<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rbw-home-servers-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Home Servers">Identifying and Authenticating Home Servers: Requirements and Solution Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-rbw-home-servers-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="19"/>
    <area>Internet</area>
    <workgroup>network</workgroup>
    <keyword>deployment</keyword>
    <keyword>encryption</keyword>
    <keyword>TLS</keyword>
    <abstract>
      <?line 69?>

<t>Obtaining CA-signed certificates for servers within a home network
is difficult and causes problems at scale.  This document explores
requirements to improve this situation and analyzes existing
solutions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rbw-home-servers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        ADD Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes the problem encountered to host servers in
   a home network and how to connect to those servers using an
   encrypted transport protocol such as TLS <xref target="RFC8446"/> or DTLS <xref target="RFC9147"/>.  It also identifies a set
   of requirements and discusses to what extent existing solutions can
   (or can't) meet these requirements.</t>
      <t>This documnt uses "local equipment" to refer to an equipment that is
   deployed in a local network (e.g., LAN). A local equipment can be
   a Customer Premises Equipment (CPE), an IoT device, an Set-top box (STB), etc.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document describes the current state of the art for deploying
encrypted servers within the home.  New mechanisms should be described
in separate documents.</t>
      <t>There are three types of equipment:</t>
      <ol spacing="normal" type="1"><li>
          <t>Legacy local equipment which lacks memory, CPU, or sufficient
  security to reasonably support an encrypted transport protocol and
  associated key management.  An example is a 10-year old router with
  built-in 802.11n Wi-Fi.  This type of equipment is out of scope.</t>
        </li>
        <li>
          <t>High functioning local equipment that provides sufficient hardware
  and software capability to support an encrypted transport protocol
  and associated key management.  An example is a printer, NAS, or
  higher-end consumer router.  This is the primary scope of this
  document.</t>
        </li>
        <li>
          <t>High functioning virtualized equipment, where some functions are
  provided via local or remote software.  An example is virtualized
  CPE (vCPE). This is a secondary scope of this document.</t>
        </li>
      </ol>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>This section identifies a set of requirements and discusses each of them.</t>
      <section anchor="reduce-use-of-public-certification-authority">
        <name>Reduce Use of Public Certification Authority</name>
        <t>With automated certificate enrollment and renewal <xref target="ACME"/>, a
public Certification Authority (CA) can sign a certificate for local
equipment such as a printer, NAS, or router.  However, this causes a
few issues:</t>
        <ul spacing="normal">
          <li>
            <t>In case of large scale deployment of local equipment (e.g., millions of
 devices), issuing certificate requests for a large number of
 subdomains could be treated as an attack by the CAs to overwhelm it.
 This can be resolved with
 contracts/fees but this reduces agility and choice flexibility.</t>
          </li>
          <li>
            <t>Dependency on the CA to issue a large number of certificates,
which causes CA availability to impact service availability.</t>
          </li>
          <li>
            <t>ACME-based challenges require a public WAN IP address for
HTTP challenge or control of DNS zone, which is difficult
or impossible for devices behind a NAT (e.g., printer). Even
considering the home router this remains difficult as it
needs to (temporarily) expose an HTTP server to the
Internet during the HTTP challenge. An ISP-operated NAT
(Carrier Grade NAT, CGN) is another barrier.</t>
          </li>
        </ul>
        <t>Deployed systems have used a vendor-operated service for
certificate acquisition and renewal to avoid the problems
enumerated above.</t>
        <dl>
          <dt>R-REDUCE-CA:</dt>
          <dd>
            <t>Reduce the use of a public Certification Authorities.</t>
          </dd>
        </dl>
      </section>
      <section anchor="eliminate-use-of-public-certification-authority">
        <name>Eliminate Use of Public Certification Authority</name>
        <t>Taking an additional step from the previous requirement, eliminating
the vendor operation of a CA avoids the
complexities of certificate management.</t>
        <dl>
          <dt>R-ELIMINATE-CA:</dt>
          <dd>
