or more DN values to a registration entry.
+
+ The value(s) of this attribute type are meant to refer to distinct
+ entries that contain previous authority information.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.54
+ NAME 'firstAuthority'
+ DESC 'DN of a previous authority'
+ SUP distinguishedName )
+
+ Example: "registrantID=XYZ,ou=Registrants,o=rA"
+
+2.3.55. 'c-firstAuthority'
+
+ The 'c-firstAuthority' attribute type is the manifestation of the
+ 'firstAuthority' attribute type, defined in Section 2.3.54 with
+ Collective Attribute [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MAY be present for entries that also bear
+ a 'firstAuthority' attribute type instance.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 28]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.55
+ NAME 'c-firstAuthority'
+ DESC 'Collective DN of a previous authority'
+ SUP distinguishedName
+ COLLECTIVE )
+
+ Example: "registrantID=XYZ,ou=Registrants,o=rA"
+
+2.3.56. 'firstAuthorityStartTimestamp'
+
+ The 'firstAuthorityStartTimestamp' attribute type allows for the
+ assignment of a generalized timestamp value to a previous authority,
+ indicative of the date and time at which the previous authority was
+ officiated.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.56
+ NAME 'firstAuthorityStartTimestamp'
+ DESC 'Previous registration authority commencement timestamp'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
+ SINGLE-VALUE )
+
+ Example: "20130105135904Z"
+
+2.3.57. 'firstAuthorityEndTimestamp'
+
+ The 'firstAuthorityEndTimestamp' attribute type allows the assignment
+ of a generalized timestamp value to a previous authority, indicative
+ of the date and time at which an entity's authoritative role was, or
+ will be, terminated.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.57
+ NAME 'firstAuthorityEndTimestamp'
+ DESC 'Previous registration authority termination timestamp'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
+ SINGLE-VALUE )
+
+ Example: "20170528110555Z"
+
+2.3.58. 'firstAuthorityCommonName'
+
+ The 'firstAuthorityCommonName' attribute type allows for a common
+ name to be assigned to a previous registration authority entry.
+
+Coretta Expires August 27, 2024 [Page 29]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'cn', as defined in Section 2.3 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.58
+ NAME 'firstAuthorityCommonName'
+ DESC 'Common Name for a previous authority'
+ SUP cn
+ SINGLE-VALUE )
+
+ Examples: "Jesse Coretta", "Jane Smith"
+
+2.3.59. 'firstAuthorityCountryCode'
+
+ The 'firstAuthorityCountryCode' attribute type allows for a country
+ code to be assigned to a previous registration authority entry.
+
+ The attribute type 'c', as defined in Section 2.2 of [RFC4519], is a
+ super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.4 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.59
+ NAME 'firstAuthorityCountryCode'
+ DESC 'Country Code for a previous authority'
+ SUP c
+ SINGLE-VALUE )
+
+ Examples: "US", "CA"
+
+2.3.60. 'firstAuthorityCountryName'
+
+ The 'firstAuthorityCountryName' attribute type allows for a country
+ name to be assigned to a previous registration authority entry.
+
+ The attribute type 'co', as defined in Section 2.4 of [RFC4519], is a
+ super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.60
+ NAME 'firstAuthorityCountryName'
+ DESC 'Country name for a previous authority'
+ SUP co
+ SINGLE-VALUE )
+
+ Examples: "United States", "Canada"
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 30]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.61. 'firstAuthorityEmail'
+
+ The 'firstAuthorityEmail' attribute type allows for the assignment
+ of an email address to a previous registration authority entry.
+
+ The attribute type 'mail', as defined in Section 2.16 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'IA5String'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.61
+ NAME 'firstAuthorityEmail'
+ DESC 'Email address for a previous authority'
+ SUP mail
+ SINGLE-VALUE )
+
+ Example: "jesse.coretta@icloud.com"
+
+2.3.62. 'firstAuthorityFax'
+
+ The 'firstAuthorityFax' attribute type allows for the assignment of a
+ facsimile telephone number to a previous authority entry.
+
+ The attribute type 'facsimileTelephoneNumber', as defined in Section
+ 2.10 of [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production can be found within Section 3.3.11 of
+ [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.62
+ NAME 'firstAuthorityFax'
+ DESC 'Facsimile telephone number for a previous authority'
+ SUP facsimileTelephoneNumber
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.63. 'firstAuthorityLocality'
+
+ The 'firstAuthorityLocality' attribute type allows the assignment of
+ a locality name to a previous authority entry.
+
+ The attribute type 'l', as defined in Section 2.16 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 31]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.63
+ NAME 'firstAuthorityLocality'
+ DESC 'Locality name for a previous authority'
+ SUP l
+ SINGLE-VALUE )
+
+ Examples: "Palm Springs", "Anna Maria Island"
+
+2.3.64. 'firstAuthorityMobile'
+
+ The 'firstAuthorityMobile' attribute type allows for the assignment
+ of a mobile telephone number to a previous authority entry.
+
+ The attribute type 'mobile', as defined in Section 2.18 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'PrintableString'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.64
+ NAME 'firstAuthorityMobile'
+ DESC 'Mobile telephone number for a previous authority'
+ SUP mobile
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.65. 'firstAuthorityOrg'
+
+ The 'firstAuthorityOrg' attribute type allows for the assignment
+ of an organization name to a previous authority entry.
+
+ The attribute type 'o', as defined in Section 2.19 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.65
+ NAME 'firstAuthorityOrg'
+ DESC 'Organization name for a previous authority'
+ SUP o
+ SINGLE-VALUE )
+
+ Example: "Acme, Co."
+
+2.3.66. 'firstAuthorityPOBox'
+
+ The 'firstAuthorityPOBox' attribute type allows for the assignment
+ of a post office box number to a previous registration authority
+ entry.
+
+
+
+Coretta Expires August 27, 2024 [Page 32]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'postOfficeBox', as defined in Section 2.25 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.66
+ NAME 'firstAuthorityPOBox'
+ DESC 'Post office box number for a previous authority'
+ SUP postOfficeBox
+ SINGLE-VALUE )
+
+ Examples: "555", "475"
+
+2.3.67. 'firstAuthorityPostalAddress'
+
+ The 'firstAuthorityPostalAddress' attribute type allows for the
+ assignment of a complete postal address to a previous registration
+ authority entry. This single attribute may be used instead of other
+ individual address component attribute types, but will require field
+ parsing on the client side.
+
+ The attribute type 'postalAddress', as defined in Section 2.23 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.28 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.67
+ NAME 'firstAuthorityPostalAddress'
+ DESC 'Full postal address for a previous authority'
+ SUP postalAddress
+ SINGLE-VALUE )
+
+ Example: "1 Fake St$Anytown$CA$12345$US"
+
+2.3.68. 'firstAuthorityPostalCode'
+
+ The 'firstAuthorityPostalCode' attribute type allows for the
+ assignment of a postal code to a previous registration authority
+ entry.
+
+ The attribute type 'postalCode', as defined in Section 2.23 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.68
+ NAME 'firstAuthorityPostalCode'
+ DESC 'Postal code for a previous authority'
+ SUP postalCode
+ SINGLE-VALUE )
+
+ Examples: "92262", "34216"
+
+Coretta Expires August 27, 2024 [Page 33]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.69. 'firstAuthorityState'
+
+ The 'firstAuthorityState' attribute type allows for the assignment
+ of a state or province name to a previous registration authority
+ entry.
+
+ The attribute type 'st', as defined in Section 2.33 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.69
+ NAME 'firstAuthorityState'
+ DESC 'State or province name for a previous authority'
+ SUP st
+ SINGLE-VALUE )
+
+ Examples: "California", "North Dakota"
+
+2.3.70. 'firstAuthorityStreet'
+
+ The 'firstAuthorityStreet' attribute type allows for the assignment
+ of a street name and number to a previous authority entry.
+
+ The attribute type 'street', as defined in Section 2.34 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.70
+ NAME 'firstAuthorityStreet'
+ DESC 'Street name and number for a previous authority'
+ SUP street
+ SINGLE-VALUE )
+
+ Example: "1 Fake Street"
+
+2.3.71. 'firstAuthorityTelephone'
+
+ The 'firstAuthorityTelephone' attribute type allows the assignment of
+ a telephone number to a previous authority entry.
+
+ The attribute type 'telephoneNumber', as defined in Section 2.35 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'PrintableString'.
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 34]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.71
+ NAME 'firstAuthorityTelephone'
+ DESC 'Telephone number for a previous authority'
+ SUP telephoneNumber
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.72. 'firstAuthorityTitle'
+
+
+ The 'firstAuthorityTitle' attribute type allows for the assignment
+ of an official or professional title to a previous authority entry.
