<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 2.7.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-acme-integrations-16" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ACME-INTEGRATIONS">ACME Integrations for Device Certificate Enrollment</title>

    <author initials="O." surname="Friel" fullname="Owen Friel">
      <organization>Cisco</organization>
      <address>
        <email>ofriel@cisco.com</email>
      </address>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <author initials="R." surname="Shekh-Yusef" fullname="Rifaat Shekh-Yusef">
      <organization>Ernst &amp; Young</organization>
      <address>
        <email>rifaat.s.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2023" month="June" day="13"/>

    
    
    

    <abstract>


<t>This document outlines multiple advanced use cases and integrations that ACME facilitates without any modifications or enhancements required to the base ACME specification. The use cases include ACME integration with EST, BRSKI and TEAP.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>ACME <xref target="RFC8555"/> defines a protocol that a certification authority (CA) and an applicant can use to automate the process of domain name ownership validation and X.509 (PKIX) <xref target="RFC5280"/> certificate issuance. The protocol is rich and flexible and enables multiple use cases that are not immediately obvious from reading the specification. This document explicitly outlines multiple advanced ACME use cases including:</t>

<t><list style="symbols">
  <t>ACME integration with EST <xref target="RFC7030"/></t>
  <t>ACME integration with BRSKI <xref target="RFC8995"/></t>
  <t>ACME integration with BRSKI Default Cloud Registrar <xref target="I-D.ietf-anima-brski-cloud"/></t>
  <t>ACME integration with TEAP <xref target="RFC7170"/></t>
</list></t>

<t>The integrations with EST, BRSKI (which is based upon EST), and TEAP enable automated certificate enrollment for devices.</t>

<t>Optionally, ACME for subdomains <xref target="I-D.ietf-acme-subdomains"/> offers a useful optimization when ACME is used to issue certificates for large numbers of devices in the same domain; it reduces the domain ownership proof traffic as well as the ACME traffic overhead. This is accomplished by completing a challenge against the parent domain instead of a challenge against each explicit subdomain. Use of ACME for subdomains is not a requirement.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>

<t>The following terms are defined in DNS Terminology <xref section="2" sectionFormat="comma" target="RFC8499"/> and used in this document. Please refer to <xref section="2" sectionFormat="comma" target="RFC8499"/> for a definition of these terms.</t>

<t><list style="symbols">
  <t>Label</t>
  <t>Domain Name</t>
  <t>Subdomain</t>
  <t>Fully-Qualified Domain Name (FQDN)</t>
</list></t>

<t>The following terms are used in this document:</t>

<t><list style="symbols">
  <t>BRSKI: Bootstrapping Remote Secure Key Infrastructures <xref target="RFC8995"/></t>
  <t>Pledge:  from <xref target="RFC8366"/>, the prospective device attempting to find and securely join a domain.  When shipped, it only trusts authorized representatives of the manufacturer.</t>
  <t>Certification Authority (CA): An organization that is responsible for the creation, issuance, revocation, and management of Certificates. The term applies equally to both Root CAs and Subordinate CAs</t>
  <t>CMS: Cryptographic Message Syntax <xref target="RFC5652"/></t>
  <t>CMC: Certificate Management over CMS <xref target="RFC5272"/></t>
  <t>CSR: Certificate Signing Request <xref target="RFC2986"/></t>
  <t>EST: Enrollment over Secure Transport <xref target="RFC7030"/></t>
  <t>MASA: Manufacturer Authorized Signing Authority as defined in <xref target="RFC8995"/></t>
  <t>PKCS: Public-Key Cryptography Standards <xref target="RFC8017"/></t>
  <t>PKCS#7: PKCS Cryptographic Message Syntax <xref target="RFC2315"/></t>
  <t>PKCS#10: PKCS Certification Request  Syntax <xref target="RFC2986"/></t>
  <t>RA: PKI Registration Authority <xref target="RFC2986"/></t>
  <t>TEAP: Tunneled Extensible Authentication Protocol <xref target="RFC7170"/></t>
  <t>TLV: Type-Length-Value format defined in TEAP <xref target="RFC7170"/></t>
</list></t>

