| rfc8738xml2.original.xml | rfc8738.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="UTF-8"?> | <?xml version='1.0' encoding='utf-8'?> | |||
| <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" conse | |||
| <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 --> | nsus="true" docName="draft-ietf-acme-ip-08" indexInclude="true" ipr="trust200902 | |||
| " number="8738" prepTime="2020-02-28T19:14:01" scripts="Common,Latin" sortRefs=" | ||||
| <!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:la | |||
| ]> | ng="en"> | |||
| <link href="https://datatracker.ietf.org/doc/draft-ietf-acme-ip-08" rel="prev" | ||||
| <?rfc toc="yes"?> | /> | |||
| <?rfc sortrefs="yes"?> | <link href="https://dx.doi.org/10.17487/rfc8738" rel="alternate"/> | |||
| <?rfc symrefs="yes"?> | <link href="urn:issn:2070-1721" rel="alternate"/> | |||
| <rfc ipr="trust200902" docName="draft-ietf-acme-ip-08" category="std"> | ||||
| <front> | <front> | |||
| <title abbrev="ACME-IP">ACME IP Identifier Validation Extension</title> | <title abbrev="ACME-IP">Automated Certificate Management Environment (ACME) | |||
| IP Identifier Validation Extension</title> | ||||
| <seriesInfo name="RFC" value="8738" stream="IETF"/> | ||||
| <author initials="R.B." surname="Shoemaker" fullname="Roland Bracewell Shoem aker"> | <author initials="R.B." surname="Shoemaker" fullname="Roland Bracewell Shoem aker"> | |||
| <organization abbrev="ISRG">Internet Security Research Group</organization > | <organization abbrev="ISRG" showOnFrontPage="true">Internet Security Resea rch Group</organization> | |||
| <address> | <address> | |||
| <email>roland@letsencrypt.org</email> | <email>roland@letsencrypt.org</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date month="02" year="2020"/> | ||||
| <date year="2019" month="October" day="01"/> | <area>Security</area> | |||
| <area>General</area> | ||||
| <workgroup>ACME Working Group</workgroup> | <workgroup>ACME Working Group</workgroup> | |||
| <keyword>acme</keyword> | ||||
| <abstract> | <keyword>pki</keyword> | |||
| <abstract pn="section-abstract"> | ||||
| <t>This document specifies identifiers and challenges required to enable the Aut | <t pn="section-abstract-1">This document specifies identifiers and challen | |||
| omated Certificate Management Environment (ACME) to issue certificates for IP ad | ges required to enable the Automated Certificate Management Environment (ACME) t | |||
| dresses.</t> | o issue certificates for IP addresses.</t> | |||
| </abstract> | </abstract> | |||
| <boilerplate> | ||||
| <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc= | ||||
| "exclude" pn="section-boilerplate.1"> | ||||
| <name slugifiedName="name-status-of-this-memo">Status of This Memo</name | ||||
| > | ||||
| <t pn="section-boilerplate.1-1"> | ||||
| This is an Internet Standards Track document. | ||||
| </t> | ||||
| <t pn="section-boilerplate.1-2"> | ||||
| This document is a product of the Internet Engineering Task Force | ||||
| (IETF). It represents the consensus of the IETF community. It has | ||||
| received public review and has been approved for publication by | ||||
| the Internet Engineering Steering Group (IESG). Further | ||||
| information on Internet Standards is available in Section 2 of | ||||
| RFC 7841. | ||||
| </t> | ||||
| <t pn="section-boilerplate.1-3"> | ||||
| Information about the current status of this document, any | ||||
| errata, and how to provide feedback on it may be obtained at | ||||
| <eref target="https://www.rfc-editor.org/info/rfc8738" brackets="non | ||||
| e"/>. | ||||
| </t> | ||||
| </section> | ||||
| <section anchor="copyright" numbered="false" removeInRFC="false" toc="excl | ||||
| ude" pn="section-boilerplate.2"> | ||||
| <name slugifiedName="name-copyright-notice">Copyright Notice</name> | ||||
| <t pn="section-boilerplate.2-1"> | ||||
| Copyright (c) 2020 IETF Trust and the persons identified as the | ||||
| document authors. All rights reserved. | ||||
| </t> | ||||
| <t pn="section-boilerplate.2-2"> | ||||
| This document is subject to BCP 78 and the IETF Trust's Legal | ||||
| Provisions Relating to IETF Documents | ||||
| (<eref target="https://trustee.ietf.org/license-info" brackets="none | ||||
| "/>) in effect on the date of | ||||
| publication of this document. Please review these documents | ||||
| carefully, as they describe your rights and restrictions with | ||||
| respect to this document. Code Components extracted from this | ||||
| document must include Simplified BSD License text as described in | ||||
| Section 4.e of the Trust Legal Provisions and are provided without | ||||
| warranty as described in the Simplified BSD License. | ||||
| </t> | ||||
| </section> | ||||
| </boilerplate> | ||||
| <toc> | ||||
| <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" p | ||||
| n="section-toc.1"> | ||||
| <name slugifiedName="name-table-of-contents">Table of Contents</name> | ||||
| <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-to | ||||
| c.1-1"> | ||||
| <li pn="section-toc.1-1.1"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent | ||||
| ="1" format="counter" sectionFormat="of" target="section-1"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-introduction">Introductio | ||||
| n</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.2"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent | ||||
| ="2" format="counter" sectionFormat="of" target="section-2"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-terminology">Terminology< | ||||
| /xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.3"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent | ||||
| ="3" format="counter" sectionFormat="of" target="section-3"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-ip-identifier">IP Identif | ||||
| ier</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.4"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent | ||||
| ="4" format="counter" sectionFormat="of" target="section-4"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-identifier-validation-cha | ||||
| ll">Identifier Validation Challenges</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.5"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent | ||||
| ="5" format="counter" sectionFormat="of" target="section-5"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-http-challenge">HTTP Chal | ||||
| lenge</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.6"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent | ||||