+
+ The attribute type 'title', as defined in Section 2.38 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.72
+ NAME 'firstAuthorityTitle'
+ DESC 'Title of a previous authority'
+ SUP title
+ SINGLE-VALUE )
+
+ Example: "Chief Engineer"
+
+2.3.73. 'firstAuthorityURI'
+
+ The 'firstAuthorityURI' attribute type allows the assignment of one
+ (1) or more URI values to a previous authority entry.
+
+ The attribute type 'labeledURI', as defined in [RFC2079], is a super
+ type of this attribute type.
+
+ A practical ABNF production for this attribute type is defined within
+ Appendix A of [RFC3986].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.73
+ NAME 'firstAuthorityURI'
+ DESC 'Uniform Resource Identifier for a previous authority'
+ SUP labeledURI )
+
+ Examples: "http://example.com Example", "http://example.com"
+
+2.3.74. 'sponsor'
+
+ The 'sponsor' attribute type allows for the assignment of one (1)
+ or more DN values to a registration.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+Coretta Expires August 27, 2024 [Page 35]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'distinguishedName', as defined in Section 2.7 of
+ [RFC4519], is a super type of this attribute type.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.74
+ NAME 'sponsor'
+ DESC 'DN of a sponsoring authority'
+ SUP distinguishedName )
+
+ Example: "registrantID=XYZ,ou=Registrants,o=rA"
+
+2.3.75. 'c-sponsor'
+
+ The 'c-sponsor' attribute type is the manifestation of the 'sponsor'
+ attribute type, defined in Section 2.3.74 with Collective Attribute
+ [RFC3671] support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ This attribute type MAY be present for entries that also bear
+ a 'sponsor' attribute type instance.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.75
+ NAME 'c-sponsor'
+ DESC 'Collective DN of a sponsoring authority'
+ SUP distinguishedName
+ COLLECTIVE )
+
+ Example: "registrantID=XYZ,ou=Registrants,o=rA"
+
+2.3.76. 'sponsorStartTimestamp'
+
+ The 'sponsorStartTimestamp' attribute type allows for the assignment
+ of a generalized timestamp value to a sponsor entry, indicative of
+ the date and time at which sponsorship was, or will be, officiated.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.76
+ NAME 'sponsorStartTimestamp'
+ DESC 'Sponsoring authority commencement timestamp'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
+ SINGLE-VALUE )
+
+ Example: "20130105135904Z"
+
+
+Coretta Expires August 27, 2024 [Page 36]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.77. 'sponsorEndTimestamp'
+
+ The 'sponsorEndTimestamp' attribute type allows for the assignment
+ of a generalized timestamp value to a sponsor entry, indicative the
+ date and time at which sponsorship was, or will be, terminated.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3.3.13 of [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.77
+ NAME 'sponsorEndTimestamp'
+ DESC 'Sponsoring authority termination timestamp'
+ EQUALITY generalizedTimeMatch
+ ORDERING generalizedTimeOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
+ SINGLE-VALUE )
+
+ Example: "20170528110555Z"
+
+2.3.78. 'sponsorCommonName'
+
+ The 'sponsorCommonName' attribute type allows for the assignment
+ of a common name to a sponsor.
+
+ The attribute type 'cn', as defined in Section 2.3 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.78
+ NAME 'sponsorCommonName'
+ DESC 'Common Name of a sponsor'
+ SUP cn
+ SINGLE-VALUE )
+
+ Example: "Jane Sponsor"
+
+2.3.79. 'sponsorCountryCode'
+
+ The 'sponsorCountryCode' attribute type allows for the assignment of
+ a two-letter country code to a sponsor.
+
+ The attribute type 'c', as defined in Section 2.2 of [RFC4519], is a
+ super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.4 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.79
+ NAME 'sponsorCountryCode'
+ DESC 'Country code for a sponsor'
+ SUP c
+ SINGLE-VALUE )
+
+Coretta Expires August 27, 2024 [Page 37]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ Examples: "US", "CA"
+
+2.3.80. 'sponsorCountryName'
+
+ The 'sponsorCountryName' attribute type allows the assignment of a
+ country name to a sponsor.
+
+ The attribute type 'co', as defined in Section 2.4 of [RFC4524], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.80
+ NAME 'sponsorCountryName'
+ DESC 'Country name for a sponsor'
+ SUP co
+ SINGLE-VALUE )
+
+ Examples: "United States", "Canada"
+
+2.3.81. 'sponsorEmail'
+
+ The 'sponsorEmail' attribute type allows for the assignment of an
+ email address to a sponsor.
+
+ The attribute type 'mail', as defined in Section 2.16 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'IA5String'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.81
+ NAME 'sponsorEmail'
+ DESC 'Email address for a sponsor'
+ SUP mail
+ SINGLE-VALUE )
+
+ Example: "sponsor@example.com"
+
+2.3.82. 'sponsorFax'
+
+ The 'sponsorFax' attribute type allows for the assignment of a
+ facsimile telephone number to a sponsor.
+
+ The attribute type 'facsimileTelephoneNumber', as defined in Section
+ 2.10 of [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production can be found within Section 3.3.11 of
+ [RFC4517].
+
+
+
+
+Coretta Expires August 27, 2024 [Page 38]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.82
+ NAME 'sponsorFax'
+ DESC 'Facsimile telephone number for a sponsor'
+ SUP facsimileTelephoneNumber
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.83. 'sponsorLocality'
+
+ The 'sponsorLocality' attribute type allows for the assignment of
+ a locality name to a sponsor.
+
+ The attribute type 'l', as defined in Section 2.16 of [RFC4519], is
+ a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.83
+ NAME 'sponsorLocality'
+ DESC 'Locality name for a sponsor'
+ SUP l
+ SINGLE-VALUE )
+
+ Examples: "Palm Springs", "Anna Maria Island"
+
+2.3.84. 'sponsorMobile'
+
+ The 'sponsorMobile' attribute type allows for the assignment of a
+ mobile telephone number to a sponsor.
+
+ The attribute type 'mobile', as defined in Section 2.18 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'PrintableString'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.84
+ NAME 'sponsorMobile'
+ DESC 'Mobile telephone number for a sponsor'
+ SUP mobile
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.85. 'sponsorOrg'
+
+ The 'sponsorOrg' attribute type allows for the assignment of an
+ organization name to a sponsor.
+
+ The attribute type 'o', as defined in Section 2.19 of [RFC4519],
+ is a super type of this attribute type.
+
+Coretta Expires August 27, 2024 [Page 39]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.85
+ NAME 'sponsorOrg'
+ DESC 'Organization name for a sponsor'
+ SUP o
+ SINGLE-VALUE )
+
+ Example: "Sponsor, Co."
+
+2.3.86. 'sponsorPOBox'
+
+ The 'sponsorPOBox' attribute type allows for the assignment of a
+ post office box number to a sponsor.
+
+ The attribute type 'postOfficeBox', as defined in Section 2.25 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.86
+ NAME 'sponsorPOBox'
+ DESC 'Post office box number for a sponsor'
+ SUP postOfficeBox
+ SINGLE-VALUE )
+
+ Examples: "555", "475"
+
+2.3.87. 'sponsorPostalAddress'
+
+ The 'sponsorPostalAddress' attribute type allows for the assignment
+ of a complete postal address sponsor. This single attribute may be
+ used instead of other individual address component attribute types,
+ but will require field parsing on the client side.
+
+ The attribute type 'postalAddress', as defined in Section 2.23 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.28 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.87
+ NAME 'sponsorPostalAddress'
+ DESC 'Full postal address for a sponsor'
+ SUP postalAddress
+ SINGLE-VALUE )
+
+ Example: "1 Fake St$Anytown$CA$12345$US"
+
+2.3.88. 'sponsorPostalCode'
+
+ The 'sponsorPostalCode' attribute type allows for a postal code
+ to be assigned to a sponsor.
+
+Coretta Expires August 27, 2024 [Page 40]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The attribute type 'postalCode', as defined in Section 2.23 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.88
+ NAME 'sponsorPostalCode'
+ DESC 'Postal code for a sponsor'
+ SUP postalCode
+ SINGLE-VALUE )
+
+ Example: "92262", "34216"
+
+2.3.89. 'sponsorState'
+
+ The 'sponsorState' attribute type allows for the assignment of a
+ state or province name to a sponsor.
+
+ The attribute type 'st', as defined in Section 2.33 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.89
+ NAME 'sponsorState'
+ DESC 'State or province name for a sponsor'
+ SUP st
+ SINGLE-VALUE )
+
+ Examples: "California", "North Dakota"
+
+2.3.90. 'sponsorStreet'
+
+ The 'sponsorStreet' attribute type allows for the assignment of a
+ street name and number to a sponsor.
+
+ The attribute type 'street', as defined in Section 2.34 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.90
+ NAME 'sponsorStreet'
+ DESC 'Street name and number for a sponsor'
+ SUP street
+ SINGLE-VALUE )
+
+ Example: "1 Fake Street"
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 41]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.91. 'sponsorTelephone'
+
+ The 'sponsorTelephone' attribute type allows for the assignment of
+ a telephone number to a sponsor.