            <t>Eliminate using Certification Authorities for each device.</t>
          </dd>
        </dl>
      </section>
      <section anchor="existing-support-by-certification-authorities">
        <name>Existing Support by Certification Authorities</name>
        <t>The ability to immediately deploy using existing CA is important
to evaluate.</t>
        <dl>
          <dt>R-SUPPORT-CA:</dt>
          <dd>
            <t>Existing support by Certification Authorities.</t>
          </dd>
        </dl>
      </section>
      <section anchor="client-support">
        <name>Client Support</name>
        <t>The ability to immediately deploy on clients is important to evaluate.</t>
        <dl>
          <dt>R-SUPPORT-CLIENT:</dt>
          <dd>
            <t>Existing support client libraries or client software intances.</t>
          </dd>
        </dl>
      </section>
      <section anchor="revoke-authorization">
        <name>Revoke Authorization</name>
        <t>End-users are extremely unlikely to contact the device vendor if a
device is replaced (stolen, upgraded, etc.).  Rather, the
users will replace the device and configure their clients (laptops,
smartphones, IoT devices, etc.) to authorize the new device.  As part of
that configuration, the client can encourage removing authorization
for the replaced device. In situations where there is normally only
one device (one NAS, one printer, one home router, etc.), this revocation can
be straightforward.</t>
        <dl>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Provide a mechanism for an end-user to disable access to a previously-
  authorized encrypted service, to accomodate a lost/stolen/sold device.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="analysis-of-solutions-to-requirements">
      <name>Analysis of Solutions to Requirements</name>
      <t>This section describes several solutions which can meet a subset of the requirements.  This is first summarized in <xref target="table1"/> and
detailed in the following subsections.</t>
      <table anchor="table1">
        <name>Summary of Solution Analysis</name>
        <thead>
          <tr>
            <th align="right">Solution</th>
            <th align="center">Reduce CA</th>
            <th align="center">Eliminate CA</th>
            <th align="center">Existing CA Support</th>
            <th align="center">Existing Client Support</th>
            <th align="center">Revoke Auth</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">Normal certificates</td>
            <td align="center">No</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
            <td align="center">Some</td>
          </tr>
          <tr>
            <td align="right">Delegated credentials</td>
            <td align="center">Yes, somewhat</td>
            <td align="center">No</td>
            <td align="center">No</td>
            <td align="center">No, (*)</td>
            <td align="center">Some</td>
          </tr>
          <tr>
            <td align="right">Name constraints</td>
            <td align="center">Yes</td>
            <td align="center">No</td>
            <td align="center">No</td>
            <td align="center">No</td>
            <td align="center">Some</td>
          </tr>
          <tr>
            <td align="right">ACME delegated certificates</td>
            <td align="center">No</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
            <td align="center">Some</td>
          </tr>
          <tr>
            <td align="right">Raw Public Keys</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
            <td align="center">n/a</td>
            <td align="center">Some, (*)</td>
            <td align="center">Yes</td>
          </tr>
          <tr>
            <td align="right">Self-Signed Certificate</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
            <td align="center">n/a</td>
            <td align="center">Yes, poor experience</td>
            <td align="center">Yes</td>
          </tr>
          <tr>
            <td align="right">Local Certification Authority</td>
            <td align="center">No</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
          </tr>
          <tr>
            <td align="right">Matter</td>
            <td align="center">Yes</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
            <td align="center">Yes</td>
          </tr>
        </tbody>
      </table>
      <section anchor="normal-certificates">
        <name>Normal Certificates</name>
        <t>This solution has the device send a request to a (cloud) server to obtain a certificate
for the device from a public CA. This solution is deployed in production
by Mozilla <xref target="https-local-dom"/>, McAfee, and Cujo.  Today, this is best
practice.  However, it suffers from the dependency on both the public
Certification Authority and the vendor's service (necessary because the