| ="6" format="counter" sectionFormat="of" target="section-6"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-tls-with-application-laye | ||||
| r-">TLS with Application-Layer Protocol Negotiation (TLS ALPN) Challenge</xref>< | ||||
| /t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.7"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.7.1"><xref derivedContent | ||||
| ="7" format="counter" sectionFormat="of" target="section-7"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-dns-challenge">DNS Challe | ||||
| nge</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.8"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.8.1"><xref derivedContent | ||||
| ="8" format="counter" sectionFormat="of" target="section-8"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA | ||||
| Considerations</xref></t> | ||||
| <ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio | ||||
| n-toc.1-1.8.2"> | ||||
| <li pn="section-toc.1-1.8.2.1"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.8.2.1.1"><xref derive | ||||
| dContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>. <xre | ||||
| f derivedContent="" format="title" sectionFormat="of" target="name-identifier-ty | ||||
| pes">Identifier Types</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.8.2.2"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.8.2.2.1"><xref derive | ||||
| dContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>. <xre | ||||
| f derivedContent="" format="title" sectionFormat="of" target="name-challenge-typ | ||||
| es">Challenge Types</xref></t> | ||||
| </li> | ||||
| </ul> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.9"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.9.1"><xref derivedContent | ||||
| ="9" format="counter" sectionFormat="of" target="section-9"/>. <xref derivedCon | ||||
| tent="" format="title" sectionFormat="of" target="name-security-considerations"> | ||||
| Security Considerations</xref></t> | ||||
| <ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio | ||||
| n-toc.1-1.9.2"> | ||||
| <li pn="section-toc.1-1.9.2.1"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.9.2.1.1"><xref derive | ||||
| dContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>. <xre | ||||
| f derivedContent="" format="title" sectionFormat="of" target="name-certification | ||||
| -authority-ca-">Certification Authority (CA) Policy Considerations</xref></t> | ||||
| </li> | ||||
| </ul> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.10"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.10.1"><xref derivedConten | ||||
| t="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedC | ||||
| ontent="" format="title" sectionFormat="of" target="name-normative-references">N | ||||
| ormative References</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.11"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.11.1"><xref derivedConten | ||||
| t="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derived | ||||
| Content="" format="title" sectionFormat="of" target="name-acknowledgments">Ackno | ||||
| wledgments</xref></t> | ||||
| </li> | ||||
| <li pn="section-toc.1-1.12"> | ||||
| <t keepWithNext="true" pn="section-toc.1-1.12.1"><xref derivedConten | ||||
| t="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derived | ||||
| Content="" format="title" sectionFormat="of" target="name-authors-address">Autho | ||||
| r's Address</xref></t> | ||||
| </li> | ||||
| </ul> | ||||
| </section> | ||||
| </toc> | ||||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section anchor="introduction" numbered="true" toc="include" removeInRFC="fa | ||||
| <section anchor="introduction" title="Introduction"> | lse" pn="section-1"> | |||
| <name slugifiedName="name-introduction">Introduction</name> | ||||
| <t>The Automatic Certificate Management Environment (ACME) <xref target="RFC8555 | <t pn="section-1-1">The Automatic Certificate Management Environment (ACME | |||
| "/> only defines challenges for validating control of DNS host name identifiers, | ) <xref target="RFC8555" format="default" sectionFormat="of" derivedContent="RFC | |||
| which limits its use to being used for issuing certificates for DNS identifiers | 8555"/> only defines challenges for validating control of DNS host name identifi | |||
| . In order to allow validation of IPv4 and IPv6 identifiers for inclusion in X.5 | ers, which limits its use to being used for issuing certificates for DNS identif | |||
| 09 certificates, this document specifies how challenges defined in the original | iers. In order to allow validation of IPv4 and IPv6 identifiers for inclusion in | |||
| ACME specification and the TLS-ALPN extension specification <xref target="I-D.ie | X.509 certificates, this document specifies how challenges defined in the origi | |||
| tf-acme-tls-alpn"/> can be used to validate IP identifiers.</t> | nal ACME specification and the TLS-ALPN extension specification <xref target="RF | |||
| C8737" format="default" sectionFormat="of" derivedContent="RFC8737"/> can be use | ||||
| </section> | d to validate IP identifiers.</t> | |||
| <section anchor="terminology" title="Terminology"> | </section> | |||
| <section anchor="terminology" numbered="true" toc="include" removeInRFC="fal | ||||
| <t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, | se" pn="section-2"> | |||
| “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this d | <name slugifiedName="name-terminology">Terminology</name> | |||
| ocument are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <x | <t pn="section-2-1"> | |||
| ref target="RFC8174"/> when, and only when, they appear in all capitals, as show | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | |||
| n here.</t> | "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14> | |||
| ", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", | ||||
| </section> | "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
| <section anchor="ip-identifier" title="IP Identifier"> | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are | |||
| to be interpreted as described in BCP 14 <xref target="RFC2119" format="defa | ||||
| <t><xref target="RFC8555"/> only defines the identifier type “dns”, which is use | ult" sectionFormat="of" derivedContent="RFC2119"/> | |||
| d to refer to fully qualified domain names. If an ACME server wishes to request | <xref target="RFC8174" format="default" sectionFormat="of" derivedConten | |||
