{"draft":"draft-ietf-pkix-ocspagility-10","doc_id":"RFC6277","title":"Online Certificate Status Protocol Algorithm Agility","authors":["S. Santesson","P. Hallam-Baker"],"format":["ASCII","HTML"],"page_count":"11","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Public-Key Infrastructure (X.509)","abstract":"The Online Certificate Status Protocol (OCSP) requires\r\nserver responses to be signed but does not specify a mechanism for\r\nselecting the signature algorithm to be used. This may lead to\r\navoidable interoperability failures in contexts where multiple\r\nsignature algorithms are in use. This document specifies rules for\r\nserver signature algorithm selection and an extension that allows a\r\nclient to advise a server that specific signature algorithms are\r\nsupported. [STANDARDS-TRACK]","pub_date":"June 2011","keywords":["[--------]","ocsp"],"obsoletes":[],"obsoleted_by":["RFC6960"],"updates":["RFC2560"],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6277","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc6277"}