+
+ The attribute type 'telephoneNumber', as defined in Section 2.35 of
+ [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'PrintableString'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.91
+ NAME 'sponsorTelephone'
+ DESC 'Telephone number for a sponsor'
+ SUP telephoneNumber
+ SINGLE-VALUE )
+
+ Example: "+11234567890"
+
+2.3.92. 'sponsorTitle'
+
+ The 'sponsorTitle' attribute type allows for the assignment of an
+ official or professional title to a sponsor.
+
+ The attribute type 'title', as defined in Section 2.38 of [RFC4519],
+ is a super type of this attribute type.
+
+ A practical ABNF production is found in Section 3.3.6 in [RFC4517].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.92
+ NAME 'sponsorTitle'
+ DESC 'Title of a sponsor'
+ SUP title
+ SINGLE-VALUE )
+
+ Example: "Executive Sponsor"
+
+2.3.93. 'sponsorURI'
+
+ The 'sponsorURI' attribute type allows for the assignment of one (1)
+ or more URI values, each with an optional label, to a sponsor.
+
+ The attribute type 'labeledURI', as defined in [RFC2079], is a super
+ type of this attribute type.
+
+ A practical ABNF production for this attribute type is defined within
+ Appendix A of [RFC3986].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.93
+ NAME 'sponsorURI'
+ DESC 'Uniform Resource Identifier for a sponsor'
+ SUP labeledURI )
+
+Coretta Expires August 27, 2024 [Page 42]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ Examples: "http://example.com Example", "http://example.com"
+
+2.3.94. 'rADITProfile'
+
+ The 'rADITProfile' attribute type references entries which contain
+ optimal 'rADUAConfig' configuration settings for client consumption.
+
+ The attribute type 'distinguishedName', as defined in Section 2.7
+ of [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.94
+ NAME 'rADITProfile'
+ DESC 'Advertised RA DIT profile DNs served by an RA DSA'
+ SUP distinguishedName )
+
+ Examples: "n=1,dc=example,dc=com" "n=1,n=4,n=1,n=6,n=3,n=1"
+
+2.3.95. 'rARegistrationBase'
+
+ The 'rARegistrationBase' attribute type allows for the storage of one
+ (1) or more DNs that refer to entries under which 'registration'
+ entries reside.
+
+ The attribute type 'distinguishedName', as defined in Section 2.7
+ of [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.95
+ NAME 'rARegistrationBase'
+ DESC 'DN of a registration base within an RA DIT'
+ SUP distinguishedName )
+
+ Example: "ou=Registrations,o=rA"
+
+2.3.96. 'rARegistrantBase'
+
+ The 'rARegistrantBase' attribute type allows for the storage of one
+ (1) or more LDAP DNs that refer to entries under which 'registrant'
+ entries reside.
+
+ The attribute type 'distinguishedName', as defined in Section 2.7
+ of [RFC4519], is a super type of this attribute type.
+
+ A practical ABNF production for this attribute type can be found in
+ Section 3 of [RFC4514].
+
+
+
+Coretta Expires August 27, 2024 [Page 43]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.3.96
+ NAME 'rARegistrantBase'
+ DESC 'DN of a registrant base within an RA DIT'
+ SUP distinguishedName )
+
+ Example: "ou=Registrants,o=rA"
+
+2.3.97. 'rADirectoryModel'
+
+ The 'rADirectoryModel' attribute type allows for the storage of a
+ numerical OID meant to declare the structural design of the RA DIT.
+
+ A practical ABNF production, labeled 'numericoid', is defined within
+ Section 1.4 of [RFC4512].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.97
+ NAME 'rADirectoryModel'
+ DESC 'Governing directory model OID'
+ EQUALITY objectIdentifierMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
+ SINGLE-VALUE )
+
+ Example: "1.3.6.1.4.1.56521.101.3.3"
+
+2.3.98. 'rAServiceMail'
+
+ The 'rAServiceMail' attribute type allows for the assignment of an
+ email address to an 'rADUAConfig' entry for the purpose of support
+ or error reporting.
+
+ The attribute type 'mail', as defined in Section 2.16 of [RFC4524],
+ is a super type of this attribute type.
+
+ A practical ABNF production can be found in Section 3.2 of [RFC4517],
+ labeled 'IA5String'.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.98
+ NAME 'rAServiceMail'
+ DESC 'Registration Authority contact email address'
+ SUP mail )
+
+ Example: "ra@example.com"
+
+2.3.99. 'rAServiceURI'
+
+ The 'rAServiceURI' attribute type allows for the assignment of one
+ (1) or more URI values to an 'rADUAConfig' entry for the purpose of
+ directing users to an appropriate RA endpoint for request handling.
+
+ The attribute type 'labeledURI', as defined in [RFC2079], is a super
+ type of this attribute type.
+
+
+Coretta Expires August 27, 2024 [Page 44]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ A practical ABNF production for this attribute type is defined within
+ Appendix A of [RFC3986].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.99
+ NAME 'rAServiceURI'
+ DESC 'Registration Authority URI'
+ SUP labeledURI )
+
+ Example: "http://example.com/ra.html Registrations"
+
+2.3.100. 'rATTL'
+
+ The 'rATTL' attribute type allows for the specification of a TTL
+ value, expressed in seconds.
+
+ A practical ABNF production, labeled 'number', can be found within
+ Section 1.4 of [RFC4512].
+
+ See the RADUA ID for details relating to client-driven entry
+ caching and practical value implementation.
+
+ ( 1.3.6.1.4.1.56521.101.2.3.100
+ NAME 'rATTL'
+ DESC 'RA entry Time to Live, expressed in seconds'
+ EQUALITY integerMatch
+ ORDERING integerOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
+ SINGLE-VALUE )
+
+ Examples: "0", "3600", "-1", "86400"
+
+2.3.101. 'c-rATTL'
+
+ The 'c-rATTL' attribute type is the manifestation of the 'rATTL'
+ type, defined in Section 2.3.99 with Collective Attribute support.
+
+ This attribute type should only be used in directory environments
+ which actively support and require [RFC3671] capabilities.
+
+ See the RADUA ID for details relating to client-driven entry
+ caching and practical value implementation.
+
+ A practical ABNF production, labeled 'number', can be found within
+ Section 1.4 of [RFC4512].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.101
+ NAME 'c-rATTL'
+ DESC 'Collective RA entry Time to Live, expressed in seconds'
+ EQUALITY integerMatch
+ ORDERING integerOrderingMatch
+ SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
+ COLLECTIVE )
+
+Coretta Expires August 27, 2024 [Page 45]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.3.102. 'registeredUUID'
+
+ The 'registeredUUID' attribute type assigns a hexadecimal UUID value
+ to a registration.
+
+ A practical ABNF production for this attribute type is defined within
+ Section 3 of [RFC4122].
+
+ ( 1.3.6.1.4.1.56521.101.2.3.102
+ NAME 'registeredUUID'
+ DESC 'X.667 registered UUID'
+ EQUALITY UUIDMatch
+ ORDERING UUIDOrderingMatch
+ SYNTAX 1.3.6.1.1.16.1
+ SINGLE-VALUE )
+
+ Example: "e6bcf22c-00bf-4b3d-b11f-36ec0522aa93"
+
+2.4. Matching Rule Uses
+
+ No LDAP Matching Rule Uses definitions are defined anywhere in this
+ ID series.
+
+2.5. Object Classes
+
+ The following subsections describe sixteen (16) LDAP object classes
+ defined within this ID.
+
+2.5.1. 'registration'
+
+ The 'registration' ABSTRACT class, which is a sub type of 'top', per
+ Section 2.4.1 of [RFC4512], serves as the foundation for ALL entries
+ intended to represent OID registrations within the spirit of this ID.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.1
+ NAME 'registration'
+ DESC 'Abstract OID arc class'
+ SUP top ABSTRACT
+ MUST n
+ MAY ( description $ seeAlso $ rATTL ) )
+
+2.5.2. 'rootArc'
+
+ The 'rootArc' STRUCTURAL class is meant to define a maximum of three
+ (3) root registrations for an RA DIT, per ITU-T Rec. [X.660].
+
+ Entries that bear this class SHALL ONLY represent the following root
+ registrations:
+
+ - ITU-T ({itu-t(0)})
+ - ISO ({iso(1)})
+ - Joint-ISO-ITU-T ({joint-iso-itu-t(2)})
+
+Coretta Expires August 27, 2024 [Page 46]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.5.2
+ NAME 'rootArc'
+ DESC 'X.660, cl. A.2: root arc class'
+ SUP registration STRUCTURAL )
+
+2.5.3. 'arc'
+
+ The 'arc' STRUCTURAL object class extends a collection of attribute
+ types for use when allocating subordinate registrations in an RA DIT.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.3
+ NAME 'arc'
+ DESC 'X.660, cl. A.3-A.5: subordinate arc class'
+ SUP registration STRUCTURAL )
+
+2.5.4. 'x660Context'
+
+ The 'x660Context' AUXILIARY class extends a collection of attribute
+ types derived from Rec. ITU-T [X.660].
