7. CERTIFICATE, CRL, AND OCSP PROFILES

7.1 Certificate profile

All fields are as specified in RFC5280, including fields and extensions not specifically mentioned. Extensions are not marked critical unless specifically described here as critical.

Root CA Certificate

Field or extensionValue
Serial NumberMust be unique, with 64 bits of output from a CSPRNG
Issuer Distinguished NameC=US, O=Internet Security Research Group, CN=ISRG Root X<n>
where n is an integer representing the instance of the Root
CA Certificate. For example, ISRG Root X1, ISRG Root X2, etc.
Subject Distinguished NameSame as Issuer DN
Validity PeriodUp to 25 years
Basic ConstraintsCritical.
cA=True, pathLength constraint absent
Key UsageCritical.
keyCertSign, cRLSign

Intermediate CA Certificate

Field or extensionValue
Serial NumberMust be unique, with 64 bits of output from a CSPRNG
Issuer Distinguished NameDerived from Issuer certificate
Subject Distinguished NameC=US, O=Let’s Encrypt, CN=Let’s Encrypt Authority X<n>
where n is an integer representing the instance of the Subordinate CA Certificate
Validity PeriodUp to 8 years
Basic ConstraintsCritical.
cA=True, pathLength constraint 0
Key UsageCritical.
keyCertSign, cRLSign, digitalSignature
Extended Key UsageTLS Server Authentication, TLS Client Authentication
Certificate PoliciesCAB Forum Domain Validated (2.23.140.1.2.1)
ISRG Domain Validated (1.3.6.1.4.1.44947.1.1.1)
Policy Qualifier Id=CPS
Qualifier: Pointer to this CPS
Authority Information AccessContains CA Issuers URL and OCSP URL. URLs vary based on Issuer.
CRL Distribution PointsContains a CRL URL. URL varies based on Issuer.

DV-SSL End Entity Certificate

Field or extensionValue
Serial NumberMust be unique, with 64 bits of output from a CSPRNG
Issuer Distinguished NameDerived from Issuer certificate
Subject Distinguished NameCN=one of the values from the Subject Alternative Name extension
Validity Period90 days
Basic ConstraintsCritical.
cA=False
Key UsageCritical.
digitalSignature, keyEncipherment
Extended Key UsageTLS Server Authentication, TLS Client Authentication
Certificate PoliciesCAB Forum Domain Validated (2.23.140.1.2.1)
ISRG Domain Validated (1.3.6.1.4.1.44947.1.1.1)
CPS Qualifier: Pointer to this CPS
Authority Information AccessContains CA Issuers URL and OCSP URL. URLs vary based on Issuer.
Subject Public KeyRSA with modulus between 2048 and 4096, inclusive; or namedCurve P-256; or namedCurve P-384
Subject Alternative NameA sequence of 1 to 100 dNSNames
TLS FeatureContains status_request if requested by the subscriber in the CSR
Precertificate poisonPer RFC 6962. In Precertificates only.
Signed Certificate Timestamp ListPer RFC 6962. In final certificates only.

Root OCSP Signing Certificate

Signed by a Root CA Certificate, these Certificates sign OCSP responses for Intermediate CA Certificates.

Field or extensionValue
Serial NumberMust be unique, with 64 bits of output from a CSPRNG
Issuer Distinguished NameC=US, O=Internet Security Research Group, CN=ISRG Root X<n>
Subject Distinguished NameC=US, O=Internet Security Research Group, CN=ISRG Root OCSP X<n>
Validity Period5 years
Basic ConstraintsCritical.
cA=False
Key UsageCritical.
digitalSignature
Extended Key UsageCritical.
OCSPSigning
No CheckPresent

7.1.1 Version number(s)

All certificates use X.509 version 3.

7.1.2 Certificate extensions

See section 7.1.

7.1.3 Algorithm object identifiers

NameObject identifier
sha256WithRSAEncryption1.2.840.113549.1.1.11

7.1.4 Name forms

See ISRG Certificate Policy.

7.1.5 Name constraints

No stipulation.

7.1.6 Certificate policy object identifier

See section 7.1.

7.1.7 Usage of Policy Constraints extension

Not applicable.

7.1.8 Policy qualifiers syntax and semantics

See section 7.1.

7.1.9 Processing semantics for the critical Certificate Policies extension

Not applicable.

7.2 CRL profile

Field or ExtensionValue
VersionV2
Signature Algorithmsha256WithRSAEncryption
ThisUpdateThe date and time when the Certificate revocation list was issued.
NextUpdateThisUpdate + 30 days
RevokedCertificatesContains: userCertificate, revocationDate, reasonCode
CRLnumberThe serial number of this CRL in an incrementally increasing sequence of CRLs.

7.2.1 Version number(s)

See section 7.2.

7.2.2 CRL and CRL entry extensions

No stipulation.

7.3 OCSP profile

ISRG OCSP responders implement the RFC 5019 profile of RFC 6960.

7.3.1 Version number(s)

No stipulation.

7.3.2 OCSP extensions

No stipulation.