device cannot always obtain a publicly-accessible IPv4 address necessary
to get an ACME-signed certificate itself), which are necessary
for both initial deployment and for certificate renewal.</t>
        <t>R-REDUCE-CA: no</t>
        <t>R-ELIMINATE-CA: no</t>
        <t>Both CAs and clients already support the normal mode of operation.</t>
        <t>R-SUPPORT-CA: yes</t>
        <t>R-SUPPORT-CLIENT: yes</t>
        <dl>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Somewhat, if client retrieves CRL frequently and if CRL is updated
frequently, and user has mechanism to declare the certificate as
invalid.</t>
          </dd>
        </dl>
      </section>
      <section anchor="delegated">
        <name>Delegated Credentials</name>
        <t>Delegated credentials <xref target="RFC9345"/> allows the entity operating the
device (e.g., vendor or ISP) to sign a 7-day validity for the device's
public key (Short-Term Automatically Renewed (STAR)).  The frequency of CA interactions remains the same as with
normal certificates (<xref target="normal-certificates"/>).  For each device, the
interactions are with the vendor's service rather than with the public
CA.</t>
        <t>As currently specified in <xref target="RFC9345"/>, the same name would be issued
to all devices making it impossible to identify whether the delegated
credential is issued to the intended device or an "evil-twin"
device. This drawback can be corrected by enhancing <xref target="RFC9345"/> to
include a string that uniquely identifies the delegated credential
(e.g., including hash of customer id or other unique identifier in the
FQDN to result in "printer.&lt;HASH&gt;.example.com" or "nas.&lt;CUSTOMER-ID&gt;.example.net").</t>
        <ul empty="true">
          <li>
            <t>For the sake of simplifying the analysis, this document assumes such an
enhancement to <xref target="RFC9345"/> has been standardized and deployed.</t>
          </li>
        </ul>
        <dl>
          <dt>R-REDUCE-CA:</dt>
          <dd>
            <t>yes, somewhat by moving CA signing from public CA to a
vendor- or ISP-operated service.</t>
          </dd>
        </dl>
        <t>R-ELIMINATE-CA: no</t>
        <t>Delegated credentials have no existing support by CAs. Clients need to
support <xref section="4.1.1" sectionFormat="of" target="RFC9345"/> which requires sending an
extension in their TLS 1.3 ClientHello.  The only client supporting
delegated credentials is Firefox.</t>
        <t>R-SUPPORT-CA: no</t>
        <t>R-SUPPORT-CLIENT: no, only supported by Firefox</t>
        <dl>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Somewhat, if client retrieves CRL frequently and if CRL is updated
frequently, and user has mechanism to declare the certificate as
invalid.</t>
          </dd>
        </dl>
      </section>
      <section anchor="name-constraints">
        <name>Name Constraints</name>
        <t>Name constraints (<xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>) allows the entity
operating the device (e.g., vendor or ISP) to obtain a certificate
from a public Certification Authority for a subdomain (dNSName) which
is then used to sign certificates for each device.  For example, the
network "example.net" could obtain a name constrained certificate for
".customer.example.net" and then issue one certificate for each customer
such as "123.customer.example.net", yielding "printer.123.customer.example.net"
and "nas.123.customer.example.net" and "dns.123.customer.example.net".
For each device, the interactions are with the vendor's service rather
than with the public CA.</t>
        <dl>
          <dt>R-REDUCE-CA:</dt>
          <dd>
            <t>yes, it reduces interaction with public CAs but has same
number of interactions with the CPE operator's CA.</t>
          </dd>
        </dl>
        <t>R-ELIMINATE-CA: no</t>
        <t>Name constraints have no existing support by CAs or by clients.</t>
        <t>R-SUPPORT-CA: no</t>
        <t>R-SUPPORT-CLIENT: no</t>
        <dl>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Somewhat, if client retrieves CRL frequently and if CRL is updated
frequently, and user has mechanism to declare the certificate as
invalid.</t>
          </dd>
        </dl>
      </section>
      <section anchor="acme-delegated-certificates">
        <name>ACME Delegated Certificates</name>
        <t>ACME Delegated Certificates <xref target="RFC9115"/> allows the device to use a vendor-
operated service to obtain a CA-signed ACME delegated certificate. It allows
the device to request from a service managing the device -- acting as a
profiled ACME server -- a certificate for a delegated identity,
i.e., one belonging to the device. The device then uses the ACME protocol (with the
extensions described in <xref target="RFC8739"/>) to request issuance of a short-term,
Automatically Renewed (STAR) certificate for the same delegated identity.