</section>
<section anchor="pre-requisites-for-integration"><name>Pre-requisites for Integration</name>

<t>In order for the EST server or TEAP server that is part of the BRSKI Registrar to use ACME to create new certificates it needs to have the ability to satisfy the dns-01 challenges that the ACME will issue.</t>

<t>The EST Registration Authority (RA) is configured with the DNS domain for which it will issue certificates. In the examples below, it is "example.com"</t>

<t>The EST RA is configured with a credential that allows it to update the contents of the DNS domain.
This could be in the form of an <xref target="RFC3007"/> credential such as a TSIG key or a SIG(0) key.
It could also be some other proprietary credential that allows the EST RA to update the database on the DNS provider directly.
As a third option, the EST RA could maintain a zone itself, configured as a stealth primary, with a DNS NS zone cut pointing at the EST RA's DNS server.</t>

</section>
<section anchor="acme-integration-with-est"><name>ACME Integration with EST</name>

<t>EST <xref target="RFC7030"/> defines a mechanism for clients to enroll with a PKI Registration Authority by sending Certificate Management over CMS (CMC) <xref target="RFC5272"/> messages over HTTP. EST <xref target="RFC7030"/> Section 1 states:</t>

<t>"Architecturally, the EST service is located between a Certification Authority (CA) and a client.  It performs several functions traditionally allocated to the Registration Authority (RA) role in a PKI."</t>

<t>EST <xref target="RFC7030"/> Section 1.1 states that:</t>

<t>"For certificate issuing services, the EST CA is reached through the EST server; the CA could be logically "behind" the EST server or embedded within it."</t>

<t>When the CA is logically "behind" the EST RA, EST does not specify how the RA communicates with the CA. EST <xref target="RFC7030"/> Section 1 states:</t>

<t>"The nature of communication between an EST server and a CA is not described in this document."</t>

<t>This section outlines how ACME could be used for communication between the EST RA and the CA. The example call flow leverages <xref target="I-D.ietf-acme-subdomains"/> and shows the RA proving ownership of a parent domain using the 'dns-01' challenge type, with individual client certificates being subdomains under that parent domain. ACME <xref section="8.4" sectionFormat="comma" target="RFC8555"/> defines how the ACME client, which in this example is the EST RA, and ACME server interact with the DNS system. Please refer to ACME <xref target="RFC8555"/> for details on all relevant DNS operations.</t>

<t>Use of <xref target="I-D.ietf-acme-subdomains"/> is an optional optimization that reduces DNS and ACME traffic overhead. The RA could of course prove ownership of every explicit client certificate identifier.</t>

<t>The call flow illustrates the client calling the EST /csrattrs API before calling the EST /simpleenroll API. This enables the server to indicate what fields the client should include in the CSR that the client sends in the /simpleenroll API. CSR Attributes handling are discussed in <xref target="csr-attributes"/>.</t>

<t>If the CSR includes an identifier that the EST RA does not control, the RA MUST respond with a 4xx HTTP <xref target="RFC9110"/> error code. Refer to section <xref target="error-handling"/> for further details on error handling.</t>

<t>The call flow illustrates the EST RA returning a 202 Retry-After response to the client's simpleenroll request. This is an optional step and may be necessary if the interactions between the RA and the ACME server take some time to complete. The exact details of when the RA returns a 202 Retry-After are implementation specific.</t>

<t>This example illustrates, and all subsequent examples in this document illustrate, the use of the ACME 'dns-01' challenge type. This does not preclude the use of any other ACME challenges, however, examples illustrating the use of other challenge types are not documented here.</t>