| proof that a user controls a IPv4 or IPv6 address, it MUST create an authorizati | t="RFC8174"/> when, and only when, they appear in all capitals, | |||
| on with the identifier type “ip”. The value field of the identifier MUST contain | as shown here. | |||
| the textual form of the address as defined in <xref target="RFC1123"/> Section | </t> | |||
| 2.1 for IPv4 and in <xref target="RFC5952"/> Section 4 for IPv6.</t> | </section> | |||
| <section anchor="ip-identifier" numbered="true" toc="include" removeInRFC="f | ||||
| <t>An identifier for the IPv6 address 2001:db8::1 would be formatted like so:</t | alse" pn="section-3"> | |||
| > | <name slugifiedName="name-ip-identifier">IP Identifier</name> | |||
| <t pn="section-3-1"><xref target="RFC8555" format="default" sectionFormat= | ||||
| <figure><artwork><![CDATA[ | "of" derivedContent="RFC8555"/> only defines the identifier | |||
| type "dns", which is used to refer to fully qualified domain names. If | ||||
| an ACME server wishes to request proof that a user controls an IPv4 or | ||||
| IPv6 address, it <bcp14>MUST</bcp14> create an authorization with the | ||||
| identifier type "ip". The value field of the identifier | ||||
| <bcp14>MUST</bcp14> contain the textual form of the address as defined | ||||
| in <xref target="RFC1123" sectionFormat="of" section="2.1" format="default | ||||
| " derivedLink="https://rfc-editor.org/rfc/rfc1123#section-2.1" derivedContent="R | ||||
| FC1123"/> for IPv4 and in | ||||
| <xref target="RFC5952" sectionFormat="of" section="4" format="default" der | ||||
| ivedLink="https://rfc-editor.org/rfc/rfc5952#section-4" derivedContent="RFC5952" | ||||
| /> for IPv6.</t> | ||||
| <t pn="section-3-2">An identifier for the IPv6 address 2001:db8::1 would b | ||||
| e formatted | ||||
| like so:</t> | ||||
| <sourcecode type="json" markers="false" pn="section-3-3"> | ||||
| {"type": "ip", "value": "2001:db8::1"} | {"type": "ip", "value": "2001:db8::1"} | |||
| ]]></artwork></figure> | </sourcecode> | |||
| </section> | ||||
| </section> | <section anchor="identifier-validation-challenges" numbered="true" toc="incl | |||
| <section anchor="identifier-validation-challenges" title="Identifier Validation | ude" removeInRFC="false" pn="section-4"> | |||
| Challenges"> | <name slugifiedName="name-identifier-validation-chall">Identifier Validati | |||
| on Challenges</name> | ||||
| <t>IP identifiers MAY be used with the existing “http-01” (see Section 8.3 of <x | <t pn="section-4-1">IP identifiers <bcp14>MAY</bcp14> be used with the exi | |||
| ref target="RFC8555"/>) and “tls-alpn-01” (see Section 3 of <xref target="I-D.ie | sting "http-01" | |||
| tf-acme-tls-alpn"/>). To use IP identifiers with these challenges, their initial | (see <xref target="RFC8555" sectionFormat="of" section="8.3" format="defau | |||
| DNS resolution step MUST be skipped, and the IP address used for validation MUS | lt" derivedLink="https://rfc-editor.org/rfc/rfc8555#section-8.3" derivedContent= | |||
| T be the value of the identifier.</t> | "RFC8555"/>) and | |||
| "tls-alpn-01" (see <xref target="RFC8737" sectionFormat="of" section="3" f | ||||
| </section> | ormat="default" derivedLink="https://rfc-editor.org/rfc/rfc8737#section-3" deriv | |||
| <section anchor="http-challenge" title="HTTP Challenge"> | edContent="RFC8737"/>). To use IP identifiers with these challenges, their | |||
| initial DNS resolution step <bcp14>MUST</bcp14> be skipped, and the IP | ||||
| <t>For the “http-01” challenge, the Host header field MUST be set to the IP addr | address used for validation <bcp14>MUST</bcp14> be the value of the | |||
| ess being used for validation per <xref target="RFC7230"/>. The textual form of | identifier.</t> | |||
| this address MUST be as defined in <xref target="RFC1123"/> Section 2.1 for IPv4 | </section> | |||
| and in <xref target="RFC5952"/> Section 4 for IPv6.</t> | <section anchor="http-challenge" numbered="true" toc="include" removeInRFC=" | |||
| false" pn="section-5"> | ||||
| </section> | <name slugifiedName="name-http-challenge">HTTP Challenge</name> | |||
| <section anchor="tls-with-application-level-protocol-negotiation-tls-alpn-challe | <t pn="section-5-1">For the "http-01" challenge, the Host header field | |||
| nge" title="TLS with Application Level Protocol Negotiation (TLS ALPN) Challenge | <bcp14>MUST</bcp14> be set to the IP address being used for validation | |||
| "> | per <xref target="RFC7230" format="default" sectionFormat="of" derivedCont | |||
| ent="RFC7230"/>. The textual form of this | ||||
| <t>For the “tls-alpn-01” challenge, the subjectAltName extension in the validati | address <bcp14>MUST</bcp14> be as defined in <xref target="RFC1123" sectio | |||
| on certificate MUST contain a single iPAddress that matches the address being va | nFormat="of" section="2.1" format="default" derivedLink="https://rfc-editor.org/ | |||
| lidated. As <xref target="RFC6066"/> does not permit IP addresses to be used in | rfc/rfc1123#section-2.1" derivedContent="RFC1123"/> for IPv4 and in <xref target | |||
| the SNI extension HostName field, the server MUST instead use the IN-ADDR.ARPA < | ="RFC5952" sectionFormat="of" section="4" format="default" derivedLink="https:// | |||
| xref target="RFC1034"/> or IP6.ARPA <xref target="RFC3596"/> reverse mapping of | rfc-editor.org/rfc/rfc5952#section-4" derivedContent="RFC5952"/> for IPv6.</t> | |||
| the IP address as the HostName field value instead of the IP address string repr | </section> | |||
| esentation itself. For example, if the IP address being validated is 2001:db8::1 | <section anchor="tls-with-application-level-protocol-negotiation-tls-alpn-ch | |||
| , the SNI HostName field should contain “1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 | allenge" numbered="true" toc="include" removeInRFC="false" pn="section-6"> | |||
| .0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa”.</t> | <name slugifiedName="name-tls-with-application-layer-">TLS with Applicatio | |||
| n-Layer Protocol Negotiation (TLS ALPN) Challenge</name> | ||||
| </section> | <t pn="section-6-1">For the "tls-alpn-01" challenge, the subjectAltName ex | |||
| <section anchor="dns-challenge" title="DNS Challenge"> | tension in the | |||
| validation certificate <bcp14>MUST</bcp14> contain a single iPAddress | ||||
| <t>The existing “dns-01” challenge MUST NOT be used to validate IP identifiers.< | that matches the address being validated. As <xref target="RFC6066" format | |||