The generated short-term certificate is automatically renewed by the public CA,
is periodically fetched by the device.</t>
        <t>R-REDUCE-CA: No</t>
        <t>R-ELIMINATE-CA: No</t>
        <t>ACME delegated certificates do not require changes to client authentication libraries or operation.</t>
        <t>R-SUPPORT-CA: Unknown</t>
        <t>R-SUPPORT-CLIENT: yes</t>
        <dl>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Somewhat, if client retrieves CRL frequently and if CRL is updated
frequently, and user has mechanism to declare the certificate as
invalid.</t>
          </dd>
        </dl>
      </section>
      <section anchor="raw-public-keys-rpk">
        <name>Raw Public Keys (RPK)</name>
        <t>Raw public keys (RPK) <xref target="RFC7250"/> can be authenticated out-of-band or using trust on first use (TOFU).
For a small network, this can be more appealing than a local or remote Certification Authority signing
keys and dealing with certificate renewal.</t>
        <t>R-REDUCE-CA: yes</t>
        <t>R-ELIMINATE-CA: yes</t>
        <t>RPKs have been supported by OpenSSL and wolfSSL since 2023
and by GnuTLS since 2019. However, RPKs are not supported
by browsers or by curl.</t>
        <dl>
          <dt>R-SUPPORT-CA:</dt>
          <dd>
            <t>n/a, this system does not use Certification Authorities at all.</t>
          </dd>
          <dt>R-SUPPORT-CLIENT:</dt>
          <dd>
            <t>Some; all major libraries support RPK, but clients (browsers and curl) do not support RPK.
Further, Discovery of Network-designated Resolvers (DNR) <xref target="RFC9463"/>) and Discovery of Designated Resolvers (DDR) <xref target="RFC9462"/> in verified discovery mode expect to encounter certificates and do not support RPK.</t>
          </dd>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Yes, user can remove the raw public key from list of authorized public keys.</t>
          </dd>
        </dl>
      </section>
      <section anchor="self-signed-certificate">
        <name>Self-signed Certificate</name>
        <t>A self-signed certificate requires the client to authorize the connection, which is usually
a "click OK to continue" dialog box and is a trust on first use (TOFU) solution.  While it is
possible the user verifies the certificate matches expectations, this seldom occurs. The
certificate warnings are normalized by users which weakens security overall.</t>
        <t>R-REDUCE-CA: yes, public CA's are not used at all.</t>
        <t>R-ELIMINATE-CA: yes</t>
        <t>Existing clients support self-signed certificates fairly well, but the
user experience with clients is poor: some clients can't remember to
trust a certificate and clicking through certificate warnings will
become normalized.</t>
        <t>Modifying self-signed certificate handling for ".local" <xref target="RFC6761"/>
or ".internal" <xref target="I-D.davies-internal-tld"/> might be worth further
study.</t>
        <dl>
          <dt>R-SUPPORT-CA:</dt>
          <dd>
            <t>n/a, this system does not use Certification Authories at all.</t>
          </dd>
        </dl>
        <t>R-SUPPORT-CLIENT: Yes, but poor user experience.</t>
        <dl>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Yes, user can remove the certificate from list of authorized certificates.</t>
          </dd>
        </dl>
      </section>
      <section anchor="local-certification-authority">
        <name>Local Certification Authority</name>
        <t>One device within a home network would be a CA capable of signing certificates for other in-home
devices. The CA in that device would be limitied to signing only certificates belonging to
that home network (using Sections <xref format="counter" target="delegated"/> or <xref format="counter" target="name-constraints"/>).