+
+ ( 1.3.6.1.4.1.56521.101.2.5.4
+ NAME 'x660Context'
+ DESC 'X.660 contextual class'
+ SUP registration AUXILIARY
+ MAY ( additionalUnicodeValue $
+ currentAuthority $
+ firstAuthority $
+ secondaryIdentifier $
+ sponsor $
+ standardizedNameForm $
+ unicodeValue ) )
+
+2.5.5. 'x667Context'
+
+ The 'x667Context' AUXILIARY class extends a single attribute type,
+ 'registeredUUID' as defined in Section 2.3.101, for use within the
+ context of an ITU-T Rec. [X.667] (UUID) registration.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.5
+ NAME 'x667Context'
+ DESC 'X.667 contextual class'
+ SUP registration AUXILIARY
+ MUST registeredUUID )
+
+2.5.6. 'x680Context'
+
+ The 'x680Context' AUXILIARY class extends a collection of attribute
+ types derived from ITU-T Rec. [X.680].
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 47]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.5.6
+ NAME 'x680Context'
+ DESC 'X.680 contextual class'
+ SUP registration AUXILIARY
+ MAY ( aSN1Notation $
+ dotNotation $
+ identifier $
+ iRI $
+ nameAndNumberForm ) )
+
+2.5.7. 'iTUTRegistration'
+
+ The 'iTUTRegistration' AUXILIARY class labels the registration as
+ belonging to the International Telecommunications Union (ITU-T) in
+ subordinate form.
+
+ It is NOT RECOMMENDED to assign this class to any entry which bears
+ the 'rootArc' STRUCTURAL object class, per in Section 2.5.1. This
+ class SHALL NOT appear on entries bearing the 'iSORegistration' (per
+ Section 2.5.8) or 'jointISOITUTRegistration' (per Section 2.5.9)
+ class.
+
+ The 'x660Context' (Section 2.5.4) and 'x680Context' (Section 2.5.6)
+ are super classes of this class.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.7
+ NAME 'iTUTRegistration'
+ DESC 'X.660, cl. A.2: ITU-T'
+ SUP ( x660Context $
+ x680Context )
+ AUXILIARY )
+
+2.5.8. 'iSORegistration'
+
+ The 'iSORegistration' AUXILIARY class labels the OID registration as
+ belonging to the International Organization for Standardization (ISO)
+ in subordinate form.
+
+ It is NOT RECOMMENDED to assign this class to any entry which bears
+ the 'rootArc' STRUCTURAL object class, per Section 2.5.1. This class
+ SHALL NOT appear on entries bearing the 'iTUTRegistration' (defined
+ in Section 2.5.7) or 'jointISOITUTRegistration' (per Section 2.5.9)
+ class.
+
+ The 'x660Context' (Section 2.5.4) and 'x680Context' (Section 2.5.6)
+ are super classes of this class.
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 48]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.5.8
+ NAME 'iSORegistration'
+ DESC 'X.660, cl. A.2: ISO'
+ SUP ( x660Context $
+ x680Context )
+ AUXILIARY )
+
+2.5.9. 'jointISOITUTRegistration'
+
+ The 'jointISOITUTRegistration' AUXILIARY class labels a registration
+ as being jointly administered by the International Organization for
+ Standardization (ISO) and the International Telecommunications Union
+ (ITU-T) in cooperative fashion.
+
+ It is NOT RECOMMENDED to assign this class to any entry which bears
+ the 'rootArc' STRUCTURAL object class, per Section 2.5.1. This class
+ SHALL NOT appear on entries bearing the 'iTUTRegistration' (defined
+ in Section 2.5.7) or 'iSORegistration' (per Section 2.5.8) class.
+
+ This class extends use of the 'longArc' attribute type, as defined in
+ Section 2.3.20.
+
+ The 'x660Context' (Section 2.5.4) and 'x680Context' (Section 2.5.6)
+ are super classes of this class.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.9
+ NAME 'jointISOITUTRegistration'
+ DESC 'X.660, cl. A.2: Joint ISO/ITU-T Administration'
+ SUP ( x660Context $
+ x680Context )
+ AUXILIARY
+ MAY longArc )
+
+2.5.10. 'spatialContext'
+
+ The 'spatialContext' AUXILIARY class extends vertical and horizontal
+ associative attribute types intended to describe the logical position
+ of a registration in relation to adjacent registrations.
+
+ Use of this class is entirely OPTIONAL, but can greatly aid in the
+ creation of navigational interfaces which allow both horizontal and
+ vertical movement across entire ancestries.
+
+ See the RADIT ID for further details on this topic.
+
+
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 49]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ ( 1.3.6.1.4.1.56521.101.2.5.10
+ NAME 'spatialContext'
+ DESC 'Logical spatial orientation and association class'
+ SUP registration AUXILIARY
+ MAY ( topArc $ supArc $ subArc $
+ minArc $ maxArc $
+ leftArc $ rightArc ) )
+
+2.5.11. 'registrationSupplement'
+
+ The 'registrationSupplement' AUXILIARY class extends a variety of
+ miscellaneous and non-standard attribute types for OPTIONAL.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.11
+ NAME 'registrationSupplement'
+ DESC 'Supplemental registration class'
+ SUP registration AUXILIARY
+ MAY ( discloseTo $ isFrozen $ isLeafNode $
+ registrationClassification $
+ registrationCreated $
+ registrationInformation $
+ registrationModified $
+ registrationRange $
+ registrationStatus $
+ registrationURI ) )
+
+2.5.12. 'firstAuthorityContext'
+
+ The 'firstAuthorityContext' AUXILIARY class extends attribute types
+ intended to store previous authority information.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.12
+ NAME 'firstAuthorityContext'
+ DESC 'Initial registration authority class'
+ SUP top AUXILIARY
+ MAY ( firstAuthorityCommonName $
+ firstAuthorityCountryCode $
+ firstAuthorityCountryName $
+ firstAuthorityCountryName $
+ firstAuthorityEmail $
+ firstAuthorityEndTimestamp $
+ firstAuthorityFax $
+ firstAuthorityLocality $
+ firstAuthorityMobile $
+ firstAuthorityOrg $
+ firstAuthorityPostalCode $
+ firstAuthorityStartTimestamp $
+ firstAuthorityState $
+ firstAuthorityStreet $
+ firstAuthorityTelephone $
+ firstAuthorityTitle $
+ firstAuthorityURI ) )
+
+Coretta Expires August 27, 2024 [Page 50]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.5.13. 'currentAuthorityContext'
+
+ The 'currentAuthorityContext' AUXILIARY class extends attribute types
+ intended to store current authority information.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.13
+ NAME 'currentAuthorityContext'
+ DESC 'Current registration authority class'
+ SUP top AUXILIARY
+ MAY ( currentAuthorityCommonName $
+ currentAuthorityCountryCode $
+ currentAuthorityCountryName $
+ currentAuthorityCountryName $
+ currentAuthorityEmail $
+ currentAuthorityFax $
+ currentAuthorityLocality $
+ currentAuthorityMobile $
+ currentAuthorityOrg $
+ currentAuthorityPostalCode $
+ currentAuthorityStartTimestamp $
+ currentAuthorityState $
+ currentAuthorityStreet $
+ currentAuthorityTelephone $
+ currentAuthorityTitle $
+ currentAuthorityURI ) )
+
+2.5.14. 'sponsorContext'
+
+ The 'currentAuthorityContext' AUXILIARY class extends attribute types
+ intended to store sponsoring authority information.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.14
+ NAME 'sponsorContext'
+ DESC 'Registration sponsoring authority class'
+ SUP top AUXILIARY
+ MAY ( sponsorCommonName $
+ sponsorCountryCode $
+ sponsorCountryName $
+ sponsorCountryName $
+ sponsorEmail $
+ sponsorEndTimestamp $
+ sponsorFax $
+ sponsorLocality $
+ sponsorMobile $
+ sponsorOrg $
+ sponsorPostalCode $
+ sponsorStartTimestamp $
+ sponsorState $
+ sponsorStreet $
+ sponsorTelephone $
+ sponsorTitle $
+ sponsorURI ) )
+
+Coretta Expires August 27, 2024 [Page 51]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.5.15. 'registrant'
+
+ The 'registrant' object class allows for current, previous (first)
+ and/or sponsorship data to be stored within an entry.
+
+ This object class is STRUCTURAL, and cannot be combined with the
+ 'registration' object class within a single entry.