| /t> | ="default" sectionFormat="of" derivedContent="RFC6066"/> does not permit IP addr | |||
| esses to be used in the Server | ||||
| </section> | Name Indication (SNI) extension HostName field, the server | |||
| <section anchor="iana-considerations" title="IANA Considerations"> | <bcp14>MUST</bcp14> instead use the IN-ADDR.ARPA <xref target="RFC1034" fo | |||
| rmat="default" sectionFormat="of" derivedContent="RFC1034"/> or IP6.ARPA <xref t | ||||
| <section anchor="identifier-types" title="Identifier Types"> | arget="RFC3596" format="default" sectionFormat="of" derivedContent="RFC3596"/> | |||
| reverse mapping of the IP address as the HostName field value instead of | ||||
| <t>Adds a new type to the “ACME Identifier Types” registry defined in Section 9. | the IP address string representation itself. For example, if the IP | |||
| 7.7 of <xref target="RFC8555"/> with Label “ip” and Reference “I-D.ietf-acme-ip” | address being validated is 2001:db8::1, the SNI HostName field should | |||
| .</t> | contain | |||
| "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa".</t> | ||||
| </section> | </section> | |||
| <section anchor="challenge-types" title="Challenge Types"> | <section anchor="dns-challenge" numbered="true" toc="include" removeInRFC="f | |||
| alse" pn="section-7"> | ||||
| <t>Adds two new entries to the “ACME Validation Methods” registry defined in Sec | <name slugifiedName="name-dns-challenge">DNS Challenge</name> | |||
| tion 9.7.8 of <xref target="RFC8555"/>. These entries are defined below:</t> | <t pn="section-7-1">The existing "dns-01" challenge <bcp14>MUST NOT</bcp14 | |||
| > be used to validate IP identifiers.</t> | ||||
| <texttable> | </section> | |||
| <ttcol align='left'>Label</ttcol> | <section anchor="iana-considerations" numbered="true" toc="include" removeIn | |||
| <ttcol align='left'>Identifier Type</ttcol> | RFC="false" pn="section-8"> | |||
| <ttcol align='left'>ACME</ttcol> | <name slugifiedName="name-iana-considerations">IANA Considerations</name> | |||
| <ttcol align='left'>Reference</ttcol> | <section anchor="identifier-types" numbered="true" toc="include" removeInR | |||
| <c>http-01</c> | FC="false" pn="section-8.1"> | |||
| <c>ip</c> | <name slugifiedName="name-identifier-types">Identifier Types</name> | |||
| <c>Y</c> | <t pn="section-8.1-1">Per this document, a new type has been added to th | |||
| <c>I-D.ietf-acme-ip</c> | e "ACME Identifier Types" | |||
| <c>tls-alpn-01</c> | registry defined in <xref target="RFC8555" sectionFormat="of" section="9. | |||
| <c>ip</c> | 7.7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8555#section-9. | |||
| <c>Y</c> | 7.7" derivedContent="RFC8555"/> with Label "ip" and Reference | |||
| <c>I-D.ietf-acme-ip</c> | "RFC 8738".</t> | |||
| </texttable> | </section> | |||
| <section anchor="challenge-types" numbered="true" toc="include" removeInRF | ||||
| </section> | C="false" pn="section-8.2"> | |||
| </section> | <name slugifiedName="name-challenge-types">Challenge Types</name> | |||
| <section anchor="security-considerations" title="Security Considerations"> | <t pn="section-8.2-1">Per this document, two new entries have been added | |||
| to the "ACME Validation Methods" | ||||
| <t>The extensions to ACME described in this document do not deviate from the bro | registry defined in <xref target="RFC8555" sectionFormat="of" section="9. | |||
| ader threat model described in <xref target="RFC8555"/> Section 10.1.</t> | 7.8" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8555#section-9. | |||
| 7.8" derivedContent="RFC8555"/>. These entries are defined below:</t> | ||||
| <section anchor="ca-policy-considerations" title="CA Policy Considerations"> | <table align="center" pn="table-1"> | |||
| <thead> | ||||
| <t>This document only specifies how a ACME server may validate that a certificat | <tr> | |||
| e applicant controls a IP identifier at the time of validation. The CA may wish | <th align="left" colspan="1" rowspan="1">Label</th> | |||
| to perform additional checks not specified in this document. For example, if the | <th align="left" colspan="1" rowspan="1">Identifier Type</th> | |||
| CA believes an IP identifier belongs to a ISP or cloud service provider with sh | <th align="left" colspan="1" rowspan="1">ACME</th> | |||
| ort delegation periods, they may wish to impose additional restrictions on certi | <th align="left" colspan="1" rowspan="1">Reference</th> | |||
| ficates requested for that identifier.</t> | </tr> | |||
| </thead> | ||||
| </section> | <tbody> | |||
| </section> | <tr> | |||
| <section anchor="acknowledgments" title="Acknowledgments"> | <td align="left" colspan="1" rowspan="1">http-01</td> | |||
| <td align="left" colspan="1" rowspan="1">ip</td> | ||||
| <t>The author would like to thank those who contributed to this document and off | <td align="left" colspan="1" rowspan="1">Y</td> | |||
| ered editorial and technical input, especially Jacob Hoffman-Andrews and Daniel | <td align="left" colspan="1" rowspan="1">RFC 8738</td> | |||
| McCarney.</t> | </tr> | |||
| <tr> | ||||
| </section> | <td align="left" colspan="1" rowspan="1">tls-alpn-01</td> | |||
| <td align="left" colspan="1" rowspan="1">ip</td> | ||||
| <td align="left" colspan="1" rowspan="1">Y</td> | ||||
| <td align="left" colspan="1" rowspan="1">RFC 8738</td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| </section> | ||||
| </section> | ||||
| <section anchor="security-considerations" numbered="true" toc="include" remo | ||||
| veInRFC="false" pn="section-9"> | ||||
| <name slugifiedName="name-security-considerations">Security Considerations | ||||
| </name> | ||||
| <t pn="section-9-1">The extensions to ACME described in this document do n | ||||
| ot deviate from | ||||
| the broader threat model described in <xref target="RFC8555" sectionFormat | ||||
| ="of" section="10.1" format="default" derivedLink="https://rfc-editor.org/rfc/rf | ||||
| c8555#section-10.1" derivedContent="RFC8555"/>.</t> | ||||
| <section anchor="ca-policy-considerations" numbered="true" toc="include" r | ||||
| emoveInRFC="false" pn="section-9.1"> | ||||
| <name slugifiedName="name-certification-authority-ca-">Certification Aut | ||||
| hority (CA) Policy Considerations</name> | ||||
| <t pn="section-9.1-1">This document only specifies how an ACME server ma | ||||
| y validate that a | ||||
| certificate applicant controls an IP identifier at the time of | ||||
| validation. The CA may wish to perform additional checks not specified | ||||