This allows that device to sign certificates for other devices within the network such as
printers, IoT devices, NAS devices, laptops, or anything else needing to be a server
on the local network.</t>
        <ul empty="true">
          <li>
            <t>This feature is beyond the scope of the ADD working group but is
mentioned because it was suggested during an ADD meeting.</t>
          </li>
        </ul>
        <t>An example of such a system is <xref target="I-D.sweet-iot-acme"/>.</t>
        <dl>
          <dt>R-REDUCE-CA:</dt>
          <dd>
            <t>yes, it reduces interaction with public CAs but has same
number of interactions with the device operator's CA for the
device itself.  For other devices within the home network (e.g., printers), it
eliminates interaction with the vendor's CA.</t>
          </dd>
        </dl>
        <t>R-ELIMINATE-CA: no</t>
        <t>While technically the industry could build such a system, building such a system
across the ecosystem of client operating systems would be a daunting task.</t>
        <t>R-SUPPORT-CA: yes</t>
        <dl>
          <dt>R-SUPPORT-CLIENT:</dt>
          <dd>
            <t>yes, if the clients add the home's CA to their trust list.</t>
          </dd>
          <dt>R-REVOKE-AUTH:</dt>
          <dd>
            <t>Yes, user can update CRL on local certificate authority device, and clients
can retrieve the updated CRL.</t>
          </dd>
        </dl>
      </section>
      <section anchor="matter">
        <name>Matter</name>
        <t>Home devices could be enrolled in <xref target="Matter"/> and client devices could
be configured to trust Matter certificates.</t>
        <dl>
          <dt>R-REDUCE-CA:</dt>
          <dd>
            <t>yes, it reduces interaction with public CAs but has same
number of interactions with the device vendor's CA to issue the
Matter Device Attestation Certificate (DAC) to each device.</t>
          </dd>
        </dl>
        <t>R-ELIMINATE-CA: no</t>
        <t>R-SUPPORT-CA: yes</t>
        <dl>
          <dt>R-SUPPORT-CLIENT:</dt>
          <dd>
            <t>yes, if the clients add the Matter Product Attestation Intermediates (PAIs) to their trust list.</t>
          </dd>
        </dl>
        <t>R-REVOKE-AUTH: Yes</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="Matter" target="https://csa-iot.org/all-solutions/matter/">
          <front>
            <title>Matter: The Foundation for Connected Things</title>
            <author>
              <organization>Connectivity Standards Alliance</organization>
            </author>
            <date year="2023" month="October"/>
          </front>
          <seriesInfo name="Version" value="1.2"/>
        </reference>
        <reference anchor="ACME">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="https-local-dom" target="https://docs.google.com/document/d/170rFC91jqvpFrKIqG4K8Vox8AL4LeQXzfikBQXYPmzU">
          <front>
            <title>HTTPS for Local Domains</title>
            <author initials="M." surname="Thomson" fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity. However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise. This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
        <reference anchor="I-D.davies-internal-tld">
          <front>
            <title>A Top-level Domain for Private Use</title>
            <author fullname="Kim Davies" initials="K." surname="Davies">
              <organization>Internet Assigned Numbers Authority</organization>
            </author>
            <author fullname="Andrew McConachie" initials="A." surname="McConachie">
              <organization>Internet Corporation for Assigned Names and Numbers</organization>
            </author>
            <date day="2" month="August" year="2024"/>
            <abstract>
              <t>   This document describes the reservation of the ".internal" top-level
   domain for use in private applications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-davies-internal-tld-00"/>
        </reference>
        <reference anchor="I-D.sweet-iot-acme">
          <front>
            <title>ACME-Based Provisioning of IoT Devices</title>
            <author fullname="Michael Sweet" initials="M." surname="Sweet">
              <organization>Lakeside Robotics Corporation</organization>
            </author>
            <date day="9" month="August" year="2024"/>
            <abstract>
              <t>   This document extends the Automatic Certificate Management
   Environment (ACME) [RFC8555] to provision X.509 certificates for
   local Internet of Things (IoT) devices that are accepted by existing
   web browsers and other software running on End User client devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sweet-iot-acme-06"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.reddy-add-delegated-credentials">
          <front>
            <title>Delegated Credentials to Host Encrypted DNS Forwarders on CPEs</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Shashank Jain" initials="S." surname="Jain">
              <organization>McAfee</organization>
            </author>
            <date day="1" month="December" year="2023"/>
            <abstract>
              <t>   An encrypted DNS server is authenticated by a certificate signed by a
   Certificate Authority (CA).  However, for typical encrypted DNS
   server deployments on Customer Premise Equipment (CPEs), the
   signature cannot be obtained or requires excessive interactions with
   a Certificate Authority.

