Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the source file.

1) <!--[rfced] For clarity, may we update the latter part of this sentence
as follows?

Original:
   Senders MAY alternatively use a short placeholder issuer consisting
   of a single relative distinguished name, with a single attribute of
   type id-rdna-unsigned and value a zero-length UTF8String.

Perhaps:
   Senders MAY alternatively use a short placeholder issuer consisting
   of a single relative distinguished name that has a single attribute of
   type id-rdna-unsigned and a value with a zero-length UTF8String.
-->   


2) <!--[rfced] To improve readability and avoid the repetition of "include" and
"includes", may we update this sentence as follows?

Original:
   Section 4.2.1.1 of [RFC5280] requires
   certificates to include the authority key identifier, but includes an
   exception for self-signed certificates used when distributing a
   public key.

Perhaps:
   Section 4.2.1.1 of [RFC5280] requires
   certificates to include the authority key identifier, but it also describes 
an
   exception for self-signed certificates used when distributing a
   public key.
-->   


3) <!--[rfced] FYI - We've reformatted the following text into an unordered
list. Please review and let us know of any objections.

Original:
   Senders SHOULD fill in these values to reflect the subject.  That is:

   If the subject is a CA, it SHOULD assert the keyCertSign key usage
   bit and SHOULD include a basic constraints extensions that sets the
   cA boolean to TRUE.

   If the subject is an end entity, it SHOULD NOT assert the keyCertSign
   key usage bit, and it SHOULD either omit the basic constraints
   extension or set the cA boolean to FALSE.  Unlike a self-signed
   certificate, an unsigned certificate does not issue itself, so there
   is no need to accommodate a self-signature in either extension.

Current:
   Senders SHOULD fill in these values to reflect the subject.  That is:

   *  If the subject is a CA, it SHOULD assert the keyCertSign key usage
      bit and SHOULD include a basic constraints extension that sets
      the cA boolean to TRUE.

   *  If the subject is an end entity, it SHOULD NOT assert the
      keyCertSign key usage bit, and it SHOULD either omit the basic
      constraints extension or set the cA boolean to FALSE.  Unlike a
      self-signed certificate, an unsigned certificate does not issue
      itself, so there is no need to accommodate a self-signature in
      either extension.
-->


4) <!--[rfced] To improve readability, may we update "etc." to "for example"?

Original:
   However, some applications might use
   it as an integrity check to guard against accidental storage
   corruption, etc.

Perhaps:
   However, some applications might, for example, use
   it as an integrity check to guard against accidental storage
   corruption.
-->   


5) <!--[rfced] We note that [RFC5912] is only cited in the ASN.1 module.
In order to have a 1:1 matchup between the references section and the text,
please review the text and let us know where a citation may be included.
We suggest adding a sentence before the ASN.1 module to  cite [RFC5912].

Perhaps:
   This ASN.1 module uses the conventions established by [RFC5912].
-->


6) <!-- [rfced] FYI - We have added an expansion for the following abbreviation
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

 Key Encapsulation Mechanism (KEM)
-->


7) <!-- [rfced] Please review the "Inclusive Language" portion of the online
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.
-->


Thank you.

Alanna Paloma
RFC Production Center


On Feb 12, 2026, at 3:31 PM, [email protected] wrote:

*****IMPORTANT*****

Updated 2026/02/12

RFC Author(s):

Your document has now entered AUTH48. 

The document was edited in kramdown-rfc as part of the RPC pilot test (see 
https://www.rfc-editor.org/rpc/wiki/doku.php?id=pilot_test_kramdown_rfc). 

Please review the procedures for AUTH48 using kramdown-rfc:

https://www.rfc-editor.org/rpc/wiki/doku.php?id=pilot_test_instructions_completing_auth48_using_kramdown

Once your document has completed AUTH48, it will be published as 
an RFC.  


Files 
-----

The files are available here:
   https://www.rfc-editor.org/authors/rfc9925.md
   https://www.rfc-editor.org/authors/rfc9925.html
   https://www.rfc-editor.org/authors/rfc9925.pdf
   https://www.rfc-editor.org/authors/rfc9925.txt

Diff file of the text:
   https://www.rfc-editor.org/authors/rfc9925-diff.html
   https://www.rfc-editor.org/authors/rfc9925-rfcdiff.html (side by side)

Diff of the kramdown: 
   https://www.rfc-editor.org/authors/rfc9925-md-diff.html
   https://www.rfc-editor.org/authors/rfc9925-md-rfcdiff.html (side by side)
   

Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9925


Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor   

--------------------------------------
RFC9925 (draft-ietf-lamps-x509-alg-none-10)

Title            : Unsigned X.509 Certificates
Author(s)        : D. Benjamin
WG Chair(s)      : Russ Housley, Tim Hollebeek
Area Director(s) : Deb Cooley, Paul Wouters

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to