| in this document. For example, if the CA believes an IP identifier | ||||
| belongs to an ISP or cloud service provider with short delegation | ||||
| periods, they may wish to impose additional restrictions on | ||||
| certificates requested for that identifier.</t> | ||||
| </section> | ||||
| </section> | ||||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references pn="section-10"> | ||||
| <references title='Normative References'> | <name slugifiedName="name-normative-references">Normative References</name | |||
| > | ||||
| <reference anchor="RFC1034" target='https://www.rfc-editor.org/info/rfc1034'> | <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc103 | |||
| <front> | 4" quoteTitle="true" derivedAnchor="RFC1034"> | |||
| <title>Domain names - concepts and facilities</title> | <front> | |||
| <author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organ | <title>Domain names - concepts and facilities</title> | |||
| ization /></author> | <author initials="P.V." surname="Mockapetris" fullname="P.V. Mockapetr | |||
| <date year='1987' month='November' /> | is"> | |||
| <abstract><t>This RFC is the revised basic definition of The Domain Name System. | <organization showOnFrontPage="true"/> | |||
| It obsoletes RFC-882. This memo describes the domain style names and their us | </author> | |||
| ed for host address look up and electronic mail forwarding. It discusses the cl | <date year="1987" month="November"/> | |||
| ients and servers in the domain name system and the protocol used between them.< | <abstract> | |||
| /t></abstract> | <t>This RFC is the revised basic definition of The Domain Name Syste | |||
| </front> | m. It obsoletes RFC-882. This memo describes the domain style names and their | |||
| <seriesInfo name='STD' value='13'/> | used for host address look up and electronic mail forwarding. It discusses the | |||
| <seriesInfo name='RFC' value='1034'/> | clients and servers in the domain name system and the protocol used between them | |||
| <seriesInfo name='DOI' value='10.17487/RFC1034'/> | .</t> | |||
| </reference> | </abstract> | |||
| </front> | ||||
| <reference anchor="RFC1123" target='https://www.rfc-editor.org/info/rfc1123'> | <seriesInfo name="STD" value="13"/> | |||
| <front> | <seriesInfo name="RFC" value="1034"/> | |||
| <title>Requirements for Internet Hosts - Application and Support</title> | <seriesInfo name="DOI" value="10.17487/RFC1034"/> | |||
| <author initials='R.' surname='Braden' fullname='R. Braden' role='editor'><organ | </reference> | |||
| ization /></author> | <reference anchor="RFC1123" target="https://www.rfc-editor.org/info/rfc112 | |||
| <date year='1989' month='October' /> | 3" quoteTitle="true" derivedAnchor="RFC1123"> | |||
| <abstract><t>This RFC is an official specification for the Internet community. | <front> | |||
| It incorporates by reference, amends, corrects, and supplements the primary prot | <title>Requirements for Internet Hosts - Application and Support</titl | |||
| ocol standards documents relating to hosts. [STANDARDS-TRACK]</t></abstract> | e> | |||
| </front> | <author initials="R." surname="Braden" fullname="R. Braden" role="edit | |||
| <seriesInfo name='STD' value='3'/> | or"> | |||
| <seriesInfo name='RFC' value='1123'/> | <organization showOnFrontPage="true"/> | |||
| <seriesInfo name='DOI' value='10.17487/RFC1123'/> | </author> | |||
| </reference> | <date year="1989" month="October"/> | |||
| <abstract> | ||||
| <reference anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'> | <t>This RFC is an official specification for the Internet community. | |||
| <front> | It incorporates by reference, amends, corrects, and supplements the primary pr | |||
| <title>Key words for use in RFCs to Indicate Requirement Levels</title> | otocol standards documents relating to hosts. [STANDARDS-TRACK]</t> | |||
| <author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></ | </abstract> | |||
| author> | </front> | |||
| <date year='1997' month='March' /> | <seriesInfo name="STD" value="3"/> | |||
| <abstract><t>In many standards track documents several words are used to signify | <seriesInfo name="RFC" value="1123"/> | |||
| the requirements in the specification. These words are often capitalized. This | <seriesInfo name="DOI" value="10.17487/RFC1123"/> | |||
| document defines these words as they should be interpreted in IETF documents. | </reference> | |||
| This document specifies an Internet Best Current Practices for the Internet Comm | <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc211 | |||
| unity, and requests discussion and suggestions for improvements.</t></abstract> | 9" quoteTitle="true" derivedAnchor="RFC2119"> | |||
| </front> | <front> | |||
| <seriesInfo name='BCP' value='14'/> | <title>Key words for use in RFCs to Indicate Requirement Levels</title | |||
| <seriesInfo name='RFC' value='2119'/> | > | |||
| <seriesInfo name='DOI' value='10.17487/RFC2119'/> | <author initials="S." surname="Bradner" fullname="S. Bradner"> | |||
| </reference> | <organization showOnFrontPage="true"/> | |||
| </author> | ||||
| <reference anchor="RFC3596" target='https://www.rfc-editor.org/info/rfc3596'> | <date year="1997" month="March"/> | |||
| <front> | <abstract> | |||
| <title>DNS Extensions to Support IP Version 6</title> | <t>In many standards track documents several words are used to signi | |||
| <author initials='S.' surname='Thomson' fullname='S. Thomson'><organization /></ | fy the requirements in the specification. These words are often capitalized. Th | |||
| author> | is document defines these words as they should be interpreted in IETF documents. | |||
| <author initials='C.' surname='Huitema' fullname='C. Huitema'><organization /></ | This document specifies an Internet Best Current Practices for the Internet Co | |||
| author> | mmunity, and requests discussion and suggestions for improvements.</t> | |||
| <author initials='V.' surname='Ksinant' fullname='V. Ksinant'><organization /></ | </abstract> | |||
| author> | </front> | |||
| <author initials='M.' surname='Souissi' fullname='M. Souissi'><organization /></ | <seriesInfo name="BCP" value="14"/> | |||
| author> | <seriesInfo name="RFC" value="2119"/> | |||
| <date year='2003' month='October' /> | <seriesInfo name="DOI" value="10.17487/RFC2119"/> | |||
| <abstract><t>This document defines the changes that need to be made to the Domai | </reference> | |||