+
+ Use of the 'registrant' object class within an RA DIT implies use
+ of so-called dedicated authority entries, as described within the
+ RADIT ID.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.15
+ NAME 'registrant'
+ DESC 'Generalized auxiliary class for registrant data'
+ SUP top STRUCTURAL
+ MUST registrantID
+ MAY ( description $ seeAlso $ rATTL ) )
+
+2.5.16. 'rADUAConfig'
+
+ The 'rADUAConfig' object class allows for the storage of so-called
+ auto-discovered attribute types meant to guide the RA DUA in its
+ attempt to access registration and/or registrant information stored
+ within the RA DIT served by the RA DSA.
+
+ ( 1.3.6.1.4.1.56521.101.2.5.16
+ NAME 'rADUAConfig'
+ DESC 'RA DUA configuration advertisement class'
+ SUP top AUXILIARY
+ MAY ( description $
+ rADITProfile $
+ rADirectoryModel $
+ rARegistrationBase $
+ rARegistrantBase $
+ rAServiceMail $
+ rAServiceURI $
+ rATTL ) )
+
+2.6. DIT Content Rules
+
+ No DIT Content Rules are officially defined anywhere in this ID
+ series.
+
+ If the X.500/LDAP product(s) in question registers positive support
+ for these kinds of definitions, per Section 4.1.6 of [RFC4512], and
+ the reader desires the ability to control the contents of any and all
+ individual registration and/or registrant entries in a more granular
+ manner, they are advised to consider the composition and use of one
+ (1) or more custom rules of this design.
+
+
+
+Coretta Expires August 27, 2024 [Page 52]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+2.7. Name Forms
+
+ This section defines three (3) Name Forms for use in the composition
+ of any DIT Structure Rules required, if supported by the X.500/LDAP
+ product(s) in question. See Section 4.1.7.2 of [RFC4512] for
+ details.
+
+2.7.1. 'nRootArcForm'
+
+ The 'nRootArcForm' name form is devised to control the RDN of the
+ entries bearing the 'rootArc' STRUCTURAL object class. Within the
+ RECOMMENDED three dimensional model of this ID series, use the 'n'
+ (Number Form) attribute type is the preferred RDN component.
+
+ ( 1.3.6.1.4.1.56521.101.2.7.1
+ NAME 'nRootArcForm'
+ DESC 'root arc name form for a number form RDN'
+ OC rootArc
+ MUST n )
+
+2.7.2. 'nArcForm'
+
+ The 'nArcForm' name form is devised to control the RDN of the entries
+ bearing the 'arc' STRUCTURAL object class. Within the RECOMMENDED
+ three dimensional model of this ID series, the 'n' (Number Form)
+ attribute type is the preferred RDN component.
+
+ ( 1.3.6.1.4.1.56521.101.2.7.2
+ NAME 'nArcForm'
+ DESC 'arc name form for a number form RDN'
+ OC arc
+ MUST n )
+
+2.7.3. 'dotNotationArcForm'
+
+ The 'dotNotationArcForm' name form is devised to control the RDN
+ of the bearings bearing the 'arc' STRUCTURAL object class. Within
+ the STRONGLY DISCOURAGED two dimensional model of this ID series,
+ the 'dotNotation' (numeric OID) attribute type is the preferred RDN
+ component.
+
+ ( 1.3.6.1.4.1.56521.101.2.7.3
+ NAME 'dotNotationArcForm'
+ DESC 'arc name form for a numeric OID RDN'
+ OC arc
+ MUST dotNotation )
+
+2.8. DIT Structure Rules
+
+ No DIT structure rules are officially defined anywhere in this ID
+ series.
+
+
+Coretta Expires August 27, 2024 [Page 53]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ The name form definitions per Section 2.7 may be used in the creation
+ of custom DIT structure rules by the directory administrator(s) if
+ desired. See Section 4.1.7.1 of [RFC4512] for details.
+
+3. IANA Considerations
+
+ There are no requests to IANA in this document at this time.
+
+4. Security Considerations
+
+ There are no security considerations applicable to this ID.
+
+5. References
+
+5.1. Normative References
+
+ RADIR Coretta, J., "The OID Directory: A Technical Roadmap",
+ draft-coretta-oiddir-roadmap, February 2024.
+
+ RADIT Coretta, J., "The OID Directory: The RA DIT",
+ draft-coretta-oiddir-radit, February 2024.
+
+ RADSA Coretta, J., "The OID Directory: The RA DSA",
+ draft-coretta-oiddir-radsa, February 2024.
+
+ RADUA Coretta, J., "The OID Directory: The RA DUA",
+ draft-coretta-oiddir-radua, February 2024.
+
+ [RFC2079] Smith, M., "Definition of an X.500 attribute type and an
+ object class to Hold Uniform Resource Identifiers (URIs)",
+ RFC 2079, January 1997.
+
+ [RFC2578] Rose, M., et al, "Structure of Management Information
+ Version 2 (SMIv2)", RFC 2578, April 1999.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
+ Directory Access Protocol (LDAP)", RFC 3671, December
+ 2003.
+
+ [RFC3986] Lee-Berners, T., "Uniform Resource Identifier (URI):
+ Generic Syntax", RFC 3986, January 2005.
+
+ [RFC3987] Duerst, M., "Internationalized Resource Identifiers
+ (IRIs)", RFC 3987, January 2005.
+
+ [RFC4122] Leach, P., "A Universally Unique IDentifier (UUID) URN
+ Namespace", RFC 4122, July 2005.
+
+
+
+Coretta Expires August 27, 2024 [Page 54]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ [RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): Directory Information Models", RFC 4512, June
+ 2006.
+
+ [RFC4514] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): String Representation of Distinguished Names",
+ RFC 4514, June 2006.
+
+ [RFC4517] Legg, Ed., S., "Lightweight Directory Access Protocol
+ (LDAP): Syntaxes and Matching Rules", RFC 4517, June
+ 2006.
+
+ [RFC4519] Sciberras, Ed., A., "Lightweight Directory Access Protocol
+ (LDAP): Schema for User Applications", RFC 4519, June
+ 2006.
+
+ [RFC4524] Zeilenga, K., "Lightweight Directory Access Protocol
+ (LDAP): COSINE LDAP/X.500 Schema", RFC 4524, June 2006.
+
+ [RFC4530] Zeilenga, K,. "Lightweight Directory Access Protocol
+ (LDAP) entryUUID Operational Attribute", RFC 4530, June
+ 2006.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", RFC 8174, May 2017.
+
+ [X.660] International Telecommunication Union - Telecommunication
+ Standardization Sector, "General procedures and top arcs
+ of the international object identifier tree", ITU-T X.660,
+ July 2011.
+
+ [X.667] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Information technology -
+ Procedures for the operation of object identifier
+ registration authorities: Generation of universally unique
+ identifiers and their use in object identifiers", ITU-T
+ X.667, October 2012.
+
+ [X.680] International Telecommunication Union - Telecommunication
+ Standardization Sector, "Abstract Syntax Notation One
+ (ASN.1): Specification of basic notation", ITU-T X.680,
+ July 2002.
+
+5.2. Informative References
+
+ [RFC1155] Rose, M., "Structure and Identification of Management
+ Information for TCP/IP-based Internets", RFC 1155, May
+ 1990.
+
+ [X.500] International Telecommunication Union - Telecommunication
+ Standardization Sector, "The Directory: Overview of
+ concepts, models and services", ITU-T X.500, October 2019.
+
+Coretta Expires August 27, 2024 [Page 55]
+
+Internet-Draft The OID Directory: Schema February 2024
+
+
+ [X.672] International Telecommunication Union - Telecommunication
+ Standardization Sector, "OID resolution system: Problems,
+ requirements and potential solutions", ITU-T X.672, March
+ 2020.
+
+Author's Address
+
+ Jesse Coretta
+ California, United States
+
+ Email: jesse.coretta@icloud.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Coretta Expires August 27, 2024 [Page 56]
diff --git a/docs/specs/draft-ietf-kitten-scram-2fa-03.txt b/docs/specs/draft-ietf-kitten-scram-2fa-04.txt
similarity index 92%
rename from docs/specs/draft-ietf-kitten-scram-2fa-03.txt
rename to docs/specs/draft-ietf-kitten-scram-2fa-04.txt
index ca8fe7eaf..62081e547 100644
--- a/docs/specs/draft-ietf-kitten-scram-2fa-03.txt
+++ b/docs/specs/draft-ietf-kitten-scram-2fa-04.txt
@@ -4,13 +4,13 @@
Network Working Group A. Melnikov
Internet-Draft Isode Ltd
-Intended status: Standards Track 24 August 2023
-Expires: 25 February 2024
+Intended status: Standards Track 4 March 2024
+Expires: 5 September 2024
Extensions to Salted Challenge Response (SCRAM) for 2 factor
authentication
- draft-ietf-kitten-scram-2fa-03
+ draft-ietf-kitten-scram-2fa-04
Abstract
@@ -22,7 +22,7 @@ Abstract
reauthentication.