<figure><artwork><![CDATA[
+--------+             +--------+            +--------+    +-----+
| Client |             | EST RA |            |  ACME  |    | DNS |
+--------+             +--------+            | Server |    +-----+
    |                      |                 +--------+       |
    |                      |                      |           |
               STEP 1: Pre-Authorization of parent domain
    |                      |                      |           |
    |                      | POST /newAuthz       |           |
    |                      |  "example.com"       |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 201 authorizations   |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | Publish DNS TXT      |           |
    |                      | "example.com"        |           |
    |                      |--------------------------------->|
    |                      |                      |           |
    |                      | POST /challenge      |           |
    |                      |--------------------->|           |
    |                      |                      | Verify    |
    |                      |                      |---------->|
    |                      | 200 status=valid     |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | Delete DNS TXT       |           |
    |                      | "example.com"        |           |
    |                      |--------------------------------->|
    |                      |                      |           |
               STEP 2: Client enrolls against RA
    |                      |                      |           |
    | GET /csrattrs        |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 200 OK               |                      |           |
    | SEQUENCE {AttrOrOID} |                      |           |
    | SAN OID:             |                      |           |
    | "client.example.com" |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
    | POST /simpleenroll   |                      |           |
    | PCSK#10 CSR          |                      |           |
    | "client.example.com" |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 202 Retry-After      |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
               STEP 3: RA places ACME order
    |                      |                      |           |
    |                      | POST /newOrder       |           |
    |                      | "client.example.com" |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 201 status=ready     |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | POST /finalize       |           |
    |                      | PKCS#10 CSR          |           |
    |                      | "client.example.com" |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 200 OK status=valid  |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | POST /certificate    |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 200 OK               |           |
    |                      | PKCS#7               |           |
    |                      | "client.example.com" |           |
    |                      |<---------------------|           |
    |                      |                      |           |
               STEP 4: Client retries enroll
    |                      |                      |           |
    | POST /simpleenroll   |                      |           |
    | PCSK#10 CSR          |                      |           |
    | "client.example.com" |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 200 OK               |                      |           |
    | PKCS#7               |                      |           |
    | "client.example.com" |                      |           |
    |<---------------------|                      |           |
]]></artwork></figure>

</section>
<section anchor="acme-integration-with-brski"><name>ACME Integration with BRSKI</name>

<t>BRSKI <xref target="RFC8995"/> is based upon EST <xref target="RFC7030"/> and defines how to autonomically bootstrap PKI trust anchors into devices via means of signed vouchers. The signed vouchers are issued by the Manufacturer Authorized Signing Authority (MASA) service as described in BRSKI.</t>

<t>EST certificate enrollment may then optionally take place after trust has been established. BRKSI voucher exchange and trust establishment are based on EST extensions and the certificate enrollment part of BRSKI is fully based on EST. Similar to EST, BRSKI does not define how the EST RA communicates with the CA. Therefore, the mechanisms outlined in the previous section for using ACME as the communications protocol between the EST RA and the CA are equally applicable to BRSKI.</t>

<t>The following call flow shows how ACME may be integrated into a full BRSKI voucher plus EST enrollment workflow. For brevity, it assumes that the EST RA has previously proven ownership of the certificate identifier. This ownership proof could have been by fulfilling an authorization challenge against the explicit identifier "pledge.example.com", or by fulfilling an authorization challenge against the parent domain "example.com" leveraging <xref target="I-D.ietf-acme-subdomains"/>.</t>

<t>The domain ownership exchanges between the RA, ACME and DNS are not shown. Similarly, not all BRSKI interactions are shown and only the key protocol flows involving voucher exchange and EST enrollment are shown.</t>

<t>Similar to the EST section above, the client calls EST /csrattrs API before calling the EST /simpleenroll API. This enables the server to indicate what fields the pledge should include in the CSR that the client sends in the /simpleenroll API. Refer to section <xref target="csr-attributes"/> for more details.</t>

<t>If the CSR includes an identifier that the EST RA does not control, the RA MUST respond with a 4xx HTTP <xref target="RFC9110"/> error code. Refer to section <xref target="error-handling"/> for further details on error handling.</t>

<t>The call flow illustrates the RA returning a 202 Retry-After response to the initial EST /simpleenroll API. This may be appropriate if processing of the /simpleenroll request and ACME interactions takes some time to complete.</t>