| n Name System (DNS) to support hosts running IP version 6 (IPv6). The changes i | <reference anchor="RFC3596" target="https://www.rfc-editor.org/info/rfc359 | |||
| nclude a resource record type to store an IPv6 address, a domain to support look | 6" quoteTitle="true" derivedAnchor="RFC3596"> | |||
| ups based on an IPv6 address, and updated definitions of existing query types th | <front> | |||
| at return Internet addresses as part of additional section processing. The exte | <title>DNS Extensions to Support IP Version 6</title> | |||
| nsions are designed to be compatible with existing applications and, in particul | <author initials="S." surname="Thomson" fullname="S. Thomson"> | |||
| ar, DNS implementations themselves. [STANDARDS-TRACK]</t></abstract> | <organization showOnFrontPage="true"/> | |||
| </front> | </author> | |||
| <seriesInfo name='STD' value='88'/> | <author initials="C." surname="Huitema" fullname="C. Huitema"> | |||
| <seriesInfo name='RFC' value='3596'/> | <organization showOnFrontPage="true"/> | |||
| <seriesInfo name='DOI' value='10.17487/RFC3596'/> | </author> | |||
| </reference> | <author initials="V." surname="Ksinant" fullname="V. Ksinant"> | |||
| <organization showOnFrontPage="true"/> | ||||
| <reference anchor="RFC5952" target='https://www.rfc-editor.org/info/rfc5952'> | </author> | |||
| <front> | <author initials="M." surname="Souissi" fullname="M. Souissi"> | |||
| <title>A Recommendation for IPv6 Address Text Representation</title> | <organization showOnFrontPage="true"/> | |||
| <author initials='S.' surname='Kawamura' fullname='S. Kawamura'><organization /> | </author> | |||
| </author> | <date year="2003" month="October"/> | |||
| <author initials='M.' surname='Kawashima' fullname='M. Kawashima'><organization | <abstract> | |||
| /></author> | <t>This document defines the changes that need to be made to the Dom | |||
| <date year='2010' month='August' /> | ain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes | |||
| <abstract><t>As IPv6 deployment increases, there will be a dramatic increase in | include a resource record type to store an IPv6 address, a domain to support lo | |||
| the need to use IPv6 addresses in text. While the IPv6 address architecture in | okups based on an IPv6 address, and updated definitions of existing query types | |||
| Section 2.2 of RFC 4291 describes a flexible model for text representation of an | that return Internet addresses as part of additional section processing. The ex | |||
| IPv6 address, this flexibility has been causing problems for operators, system | tensions are designed to be compatible with existing applications and, in partic | |||
| engineers, and users. This document defines a canonical textual representation | ular, DNS implementations themselves. [STANDARDS-TRACK]</t> | |||
| format. It does not define a format for internal storage, such as within an app | </abstract> | |||
| lication or database. It is expected that the canonical format will be followed | </front> | |||
| by humans and systems when representing IPv6 addresses as text, but all impleme | <seriesInfo name="STD" value="88"/> | |||
| ntations must accept and be able to handle any legitimate RFC 4291 format. [STA | <seriesInfo name="RFC" value="3596"/> | |||
| NDARDS-TRACK]</t></abstract> | <seriesInfo name="DOI" value="10.17487/RFC3596"/> | |||
| </front> | </reference> | |||
| <seriesInfo name='RFC' value='5952'/> | <reference anchor="RFC5952" target="https://www.rfc-editor.org/info/rfc595 | |||
| <seriesInfo name='DOI' value='10.17487/RFC5952'/> | 2" quoteTitle="true" derivedAnchor="RFC5952"> | |||
| </reference> | <front> | |||
| <title>A Recommendation for IPv6 Address Text Representation</title> | ||||
| <reference anchor="RFC6066" target='https://www.rfc-editor.org/info/rfc6066'> | <author initials="S." surname="Kawamura" fullname="S. Kawamura"> | |||
| <front> | <organization showOnFrontPage="true"/> | |||
| <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title> | </author> | |||
| <author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organiz | <author initials="M." surname="Kawashima" fullname="M. Kawashima"> | |||
| ation /></author> | <organization showOnFrontPage="true"/> | |||
| <date year='2011' month='January' /> | </author> | |||
| <abstract><t>This document provides specifications for existing TLS extensions. | <date year="2010" month="August"/> | |||
| It is a companion document for RFC 5246, "The Transport Layer Security (TL | <abstract> | |||
| S) Protocol Version 1.2". The extensions specified are server_name, max_fr | <t>As IPv6 deployment increases, there will be a dramatic increase i | |||
| agment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and stat | n the need to use IPv6 addresses in text. While the IPv6 address architecture i | |||
| us_request. [STANDARDS-TRACK]</t></abstract> | n Section 2.2 of RFC 4291 describes a flexible model for text representation of | |||
| </front> | an IPv6 address, this flexibility has been causing problems for operators, syste | |||
| <seriesInfo name='RFC' value='6066'/> | m engineers, and users. This document defines a canonical textual representatio | |||
| <seriesInfo name='DOI' value='10.17487/RFC6066'/> | n format. It does not define a format for internal storage, such as within an a | |||
| </reference> | pplication or database. It is expected that the canonical format will be follow | |||
| ed by humans and systems when representing IPv6 addresses as text, but all imple | ||||
| <reference anchor="RFC7230" target='https://www.rfc-editor.org/info/rfc7230'> | mentations must accept and be able to handle any legitimate RFC 4291 format. [S | |||
| <front> | TANDARDS-TRACK]</t> | |||
| <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title | </abstract> | |||
| > | </front> | |||
| <author initials='R.' surname='Fielding' fullname='R. Fielding' role='editor'><o | <seriesInfo name="RFC" value="5952"/> | |||
| rganization /></author> | <seriesInfo name="DOI" value="10.17487/RFC5952"/> | |||
| <author initials='J.' surname='Reschke' fullname='J. Reschke' role='editor'><org | </reference> | |||
| anization /></author> | <reference anchor="RFC6066" target="https://www.rfc-editor.org/info/rfc606 | |||
| <date year='2014' month='June' /> | 6" quoteTitle="true" derivedAnchor="RFC6066"> | |||
| <abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless application-l | <front> | |||
| evel protocol for distributed, collaborative, hypertext information systems. Th | <title>Transport Layer Security (TLS) Extensions: Extension Definition | |||