This specification also gives 2 examples of second factors: TOTP (RFC
- 6238) and FIDO CTAP1/U2F.
+ 6238) and FIDO CTAP1/U2F (Passkey).
Status of This Memo
@@ -39,11 +39,11 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on 25 February 2024.
+ This Internet-Draft will expire on 5 September 2024.
Copyright Notice
- Copyright (c) 2023 IETF Trust and the persons identified as the
+ Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
@@ -53,9 +53,9 @@ Copyright Notice
-Melnikov Expires 25 February 2024 [Page 1]
+Melnikov Expires 5 September 2024 [Page 1]
-Internet-Draft SCRAM 2FA extensions August 2023
+Internet-Draft SCRAM 2FA extensions March 2024
and restrictions with respect to this document. Code Components
@@ -68,7 +68,6 @@ Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions Used in This Document . . . . . . . . . . . . . . 3
2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3
- 2.2. Notation . . . . . . . . . . . . . . . . . . . . . . . . 3
3. SCRAM Extension for 2FA . . . . . . . . . . . . . . . . . . . 3
4. SCRAM Extension for reauthentication . . . . . . . . . . . . 4
5. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . 4
@@ -109,9 +108,10 @@ Table of Contents
-Melnikov Expires 25 February 2024 [Page 2]
+
+Melnikov Expires 5 September 2024 [Page 2]
-Internet-Draft SCRAM 2FA extensions August 2023
+Internet-Draft SCRAM 2FA extensions March 2024
2. Conventions Used in This Document
@@ -143,10 +143,6 @@ Internet-Draft SCRAM 2FA extensions August 2023
reference. Other terms defined in [RFC5802] are also used in this
document.
-2.2. Notation
-
- This document reuses notation defined in SCRAM.
-
3. SCRAM Extension for 2FA
This extension doesn't add any extra roundtrips to SCRAM
@@ -160,22 +156,20 @@ Internet-Draft SCRAM 2FA extensions August 2023
server. This extension also doesn't cover enrollment with a 2FA
system, such enrollment happends out-of-band.
-
-
-
-
-
-Melnikov Expires 25 February 2024 [Page 3]
-
-Internet-Draft SCRAM 2FA extensions August 2023
-
-
The server authenticates the client after receiving the second
message as described in Section 3 of [RFC5802]. If the client
included "type" and "second-factor" attributes defined in this
document (see Section 5) and the server supports the specified second
factor type, the server verifies content of the "second-factor"
according to the "type". If the second factor verification fails,
+
+
+
+Melnikov Expires 5 September 2024 [Page 3]
+
+Internet-Draft SCRAM 2FA extensions March 2024
+
+
the server MUST fail authentication and SHOULD return either
"replayed-second-factor" or "invalid-second-factor" error in the "e"
attribute. [[It would be possible to make the extra attributes
@@ -215,24 +209,22 @@ Internet-Draft SCRAM 2FA extensions August 2023
"ctap1" (see Section 8). If this attribute is specified, the "f"
attribute MUST also be specified.
+ * f: This attribute specifies the value of the second factor. For
+ "t=totp" it is 6 digit decimal number. [[Use 8 digits per Rick
+ van Rein?]] This attribute MUST be ignored unless the "t"
+ attribute is also specified.
+ * l: This attribute is used by some second factors (e.g. CTAP1) to
+ specify the challenge returned by the SCRAM server.
-Melnikov Expires 25 February 2024 [Page 4]
+Melnikov Expires 5 September 2024 [Page 4]
-Internet-Draft SCRAM 2FA extensions August 2023
-
+Internet-Draft SCRAM 2FA extensions March 2024
- * f: This attribute specifies the value of the second factor. For
- "t=totp" it is 6 digit decimal number. [[Use 8 digits per Rick
- van Rein?]] This attribute MUST be ignored unless the "t"
- attribute is also specified.
-
- * l: This attribute is used by some second factors (e.g. CTAP1) to
- specify the challenge returned by the SCRAM server.
* o: This attribute specifies the base64-encoded value of the
reauthentication token.
@@ -274,14 +266,6 @@ Internet-Draft SCRAM 2FA extensions August 2023
When TOTP is used with SCRAM, the following values for "t" and "f"
attributes (see Section 5 for their generic syntax) are used:
-
-
-
-Melnikov Expires 25 February 2024 [Page 5]
-
-Internet-Draft SCRAM 2FA extensions August 2023
-
-
* t: This attribute specifies the type of second factor. For TOTP
the value is "totp". If this attribute is specified, the "f"
attribute MUST also be specified.
@@ -290,6 +274,14 @@ Internet-Draft SCRAM 2FA extensions August 2023
"t=totp" it is 6 digit decimal number. This attribute MUST be
ignored unless the "t" attribute is also specified.
+
+
+
+Melnikov Expires 5 September 2024 [Page 5]
+
+Internet-Draft SCRAM 2FA extensions March 2024
+
+
A TOTP URI is specified with the following ABNF:
totp-uri = "otpauth" "://" "totp/" label "?secret=" secret
@@ -331,13 +323,6 @@ Internet-Draft SCRAM 2FA extensions August 2023
CTAP1/U2F the value is "ctap1". If this attribute is specified,
the "f" attribute MUST also be specified.
-
-
-Melnikov Expires 25 February 2024 [Page 6]
-
-Internet-Draft SCRAM 2FA extensions August 2023
-
-
* l: base64-encoded challenge as returned by SCRAM server.
* f: This attribute specifies the value of the second factor. For
@@ -346,6 +331,13 @@ Internet-Draft SCRAM 2FA extensions August 2023
attribute MUST be ignored unless the "t" attribute is also
specified.
+
+
+Melnikov Expires 5 September 2024 [Page 6]
+
+Internet-Draft SCRAM 2FA extensions March 2024
+
+
SCRAM client sends U2F_AUTHENTICATE command formatted as specified in
[FIDO-U2F-Raw-Message-Formats] to the authenticator (e.g. a USB or
NFC device).
@@ -387,13 +379,6 @@ Internet-Draft SCRAM 2FA extensions August 2023
- Other fields are specified in Section 5.8.1 of
[W3C_webauthn_3].
-
-
-Melnikov Expires 25 February 2024 [Page 7]
-
-Internet-Draft SCRAM 2FA extensions August 2023
-
-
* Use clientDataHash parameter of [CTAP2] request as CTAP1/U2F
challenge parameter (32 bytes).
@@ -402,6 +387,13 @@ Internet-Draft SCRAM 2FA extensions August 2023
bytes). (The rp.id parameter is the hostname of the SCRAM
server.)
+
+
+Melnikov Expires 5 September 2024 [Page 7]
+
+Internet-Draft SCRAM 2FA extensions March 2024
+
+
* Let credentialId is the byte string initialized with the id for
this PublicKeyCredentialDescriptor.
@@ -442,15 +434,21 @@ Internet-Draft SCRAM 2FA extensions August 2023
* Let signCount be a 4-byte unsigned integer initialized with CTAP1/
U2F response counter field.
+ Let authenticatorData is a byte string of following structure:
-Melnikov Expires 25 February 2024 [Page 8]
-
-Internet-Draft SCRAM 2FA extensions August 2023
- Let authenticatorData is a byte string of following structure:
+
+
+
+
+
+Melnikov Expires 5 September 2024 [Page 8]
+
+Internet-Draft SCRAM 2FA extensions March 2024
+
+===================+============================+==================+
| Length (in bytes) | Description | Value |
@@ -501,9 +499,11 @@ Internet-Draft SCRAM 2FA extensions August 2023
-Melnikov Expires 25 February 2024 [Page 9]
+
+
+Melnikov Expires 5 September 2024 [Page 9]
-Internet-Draft SCRAM 2FA extensions August 2023
+Internet-Draft SCRAM 2FA extensions March 2024
11. IANA Considerations
@@ -557,9 +557,9 @@ Internet-Draft SCRAM 2FA extensions August 2023
-Melnikov Expires 25 February 2024 [Page 10]
+Melnikov Expires 5 September 2024 [Page 10]
-Internet-Draft SCRAM 2FA extensions August 2023
+Internet-Draft SCRAM 2FA extensions March 2024
[draft-schmaus-kitten-sasl-ht]
@@ -613,9 +613,9 @@ Internet-Draft SCRAM 2FA extensions August 2023
-Melnikov Expires 25 February 2024 [Page 11]
+Melnikov Expires 5 September 2024 [Page 11]
-Internet-Draft SCRAM 2FA extensions August 2023
+Internet-Draft SCRAM 2FA extensions March 2024
[RFC6454] Barth, A., "The Web Origin Concept", RFC 6454,
@@ -669,4 +669,4 @@ Author's Address
-Melnikov Expires 25 February 2024 [Page 12]
+Melnikov Expires 5 September 2024 [Page 12]
diff --git a/docs/specs/draft-melnikov-scram-bis-03.txt b/docs/specs/draft-melnikov-scram-bis-04.txt
similarity index 89%
rename from docs/specs/draft-melnikov-scram-bis-03.txt
rename to docs/specs/draft-melnikov-scram-bis-04.txt
index 0e0506fee..d65be87e2 100644
--- a/docs/specs/draft-melnikov-scram-bis-03.txt
+++ b/docs/specs/draft-melnikov-scram-bis-04.txt
@@ -4,14 +4,14 @@
Network Working Group A. Melnikov, Ed.