<t>This example illustrates the use of the ACME 'dns-01' challenge type.</t>

<figure><artwork><![CDATA[
+--------+             +--------+            +--------+     +------+
| Pledge |             | EST RA |            |  ACME  |     | MASA |
+--------+             +--------+            | Server |     +------+
    |                      |                 +--------+       |
    |                      |                      |           |
         NOTE: Pre-Authorization of "pledge.example.com" is complete
    |                      |                      |           |
         STEP 1: Pledge requests Voucher
    |                      |                      |           |
    | POST /requestvoucher |                      |           |
    |--------------------->|                      |           |
    |                      | POST /requestvoucher |           |
    |                      |--------------------------------->|
    |                      |                      |           |
    |                      | 200 OK Voucher       |           |
    |                      |<---------------------------------|
    | 200 OK Voucher       |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
         STEP 2: Pledge enrolls against RA
    |                      |                      |           |
    | GET /csrattrs        |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 200 OK               |                      |           |
    | SAN:                 |                      |           |
    | "pledge.example.com" |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
    | POST /simpleenroll   |                      |           |
    | PCSK#10 CSR          |                      |           |
    | "pledge.example.com" |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 202 Retry-After      |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
         STEP 3: RA places ACME order
    |                      |                      |           |
    |                      | POST /newOrder       |           |
    |                      | "pledge.example.com" |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 201 status=ready     |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | POST /finalize       |           |
    |                      | PKCS#10 CSR          |           |
    |                      | "pledge.example.com" |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 200 OK status=valid  |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | POST /certificate    |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 200 OK               |           |
    |                      | PKCS#7               |           |
    |                      | "pledge.example.com" |           |
    |                      |<---------------------|           |
    |                      |                      |           |
         STEP 4: Pledge retries enroll
    |                      |                      |           |
    | POST /simpleenroll   |                      |           |
    | PCSK#10 CSR          |                      |           |
    | "pledge.example.com" |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 200 OK               |                      |           |
    | PKCS#7               |                      |           |
    | "pledge.example.com" |                      |           |
    |<---------------------|                      |           |
]]></artwork></figure>

</section>
<section anchor="acme-integration-with-brski-default-cloud-registrar"><name>ACME Integration with BRSKI Default Cloud Registrar</name>

<t>BRSKI Cloud Registrar <xref target="I-D.ietf-anima-brski-cloud"/> specifies the behavior of a BRSKI Cloud Registrar, and how a pledge can interact with a BRSKI Cloud Registrar when bootstrapping. Similar to the local domain registrar BRSKI flow, ACME can be easily integrated with a cloud registrar bootstrap flow.</t>

<t>BRSKI cloud registrar is flexible and allows for multiple different local domain discovery and redirect scenarios. The est-domain leaf defined in <xref target="I-D.ietf-anima-brski-cloud"/> allows the specification of a bootstrap EST domain. In this example, the est-domain extension allows the cloud registrar to specify the local domain RA that the pledge should connect to for the purposes of EST enrollment.</t>

<t>For brevity, it assumes that the EST RA has previously proven ownership of the certificate identifier. This ownership proof could have been by fulfilling an authorization challenge against the explicit identifier "pledge.example.com", or by fulfilling an authorization challenge against the parent domain "example.com" leveraging <xref target="I-D.ietf-acme-subdomains"/>. The domain ownership exchanges between the RA, ACME and DNS are not shown.</t>

<t>Similar to the sections above, the client calls EST /csrattrs API before calling the EST /simpleenroll API.</t>