| is document provides an overview of HTTP architecture and its associated termino | s</title> | |||
| logy, defines the "http" and "https" Uniform Resource Identi | <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd | |||
| fier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements | "> | |||
| , and describes related security concerns for implementations.</t></abstract> | <organization showOnFrontPage="true"/> | |||
| </front> | </author> | |||
| <seriesInfo name='RFC' value='7230'/> | <date year="2011" month="January"/> | |||
| <seriesInfo name='DOI' value='10.17487/RFC7230'/> | <abstract> | |||
| </reference> | <t>This document provides specifications for existing TLS extensions | |||
| . It is a companion document for RFC 5246, "The Transport Layer Security (TLS) | ||||
| <reference anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'> | Protocol Version 1.2". The extensions specified are server_name, max_fragment_l | |||
| <front> | ength, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_reque | |||
| <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title> | st. [STANDARDS-TRACK]</t> | |||
| <author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></auth | </abstract> | |||
| or> | </front> | |||
| <date year='2017' month='May' /> | <seriesInfo name="RFC" value="6066"/> | |||
| <abstract><t>RFC 2119 specifies common key words that may be used in protocol s | <seriesInfo name="DOI" value="10.17487/RFC6066"/> | |||
| pecifications. This document aims to reduce the ambiguity by clarifying that on | </reference> | |||
| ly UPPERCASE usage of the key words have the defined special meanings.</t></abs | <reference anchor="RFC7230" target="https://www.rfc-editor.org/info/rfc723 | |||
| tract> | 0" quoteTitle="true" derivedAnchor="RFC7230"> | |||
| </front> | <front> | |||
| <seriesInfo name='BCP' value='14'/> | <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Rout | |||
| <seriesInfo name='RFC' value='8174'/> | ing</title> | |||
| <seriesInfo name='DOI' value='10.17487/RFC8174'/> | <author initials="R." surname="Fielding" fullname="R. Fielding" role=" | |||
| </reference> | editor"> | |||
| <organization showOnFrontPage="true"/> | ||||
| <reference anchor="RFC8555" target='https://www.rfc-editor.org/info/rfc8555'> | </author> | |||
| <front> | <author initials="J." surname="Reschke" fullname="J. Reschke" role="ed | |||
| <title>Automatic Certificate Management Environment (ACME)</title> | itor"> | |||
| <author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></au | <organization showOnFrontPage="true"/> | |||
| thor> | </author> | |||
| <author initials='J.' surname='Hoffman-Andrews' fullname='J. Hoffman-Andrews'><o | <date year="2014" month="June"/> | |||
| rganization /></author> | <abstract> | |||
| <author initials='D.' surname='McCarney' fullname='D. McCarney'><organization /> | <t>The Hypertext Transfer Protocol (HTTP) is a stateless application | |||
| </author> | -level protocol for distributed, collaborative, hypertext information systems. | |||
| <author initials='J.' surname='Kasten' fullname='J. Kasten'><organization /></au | This document provides an overview of HTTP architecture and its associated termi | |||
| thor> | nology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes | |||
| <date year='2019' month='March' /> | , defines the HTTP/1.1 message syntax and parsing requirements, and describes re | |||
| <abstract><t>Public Key Infrastructure using X.509 (PKIX) certificates are used | lated security concerns for implementations.</t> | |||
| for a number of purposes, the most significant of which is the authentication of | </abstract> | |||
| domain names. Thus, certification authorities (CAs) in the Web PKI are trusted | </front> | |||
| to verify that an applicant for a certificate legitimately represents the domai | <seriesInfo name="RFC" value="7230"/> | |||
| n name(s) in the certificate. As of this writing, this verification is done thr | <seriesInfo name="DOI" value="10.17487/RFC7230"/> | |||
| ough a collection of ad hoc mechanisms. This document describes a protocol that | </reference> | |||
| a CA and an applicant can use to automate the process of verification and certi | <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc817 | |||
| ficate issuance. The protocol also provides facilities for other certificate ma | 4" quoteTitle="true" derivedAnchor="RFC8174"> | |||
| nagement functions, such as certificate revocation.</t></abstract> | <front> | |||
| </front> | <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</titl | |||
| <seriesInfo name='RFC' value='8555'/> | e> | |||
| <seriesInfo name='DOI' value='10.17487/RFC8555'/> | <author initials="B." surname="Leiba" fullname="B. Leiba"> | |||
| </reference> | <organization showOnFrontPage="true"/> | |||
| </author> | ||||
| <reference anchor="I-D.ietf-acme-tls-alpn"> | <date year="2017" month="May"/> | |||
| <front> | <abstract> | |||
| <title>ACME TLS ALPN Challenge Extension</title> | <t>RFC 2119 specifies common key words that may be used in protocol | |||
| specifications. This document aims to reduce the ambiguity by clarifying that | ||||
| <author initials='R' surname='Shoemaker' fullname='Roland Shoemaker'> | only UPPERCASE usage of the key words have the defined special meanings.</t> | |||
| <organization /> | </abstract> | |||
| </author> | </front> | |||
| <seriesInfo name="BCP" value="14"/> | ||||
| <date month='September' day='5' year='2019' /> | <seriesInfo name="RFC" value="8174"/> | |||
| <seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
| <abstract><t>This document specifies a new challenge for the Automated Certifica | </reference> | |||
| te Management Environment (ACME) protocol which allows for domain control valida | <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc855 | |||
| tion using TLS.</t></abstract> | 5" quoteTitle="true" derivedAnchor="RFC8555"> | |||
| <front> | ||||
| </front> | <title>Automatic Certificate Management Environment (ACME)</title> | |||
| <author initials="R." surname="Barnes" fullname="R. Barnes"> | ||||
| <seriesInfo name='Internet-Draft' value='draft-ietf-acme-tls-alpn-06' /> | <organization showOnFrontPage="true"/> | |||
| <format type='TXT' | </author> | |||
| target='http://www.ietf.org/internet-drafts/draft-ietf-acme-tls-alpn-06. | <author initials="J." surname="Hoffman-Andrews" fullname="J. Hoffman-A | |||
| txt' /> | ndrews"> | |||