Internet-Draft Isode Ltd
-Updates: 5802, 7677 (if approved) 24 August 2023
+Updates: 5802, 7677 (if approved) 4 March 2024
Intended status: Standards Track
-Expires: 25 February 2024
+Expires: 5 September 2024
Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-
API Mechanisms
- draft-melnikov-scram-bis-03
+ draft-melnikov-scram-bis-04
Abstract
@@ -35,11 +35,11 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on 25 February 2024.
+ This Internet-Draft will expire on 5 September 2024.
Copyright Notice
- Copyright (c) 2023 IETF Trust and the persons identified as the
+ Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
@@ -53,9 +53,9 @@ Copyright Notice
-Melnikov Expires 25 February 2024 [Page 1]
+Melnikov Expires 5 September 2024 [Page 1]
-Internet-Draft SASL SCRAM August 2023
+Internet-Draft SASL SCRAM March 2024
Table of Contents
@@ -109,9 +109,9 @@ Table of Contents
-Melnikov Expires 25 February 2024 [Page 2]
+Melnikov Expires 5 September 2024 [Page 2]
-Internet-Draft SASL SCRAM August 2023
+Internet-Draft SASL SCRAM March 2024
3. Implementation Recommendations
@@ -165,9 +165,9 @@ Internet-Draft SASL SCRAM August 2023
-Melnikov Expires 25 February 2024 [Page 3]
+Melnikov Expires 5 September 2024 [Page 3]
-Internet-Draft SASL SCRAM August 2023
+Internet-Draft SASL SCRAM March 2024
(assuming the Salt and hash iteration-count is stable). Therefore,
@@ -221,9 +221,9 @@ Internet-Draft SASL SCRAM August 2023
-Melnikov Expires 25 February 2024 [Page 4]
+Melnikov Expires 5 September 2024 [Page 4]
-Internet-Draft SASL SCRAM August 2023
+Internet-Draft SASL SCRAM March 2024
[RFC7627] Bhargavan, K., Ed., Delignat-Lavaud, A., Pironti, A.,
@@ -252,24 +252,24 @@ Internet-Draft SASL SCRAM August 2023
[I-D.kitten-scram-2fa]
Melnikov, A., "Extensions to Salted Challenge Response
(SCRAM) for 2 factor authentication", Work in Progress,
- Internet-Draft, draft-ietf-kitten-scram-2fa-03, 24 August
+ Internet-Draft, draft-ietf-kitten-scram-2fa-04, 24 August
2023, .
+ scram-2fa-04.txt>.
[I-D.melnikov-scram-sha-512]
Melnikov, A., "SCRAM-SHA-512 and SCRAM-SHA-512-PLUS Simple
Authentication and Security Layer (SASL) Mechanisms", Work
in Progress, Internet-Draft, draft-melnikov-scram-sha-
- 512-03, 10 March 2022, .
+ 512-04, 10 March 2022, .
[I-D.melnikov-scram-sha3-512]
Melnikov, A., "SCRAM-SHA3-512 and SCRAM-SHA3-512-PLUS
Simple Authentication and Security Layer (SASL)
Mechanisms", Work in Progress, Internet-Draft, draft-
- melnikov-scram-sha3-512-03, 24 August 2023,
+ melnikov-scram-sha3-512-04, 24 August 2023,
.
+ scram-sha3-512-04.txt>.
6.2. Informative References
@@ -277,9 +277,9 @@ Internet-Draft SASL SCRAM August 2023
-Melnikov Expires 25 February 2024 [Page 5]
+Melnikov Expires 5 September 2024 [Page 5]
-Internet-Draft SASL SCRAM August 2023
+Internet-Draft SASL SCRAM March 2024
[RFC4270] Hoffman, P. and B. Schneier, "Attacks on Cryptographic
@@ -333,4 +333,4 @@ Author's Address
-Melnikov Expires 25 February 2024 [Page 6]
+Melnikov Expires 5 September 2024 [Page 6]
diff --git a/docs/specs/draft-melnikov-scram-sha-512-03.txt b/docs/specs/draft-melnikov-scram-sha-512-04.txt
similarity index 88%
rename from docs/specs/draft-melnikov-scram-sha-512-03.txt
rename to docs/specs/draft-melnikov-scram-sha-512-04.txt
index e1c5ad02e..7072f3093 100644
--- a/docs/specs/draft-melnikov-scram-sha-512-03.txt
+++ b/docs/specs/draft-melnikov-scram-sha-512-04.txt
@@ -4,13 +4,13 @@
Network Working Group A. Melnikov, Ed.
Internet-Draft Isode Ltd
-Intended status: Standards Track 10 March 2023
-Expires: 11 September 2023
+Intended status: Standards Track 4 March 2024
+Expires: 5 September 2024
SCRAM-SHA-512 and SCRAM-SHA-512-PLUS Simple Authentication and Security
Layer (SASL) Mechanisms
- draft-melnikov-scram-sha-512-03
+ draft-melnikov-scram-sha-512-04
Abstract
@@ -32,11 +32,11 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on 11 September 2023.
+ This Internet-Draft will expire on 5 September 2024.
Copyright Notice
- Copyright (c) 2023 IETF Trust and the persons identified as the
+ Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
@@ -53,9 +53,9 @@ Copyright Notice
-Melnikov Expires 11 September 2023 [Page 1]
+Melnikov Expires 5 September 2024 [Page 1]
-Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
+Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2024
Table of Contents
@@ -63,7 +63,7 @@ Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Key Word Definitions . . . . . . . . . . . . . . . . . . . . 2
3. SCRAM-SHA-512 and SCRAM-SHA-512-PLUS . . . . . . . . . . . . 2
- 4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
+ 4. Security Considerations . . . . . . . . . . . . . . . . . . . 2
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 3
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.1. Normative References . . . . . . . . . . . . . . . . . . 4
@@ -73,11 +73,12 @@ Table of Contents
1. Introduction
- This document registers the SASL [RFC4422] mechanisms SCRAM-SHA-512
- and SCRAM-SHA-512-PLUS. SHA-512 has stronger security properties
- than SHA-1, and it is expected that SCRAM mechanisms based on it will
- have greater predicted longevity than the SCRAM mechanisms based on
- SHA-1.
+ This document registers 2 new SASL [RFC4422] mechanisms SCRAM-SHA-512
+ and SCRAM-SHA-512-PLUS, which are variants of Salted Challenge
+ Response Authentication Mechanism (SCRAM) [RFC5802]. SHA-512 has
+ stronger security properties than SHA-1, and it is expected that
+ SCRAM mechanisms based on it will have greater predicted longevity
+ than the SCRAM mechanisms based on SHA-1.
2. Key Word Definitions
@@ -99,24 +100,19 @@ Table of Contents
The GSS-API mechanism OID for SCRAM-SHA-512 is 1.3.6.1.5.5. (see
Section 5).
- This is a simple example of a SCRAM-SHA-512 authentication exchange
- when the client doesn't support channel bindings. The username
- 'user' and password 'pencil' are being used.
-
[[TBD: Add an example]]
+4. Security Considerations
+ The security considerations from [RFC5802] still apply.
-Melnikov Expires 11 September 2023 [Page 2]
-
-Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
-
-4. Security Considerations
+Melnikov Expires 5 September 2024 [Page 2]
+
+Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2024
- The security considerations from [RFC5802] still apply.
To be secure, SCRAM-SHA-512-PLUS MUST be used over a TLS channel that
has had the session hash extension [RFC7627] negotiated, or session
@@ -162,17 +158,17 @@ Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
Published specification (optional, recommended): RFC XXXX
+ Minimum iteration-count: 10000
+ OID: 1.3.6.1.5.5.
-Melnikov Expires 11 September 2023 [Page 3]
-
-Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
- Minimum iteration-count: 10000
+Melnikov Expires 5 September 2024 [Page 3]
+
+Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2024
- OID: 1.3.6.1.5.5.
Person & email address to contact for further information: IETF
KITTEN WG
@@ -188,8 +184,8 @@ Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
Subject: Registration of a new SASL SCRAM Family mechanism SCRAM-
SHA-512-PLUS
- SASL mechanism name (or prefix for the family): SCRAM-SHA-
- 512-PLUS
+ SASL mechanism name (or prefix for the family):
+ SCRAM-SHA-512-PLUS
Security considerations: Section 4 of RFC XXXX
@@ -217,19 +213,18 @@ Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
DOI 10.17487/RFC2119, March 1997,
.