<t>This example illustrates the use of the ACME 'dns-01' challenge type.</t>

<figure><artwork><![CDATA[
+--------+             +--------+           +--------+   +----------+
| Pledge |             | EST RA |           |  ACME  |   | Cloud RA |
+--------+             +--------+           | Server |   |  / MASA  |
    |                      |                +--------+   +----------+
    |                      |                      |           |
         NOTE: Pre-Authorization of "pledge.example.com" is complete
    |                      |                      |           |
         STEP 1: Pledge requests Voucher from Cloud Registrar
    |                                                         |
    | POST /requestvoucher                                    |
    |-------------------------------------------------------->|
    |                                                         |
    | 200 OK Voucher (includes 'est-domain')                  |
    |<--------------------------------------------------------|
    |                      |                      |           |
         STEP 2: Pledge enrolls against local domain RA
    |                      |                      |           |
    | GET /csrattrs        |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 200 OK               |                      |           |
    | SAN:                 |                      |           |
    | "pledge.example.com" |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
    | POST /simpleenroll   |                      |           |
    | PCSK#10 CSR          |                      |           |
    | "pledge.example.com" |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 202 Retry-After      |                      |           |
    |<---------------------|                      |           |
    |                      |                      |           |
         STEP 3: RA places ACME order
    |                      |                      |           |
    |                      | POST /newOrder       |           |
    |                      | "pledge.example.com" |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 201 status=ready     |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | POST /finalize       |           |
    |                      | PKCS#10 CSR          |           |
    |                      | "pledge.example.com" |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 200 OK status=valid  |           |
    |                      |<---------------------|           |
    |                      |                      |           |
    |                      | POST /certificate    |           |
    |                      |--------------------->|           |
    |                      |                      |           |
    |                      | 200 OK               |           |
    |                      | PKCS#7               |           |
    |                      | "pledge.example.com" |           |
    |                      |<---------------------|           |
    |                      |                      |           |
         STEP 4: Pledge retries enroll
    |                      |                      |           |
    | POST /simpleenroll   |                      |           |
    | PCSK#10 CSR          |                      |           |
    | "pledge.example.com" |                      |           |
    |--------------------->|                      |           |
    |                      |                      |           |
    | 200 OK               |                      |           |
    | PKCS#7               |                      |           |
    | "pledge.example.com" |                      |           |
    |<---------------------|                      |           |
]]></artwork></figure>

</section>
<section anchor="acme-integration-with-teap"><name>ACME Integration with TEAP</name>

<t>TEAP <xref target="RFC7170"/> defines a tunnel-based EAP method that enables secure communication between a peer and a server by using TLS to establish a mutually authenticated tunnel. TEAP enables certificate provisioning within the tunnel. TEAP <xref target="RFC7170"/> does not define how the TEAP server communicates with the CA.</t>

<t>This section outlines how ACME could be used for communication between the TEAP server and the CA. The example call flow leverages <xref target="I-D.ietf-acme-subdomains"/> and shows the TEAP server proving ownership of a parent domain, with individual client certificates being subdomains under that parent domain.</t>

<t>For brevity, it assumes that the TEAP server has previously proven ownership of the certificate identifier. This ownership proof could have been by fulfilling an authorization challenge against the explicit identifier "client.example.com", or by fulfilling an authorization challenge against the parent domain "example.com" leveraging <xref target="I-D.ietf-acme-subdomains"/>. The domain ownership exchanges between the TEAP server, ACME and DNS are not shown.</t>

<t>After establishing the outer TLS tunnel, the TEAP server instructs the client to enroll for a certificate by sending a PKCS#10 TLV in the body of a Request-Action TLV. The client then replies with a PKCS#10 TLV that contains its CSR. The TEAP server interacts with the ACME server for certificate issuance and returns the certificate in a PKCS#7 TLV as per TEAP <xref target="RFC7170"/>.</t>