   This document explores the use of TLS delegated credentials for a DNS
   server deployed on a CPE.  This approach is meant to ease operating
   DNS forwarders in CPEs while allowing to make use of encrypted DNS
   capabilities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-add-delegated-credentials-03"/>
        </reference>
      </references>
    </references>
    <?line 455?>

<section anchor="example-of-delegated-certificate-issuance">
      <name>Example of Delegated Certificate Issuance</name>
      <t>Let's consider that the customer router, needing a certificate for
   its HTTPS-based management, is provisioned by a service (e.g., ACS)
   in the operator's network. Also, let's assume that each CPE is
   assigned a unique FQDN (e.g., "cpe-12345.example.com" where 12345
   is a unique number).</t>
      <ul empty="true">
        <li>
          <t>It is best to ensure that such an FQDN does not carry any
   Personally Identifiable Information (PII) or device identification
   details like the customer number or device's serial number.</t>
        </li>
      </ul>
      <t>The CPE generates a public and private key-pair, builds a certificate signing
   request (CSR), and sends the CSR to a service in the operator
   managing the CPE.  Upon receipt of the CSR, the operator's service
   can utilize certificate management protocols like ACME <xref target="RFC8555"/> to automate
   certificate management functions such as domain validation procedure,
   certificate issuance, and certificate revocation.</t>
      <t>The challenge with this technique is that the service will have to
   communicate with the CA to issue certificates for millions of CPEs.
   If an external CA is unable to issue a certificate in time or replace
   an expired certificate, the service would no longer be able to
   present a valid certificate to a CPE.  When the service requests
   certificate issuance for a large number of subdomains (e.g., millions
   of CPEs), it may be treated as an attacker by the CA to overwhelm it.
   Furthermore, the short-lived certificates (e.g., certificates that
   expire after 90 days) issued by the CA will have to be renewed
   frequently.  With short-lived certificates, there is a smaller time
   window to renew a certificate and, therefore, a higher risk that a CA
   outage will negatively affect the uptime of the encrypted DNS
   forwarders on CPEs (and the services offered via these CPEs).</t>
      <t>These challenges can be addressed by using protocols like
   ACME to automate the certificate renewal process, ensuring certificates
   are renewed well before expiration. Additionally, incorporating another
   CA as a backup can provide redundancy and further mitigate the risk of
   outages. By having a secondary CA, the service can switch to the backup
   CA in case the primary CA is unavailable, thus maintaining continuous
   service availability and reducing the risk of service disruption.</t>
      <t>It offers the additional advantage of improving the security of
   Browser and CPE interactions. This ensures that HTTPS access to
   the CPE is possible, allowing the device administrator to securely
   communicate with and manage the CPE.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This draft is the result of discussions at IETF119 and IETF120 in the
ADD working group.  Thanks to all the participants at the microphone,
hallways, and mailing list.</t>
      <t>Thanks for suggestion from Glenn Deen to adjust focus to three device
classes and focus on all home servers suffering the same
authentication problem.</t>
      <dl>
        <dt>Acknowledgements from <xref target="I-D.reddy-add-delegated-credentials"/>:</dt>
        <dd>
          <t>Thanks to Neil Cook, Martin Thomson, Tommy Pauly, Benjamin Schwartz,
   and Michael Richardson for the discussion and comments.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