+ [RFC4422] Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple
+ Authentication and Security Layer (SASL)", RFC 4422,
+ DOI 10.17487/RFC4422, June 2006,
+ .
-Melnikov Expires 11 September 2023 [Page 4]
+Melnikov Expires 5 September 2024 [Page 4]
-Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
-
+Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2024
- [RFC4422] Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple
- Authentication and Security Layer (SASL)", RFC 4422,
- DOI 10.17487/RFC4422, June 2006,
- .
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246,
@@ -272,21 +267,21 @@ Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
DOI 10.17487/RFC4270, November 2005,
.
+ [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
+ IANA Considerations Section in RFCs", RFC 5226,
+ DOI 10.17487/RFC5226, May 2008,
+ .
+
-Melnikov Expires 11 September 2023 [Page 5]
+Melnikov Expires 5 September 2024 [Page 5]
-Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2023
+Internet-Draft SASL SCRAM-SHA-512/SCRAM-SHA-512-PLUS March 2024
- [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
- IANA Considerations Section in RFCs", RFC 5226,
- DOI 10.17487/RFC5226, May 2008,
- .
-
[RFC6194] Polk, T., Chen, L., Turner, S., and P. Hoffman, "Security
Considerations for the SHA-0 and SHA-1 Message-Digest
Algorithms", RFC 6194, DOI 10.17487/RFC6194, March 2011,
@@ -333,4 +328,9 @@ Author's Address
-Melnikov Expires 11 September 2023 [Page 6]
+
+
+
+
+
+Melnikov Expires 5 September 2024 [Page 6]
diff --git a/docs/specs/draft-melnikov-scram-sha3-512-03.txt b/docs/specs/draft-melnikov-scram-sha3-512-04.txt
similarity index 84%
rename from docs/specs/draft-melnikov-scram-sha3-512-03.txt
rename to docs/specs/draft-melnikov-scram-sha3-512-04.txt
index ffa08a8c5..d70c20198 100644
--- a/docs/specs/draft-melnikov-scram-sha3-512-03.txt
+++ b/docs/specs/draft-melnikov-scram-sha3-512-04.txt
@@ -4,13 +4,13 @@
Network Working Group A. Melnikov, Ed.
Internet-Draft Isode Ltd
-Intended status: Standards Track 24 August 2023
-Expires: 25 February 2024
+Intended status: Standards Track 4 March 2024
+Expires: 5 September 2024
SCRAM-SHA3-512 and SCRAM-SHA3-512-PLUS Simple Authentication and
Security Layer (SASL) Mechanisms
- draft-melnikov-scram-sha3-512-03
+ draft-melnikov-scram-sha3-512-04
Abstract
@@ -32,11 +32,11 @@ Status of This Memo
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
- This Internet-Draft will expire on 25 February 2024.
+ This Internet-Draft will expire on 5 September 2024.
Copyright Notice
- Copyright (c) 2023 IETF Trust and the persons identified as the
+ Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
@@ -53,9 +53,9 @@ Copyright Notice
-Melnikov Expires 25 February 2024 [Page 1]
+Melnikov Expires 5 September 2024 [Page 1]
-Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
+Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS March 2024
Table of Contents
@@ -73,14 +73,15 @@ Table of Contents
1. Introduction
- This document registers the SASL [RFC4422] mechanisms SCRAM-SHA3-512
- and SCRAM-SHA3-512-PLUS. SHA3-512 has stronger security properties
- than SHA-1, and it is expected that SCRAM mechanisms based on it will
- have greater predicted longevity than the SCRAM mechanisms based on
- SHA-1. SHA3-512 works differently from SHA-2 family of hash
- functions, so it is also expected that vulnerabilities in SHA-2 hash
- functions are not going to necessarily affect SHA-3 family of hash
- functions.
+ This document registers 2 new SASL [RFC4422] mechanisms SCRAM-
+ SHA3-512 and SCRAM-SHA3-512-PLUS, which are variants of Salted
+ Challenge Response Authentication Mechanism (SCRAM) [RFC5802].
+ SHA3-512 has stronger security properties than SHA-1, and it is
+ expected that SCRAM mechanisms based on it will have greater
+ predicted longevity than the SCRAM mechanisms based on SHA-1.
+ SHA3-512 works differently from SHA-2 family of hash functions, so it
+ is also expected that vulnerabilities in SHA-2 hash functions are not
+ going to necessarily affect SHA-3 family of hash functions.
2. Key Word Definitions
@@ -102,16 +103,15 @@ Table of Contents
The GSS-API mechanism OID for SCRAM-SHA3-512 is 1.3.6.1.5.5.
(see Section 5).
- This is a simple example of a SCRAM-SHA3-512 authentication exchange
- when the client doesn't support channel bindings. The username
- 'user' and password 'pencil' are being used.
+ [[TBD: add an example.]]
-Melnikov Expires 25 February 2024 [Page 2]
+
+Melnikov Expires 5 September 2024 [Page 2]
-Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
+Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS March 2024
4. Security Considerations
@@ -165,9 +165,9 @@ Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
-Melnikov Expires 25 February 2024 [Page 3]
+Melnikov Expires 5 September 2024 [Page 3]
-Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
+Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS March 2024
Minimum iteration-count: 10000
@@ -188,8 +188,8 @@ Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
Subject: Registration of a new SASL SCRAM Family mechanism SCRAM-
SHA3-512-PLUS
- SASL mechanism name (or prefix for the family): SCRAM-
- SHA3-512-PLUS
+ SASL mechanism name (or prefix for the family):
+ SCRAM-SHA3-512-PLUS
Security considerations: Section 4 of RFC XXXX
@@ -221,9 +221,9 @@ Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
-Melnikov Expires 25 February 2024 [Page 4]
+Melnikov Expires 5 September 2024 [Page 4]
-Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
+Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS March 2024
[RFC4422] Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple
@@ -277,9 +277,9 @@ Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
-Melnikov Expires 25 February 2024 [Page 5]
+Melnikov Expires 5 September 2024 [Page 5]
-Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS August 2023
+Internet-Draft SASL SCRAM-SHA3-512/SCRAM-SHA3-512-PLUS March 2024
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
@@ -333,4 +333,4 @@ Author's Address
-Melnikov Expires 25 February 2024 [Page 6]
+Melnikov Expires 5 September 2024 [Page 6]
diff --git a/docs/specs/internet-drafts.html b/docs/specs/internet-drafts.html
index 3804b3ae9..f593ff47b 100644
--- a/docs/specs/internet-drafts.html
+++ b/docs/specs/internet-drafts.html
@@ -152,6 +152,40 @@ LDAP Specifications Defined in Internet Drafts
+
+ draft-coretta-oiddir-radit-00: The OID Directory: The RA DIT
+ Expiration Date: August 27, 2024
+
+
+
+
+ draft-coretta-oiddir-radsa-00: The OID Directory: The RA DSA
+
+ Expiration Date: August 27, 2024
+
+
+
+
+ draft-coretta-oiddir-radua-00: The OID Directory: The RA DUA
+
+ Expiration Date: August 27, 2024
+
+
+
+
+ draft-coretta-oiddir-roadmap-00: The OID Directory: A Technical Roadmap
+
+ Expiration Date: August 27, 2024
+
+
+
+
+ draft-coretta-oiddir-schema-01: The OID Directory: The Schema
+
+ Expiration Date: August 27, 2024
+
+
+
draft-coretta-x660-ldap-08: Lightweight Directory Access Protocol (LDAP) Procedures and Schema Definitions for the Storage of X.660 Registration Information
@@ -356,9 +390,9 @@ LDAP Specifications Defined in Internet Drafts
- draft-ietf-kitten-scram-2fa-03: Extensions to Salted Challenge Response (SCRAM) for 2 factor authentication
+ draft-ietf-kitten-scram-2fa-04: Extensions to Salted Challenge Response (SCRAM) for 2 factor authentication
- Expiration Date: February 25, 2024
+ Expiration Date: September 5, 2024
@@ -623,23 +657,23 @@ LDAP Specifications Defined in Internet Drafts
- draft-melnikov-scram-bis-03: Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms
+ draft-melnikov-scram-bis-04: Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms
- Expiration Date: February 25, 2024
+ Expiration Date: September 5, 2024
- draft-melnikov-scram-sha-513-02: SCRAM-SHA-512 and SCRAM-SHA-512-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
+ draft-melnikov-scram-sha-512-04: SCRAM-SHA-512 and SCRAM-SHA-512-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
- Expiration Date: September 11, 2023
+ Expiration Date: September 5, 2024
- draft-melnikov-scram-sha3-512-03: SCRAM-SHA3-512 and SCRAM-SHA3-512-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
+ draft-melnikov-scram-sha3-512-04: SCRAM-SHA3-512 and SCRAM-SHA3-512-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
- Expiration Date: February 25, 2024
+ Expiration Date: September 5, 2024