<t>This example illustrates the use of the ACME 'dns-01' challenge type.</t>

<figure><artwork><![CDATA[
+------+                +-------------+          +--------+   +-----+
| Peer |                | TEAP-Server |          |  ACME  |   | DNS |
+------+                +-------------+          | Server |   +-----+
    |                         |                  +--------|      |
    |                         |                      |           |
         NOTE: Pre-Authorization of "client.example.com" is complete
    |                         |                      |           |
         STEP 1: Establish EAP Outer Tunnel
    |                         |                      |           |
    |  EAP-Request/           |                      |           |
    |   Type=Identity         |                      |           |
    |<------------------------|                      |           |
    |                         |                      |           |
    |  EAP-Response/          |                      |           |
    |   Type=Identity         |                      |           |
    |------------------------>|                      |           |
    |                         |                      |           |
    |  EAP-Request/           |                      |           |
    |   Type=TEAP,            |                      |           |
    |   TEAP Start,           |                      |           |
    |   Authority-ID TLV      |                      |           |
    |<------------------------|                      |           |
    |                         |                      |           |
    |  EAP-Response/          |                      |           |
    |   Type=TEAP,            |                      |           |
    |   TLS(ClientHello)      |                      |           |
    |------------------------>|                      |           |
    |                         |                      |           |
    |  EAP-Request/           |                      |           |
    |   Type=TEAP,            |                      |           |
    |   TLS(ServerHello,      |                      |           |
    |   Certificate,          |                      |           |
    |   ServerKeyExchange,    |                      |           |
    |   CertificateRequest,   |                      |           |
    |   ServerHelloDone)      |                      |           |
    |<------------------------|                      |           |
    |                         |                      |           |
    |  EAP-Response/          |                      |           |
    |   Type=TEAP,            |                      |           |
    |   TLS(Certificate,      |                      |           |
    |   ClientKeyExchange,    |                      |           |
    |   CertificateVerify,    |                      |           |
    |   ChangeCipherSpec,     |                      |           |
    |   Finished)             |                      |           |
    |------------------------>|                      |           |
    |                         |                      |           |
    |  EAP-Request/           |                      |           |
    |   Type=TEAP,            |                      |           |
    |   TLS(ChangeCipherSpec, |                      |           |
    |   Finished),            |                      |           |
    |   {Crypto-Binding TLV,  |                      |           |
    |   Result TLV=Success}   |                      |           |
    |<------------------------|                      |           |
    |                         |                      |           |
    |  EAP-Response/          |                      |           |
    |   Type=TEAP,            |                      |           |
    |   {Crypto-Binding TLV,  |                      |           |
    |   Result TLV=Success}   |                      |           |
    |------------------------>|                      |           |
    |                         |                      |           |
    |  EAP-Request/           |                      |           |
    |   Type=TEAP,            |                      |           |
    |   {Request-Action TLV:  |                      |           |
    |     Status=Success,     |                      |           |
    |     Action=Process-TLV, |                      |           |
    |     TLV=PKCS#10}        |                      |           |
    |<------------------------|                      |           |
    |                         |                      |           |
         STEP 2: Enroll for certificate
    |                         |                      |           |
    |                         |                      |           |
    |  EAP-Response/          |                      |           |
    |   Type=TEAP,            |                      |           |
    |   {PKCS#10 TLV:         |                      |           |
    |   "client.example.com"} |                      |           |
    |------------------------>|                      |           |
    |                         | POST /newOrder       |           |
    |                         | "client.example.com" |           |
    |                         |--------------------->|           |
    |                         |                      |           |
    |                         | 201 status=ready     |           |
    |                         |<---------------------|           |
    |                         |                      |           |
    |                         | POST /finalize       |           |
    |                         | PKCS#10 CSR          |           |
    |                         | "client.example.com" |           |
    |                         |--------------------->|           |
    |                         |                      |           |
    |                         | 200 OK status=valid  |           |
    |                         |<---------------------|           |
    |                         |                      |           |
    |                         | POST /certificate    |           |
    |                         |--------------------->|           |
    |                         |                      |           |
    |                         | 200 OK               |           |
    |                         | PKCS#7               |           |
    |                         | "client.example.com" |           |
    |                         |<---------------------|           |
    |                         |                      |           |
    |  EAP-Request/           |                      |           |
    |   Type=TEAP,            |                      |           |
    |   {PKCS#7 TLV,          |                      |           |
    |    Result TLV=Success}  |                      |           |
    |<------------------------|                      |           |
    |                         |                      |           |
    |  EAP-Response/          |                      |           |
    |   Type=TEAP,            |                      |           |
    |   {Result TLV=Success}  |                      |           |
    |------------------------>|                      |           |
    |                         |                      |           |
    |  EAP-Success            |                      |           |
    |<------------------------|                      |           |