| </reference> | <organization showOnFrontPage="true"/> | |||
| </author> | ||||
| <author initials="D." surname="McCarney" fullname="D. McCarney"> | ||||
| <organization showOnFrontPage="true"/> | ||||
| </author> | ||||
| <author initials="J." surname="Kasten" fullname="J. Kasten"> | ||||
| <organization showOnFrontPage="true"/> | ||||
| </author> | ||||
| <date year="2019" month="March"/> | ||||
| <abstract> | ||||
| <t>Public Key Infrastructure using X.509 (PKIX) certificates are use | ||||
| d for a number of purposes, the most significant of which is the authentication | ||||
| of domain names. Thus, certification authorities (CAs) in the Web PKI are trust | ||||
| ed to verify that an applicant for a certificate legitimately represents the dom | ||||
| ain name(s) in the certificate. As of this writing, this verification is done t | ||||
| hrough a collection of ad hoc mechanisms. This document describes a protocol th | ||||
| at a CA and an applicant can use to automate the process of verification and cer | ||||
| tificate issuance. The protocol also provides facilities for other certificate | ||||
| management functions, such as certificate revocation.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="8555"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8555"/> | ||||
| </reference> | ||||
| <reference anchor="RFC8737" target="https://www.rfc-editor.org/info/rfc873 | ||||
| 7" quoteTitle="true" derivedAnchor="RFC8737"> | ||||
| <front> | ||||
| <title>Automated Certificate Management Environment (ACME) TLS Applica | ||||
| tion-Layer Protocol Negotiation (ALPN) Challenge Extension</title> | ||||
| <author initials="R.B." surname="Shoemaker" fullname="Roland Bracewell | ||||
| Shoemaker"> | ||||
| <organization showOnFrontPage="true"/> | ||||
| </author> | ||||
| <date month="February" year="2020"/> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="8737"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8737"/> | ||||
| </reference> | ||||
| </references> | </references> | |||
| <section anchor="acknowledgments" numbered="false" toc="include" removeInRFC | ||||
| ="false" pn="section-appendix.a"> | ||||
| <name slugifiedName="name-acknowledgments">Acknowledgments</name> | ||||
| <t pn="section-appendix.a-1">The author would like to thank those who cont | ||||
| ributed to this document | ||||
| and offered editorial and technical input, especially | ||||
| <contact fullname="Jacob Hoffman-Andrews"/> and <contact fullname="Daniel McCarn | ||||
| ey"/>.</t> | ||||
| </section> | ||||
| <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc | ||||
| ="include" pn="section-appendix.b"> | ||||
| <name slugifiedName="name-authors-address">Author's Address</name> | ||||
| <author initials="R.B." surname="Shoemaker" fullname="Roland Bracewell Sho | ||||
| emaker"> | ||||
| <organization abbrev="ISRG" showOnFrontPage="true">Internet Security Res | ||||
| earch Group</organization> | ||||
| <address> | ||||
| <email>roland@letsencrypt.org</email> | ||||
| </address> | ||||
| </author> | ||||
| </section> | ||||
| </back> | </back> | |||
| <!-- ##markdown-source: | ||||
| H4sIALyOk10AA7VYUXPbuBF+569AlZdkxuJYduzYeqpi+xLd2LIqO21vOp0O | ||||
| REIiagrgAZAV1fb99vsWAClS9s1cHqpMIogkFrvffvvtMv1+P3HSlWLIeqOL | ||||
| mys2nrJxLpSTCykM+zsvZc6d1IpdfXdCWax6CZ/PjXgcMtrQH0+TXGeKr2Ai | ||||
| N3zh+lK4RZ9nK9GXVf/wLMm4E0tttkNmXZ4ksjJD5szauqPDw/PDo4QbwYfs | ||||
| i1DC8DLZaPOwNHpdBfvsH/gt1ZJ9oWtJYh1X+X94qRXO2wqbVHLI/uV0dsCs | ||||
| Ns6IhcVqu6LFv5OEr12hzTBh/YThI5UdslnKPqfsrtBixR+E8TeC/zNdwjr7 | ||||
| bHgmNqIs9x7SZjlkY+WEUcKxO5GtjXRbNhNWcJMV0UV6skZofDf74i/AiiyH | ||||
| zPgD/loKZ4XKzLZyKYwmidJmBZgfBTxls58uBofHH+vl4Og4Lo8Gg/O4PD45 | ||||
| P43Lk/OTo7g8PTytr346Oj6My7PBp9rY2cnJCS3H/ct0lyZX2j4vKzVMkn6/ | ||||
| D+etAwIuSe4LaRmyu16BEcxWIiNaWCYbhlhGgGUFL0uhlrhlxK9raUTOnGZC | ||||
| 8XkpmCsEG62dRoS4fiEMbSVSsBuu+FJ441fqURqt/Po9Jf4DWZDWrgXLdlss | ||||
| W2hDJOV5boS1wqbB6ZXM81IkyTtKkNH5OiPWUgjN4TL7gcOfniJcLy9Mq3LL | ||||
| crGQCue3YiVXHmOFgKGZppNLphfscnLHCm2d51UbrgO2KSSoUsqVdAASf9dW | ||||
| UKhzQTbwI/d2KXJvdD92Mt0ymCJeEDNHscIIXNObxidULXwZTx8/+ixhcdpJ | ||||
| nT9HZeWayhor9s/05PC8c+QBsvc2Bwoc1MIiwJOTFcq3NnIpFS9DDcddWfCJ | ||||
| fKFn7q/v+qPr6YSJWlr2Hnx6epunSEnGFRALcCHuGLEgZrTBIT7cC7OSSpd6 | ||||
| uQ10eBBbBpXJLevdfLu77x2Ebza59evZ1d++jWdXl7S++zq6vm4W9RN3X2+/ | ||||
| XV/uVrudF7c3N1eTy7AZV9nepZvRL/giAHq30/vx7WR03QuQtUGGIAZG4BbE | ||||
| pjKCCocTyDYzch5g/nwxZYOPgaikDEDl6ekvsd7xY1MIFc7y/A0/gfuW8aqC | ||||
| YJENpA9QVtLxEqnGCRZpVawQRnjsOt0gSf6wKCidO9yZ21aC9XJlezXfpW1y | ||||
| BWUOZF2sS5j4dY3cYVeO+CGSypcM0XoB3yN9hHnElo20BZ2lvcgIVFdlNAju | ||||
| Cg7MyL6paxCyFHjvxQK0j3JxgIpjPtkZmg74giNCi5D/C5zbSFe8HY6seikj | ||||
| /oBsECXcKXPmj+88HKzDDR5LwYHeiJGqbVU/H90JOW0Kx8NLeg940V28P0fp | ||||
| IEperOL6OZL91nMf66dOkbiRantEN+jQNhAMvXcwzOdnw+EAxbBGKKDbwrch | ||||
| IlspHwQaKjrCb80neeoREr2hxwJs9kDQz5ax3kt7B1HozWniolGOJOnWLEON | ||||
| NKXdZEN8l9aLbK9wDlPFoMfeWyGa8M/SY8K2RdAPocxqzXi9JW74I4n5gGRr | ||||
| L857/tU+4c5O/3xlSaop6SSSTSoNnHW59mdZJ6rADERmHyQKMD9ohHDXznb6 | ||||
| 39Lwep9ruPeKdb5Yv97fT3fAJslPMe87yBp/vbvsK3WoQnBqHoHOjYuYb1Bn | ||||
| e87ttaiWixUseOxp7Hh5CXXymvhQgdpWfdL/qQLeUXcJqRpVVVl3lGvxKEo2 | ||||
| NRoDIzr1BHMp0uVvvacN1I4+vIlhh0d7ONr1/L9wYlS6CbX7XTuLCtACKmsP | ||||
| IG2l4MwCXExLcjqKEHldQz1mRVTYbh7qnpenbGQDIjT/AZFcY4PSjtKCMaMz | ||||
| LsXG4pMY3bubjFs+Eyl8GJ4RMcAgwN5hjNAOlAljC/Fj0h9dXs7S0Ww6ivnD | ||||
| 8EoNgpJx2rpOMyuuYzBGGQlEVlUURyRzi2fcNvTceRKpXx//eheGVjJnBPol | ||||
| pmsXAMeEJcpFyiiR4jtfVSWSJl9t3oOU+lVL1A4anPZ8Qrsk6ayT2Bukhz/0 | ||||
| 5yydpzm+w76jVFanKTcV73kKk4i0uHjf0UF01y4XWT3E/NnBaDyajNiFRtoh | ||||
| AB4tiPG7jmLfQ+9xEYykjqrEJvTCKA3xjXHv8R5SsISXZtuu7LpKz9NP6ac9 | ||||
| qQ51es3nqE1qLb7KZzQm4CUJx3Qlmvqw97OBpuOm22jvKJwyMvB952urA90I | ||||
| tP38T3h7tuetFzfwtz6AprV6KyLQGzTN5xhN+DzvY4Qr3p3nVpT1s8nzsN/6 | ||||
| dH+1rry+0cdeFrU+nisr1vk8s1+iQ3uQ0rmspXE/uBdsal6H9xkVaBvlxefD | ||||
| x96ZZbvzb669euXiURJ1F0avfA7nRvte5Qoa3thK54C4Y6dNqjqHAyqvQJgR | ||||
| m2r0grd8bJ/vR9vumw7vTKIrvt1VVhw/28rOQ8uBqc482h7KsMcPh3Ll2/mu | ||||
| RYTeCVfpEBp5CTEIue+ikCtJD6GroitkD0Hma1dfQ/m27sE4yCmhw/T6vucY | ||||
| UVgtfZ7g892UdDwr9Tr3wUswFVP3I4EXyhYSaChXpVg2s4BEYcV3jXYUclVp | ||||
| K9pBQHtRRD5PlnXbo62n/DhteJj3Jp5R9qD0phT5koKNXAvzfBxq/RzrJYCr | ||||
| B/xL528KHfIi52sXZHLv/YvemRZUmDkT8BVvB/DVT2siKxTcK4F0tXYHTHjs | ||||
| Ob3I/MwzPUeDWCxWXPVHCo1lE/575JIrdAt2k11wo8Q2TX4H2PKhwHYTAAA= | ||||
| </rfc> | </rfc> | |||
| End of changes. 13 change blocks. | ||||
| 412 lines changed or deleted | 605 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||