]]></artwork></figure>

</section>
<section anchor="acme-integration-considerations"><name>ACME Integration Considerations</name>

<section anchor="service-operators"><name>Service Operators</name>

<t>The goal of these integrations is enabling issuance of certificates with identifiers in a given domain by an ACME server to a client. The operator of the EST RA or TEAP server must be able to fulfil ACME challenges that prove domain ownership for issuance of certificates with identifiers in that domain. The ACME server is not necessarily operated by the organization that controls the domain.</t>

<t>If the client sends a certificate enrollment request for an identifier in a domain that the EST RA or TEAP server does not have operational control over, the server MUST reject the request with a suitable error immediately, and MUST NOT send a certificate enrollment request to the ACME server. See <xref target="error-handling"/> for more information on error handling.</t>

</section>
<section anchor="csr-attributes"><name>CSR Attributes</name>

<t>In all EST and BRSKI integrations, the client MUST send a CSR Attributes request to the EST server prior to sending a certificate enrollment request. This enables the server to indicate to the client what attributes, and what attribute values, it expects the client to include in the subsequent CSR request. For example, the server could instruct the peer what Subject Alternative Name entries to include in its CSR.</t>

<t>EST <xref target="RFC7030"/> is not clear on how the CSR Attributes response should be structured, and in particular is not clear on how a server can instruct a client to include specific attribute values in its CSR. <xref target="I-D.ietf-lamps-rfc7030-csrattrs"/> clarifies how a server can use CSR Attributes response to specify specific values for attributes that the client should include in its CSR.</t>

<t>Servers MUST use this mechanism to tell the client what identifiers to include in CSR request. ACME <xref target="RFC8555"/> allows the identifier to be included in either CSR Subject or Subject Alternative Name fields, however <xref target="I-D.ietf-uta-use-san"/> states that Subject Alternative Name field MUST be used. This document aligns with <xref target="I-D.ietf-uta-use-san"/> and Subject Alternate Name field MUST be used. The identifier MUST be a subdomain of a domain that the server has control over and can fulfill ACME challenges against. The leftmost part of the identifier MAY be a field that the client presented to the server in an IEEE 802.1AR <xref target="IDevID"></xref>.</t>

<t>Servers MAY use this field to instruct the client to include other attributes such as specific policy OIDs. Refer to EST <xref target="RFC7030"/> Section 2.6 for further details.</t>

</section>
<section anchor="certificate-chains-and-trust-anchors"><name>Certificate Chains and Trust Anchors</name>

<t>ACME <xref target="RFC8555"/> Section 9.1 states that ACME servers may return a certificate chain to an ACME client where an end entity certificate is followed by certificates that certify it. The trust anchor certificate SHOULD be omitted from the chain as it is assumed that the trust anchor is already known by the ACME client i.e. the EST or TEAP server.</t>

<section anchor="est-cacerts"><name>EST /cacerts</name>

<t>EST <xref target="RFC7030"/> Section 4.2.3 states that the /simpleenroll response contains "only the certificate that was issued". EST <xref target="RFC7030"/> Section 4.1.3 states that the /cacerts response "MUST include any additional certificates the client would need to build a chain from an EST CA-issued certificate to the current EST CA TA".</t>

<t>Therefore, the EST server MUST return only the ACME end entity certificate in the /simpleenroll response. The EST server MUST return the remainder of the chain returned by the ACME server to the EST server in the /cacerts response to the client, appending the trust anchor root CA if necessary.</t>

</section>
<section anchor="teap-pkcs7-tlv"><name>TEAP PKCS#7 TLV</name>

<t>TEAP <xref target="RFC7170"/> Section 4.2.16 allows for download of a PKCS#7 <xref target="RFC2315"/> certificate chain in response to a TEAP PKCS#10 <xref target="RFC2986"/> TLV request. TEAP also allows for download of multiple PKCS#7 certificates in response to a TEAP Trusted-Server-Root TLV request.</t>

<t>The TEAP server MUST return the full ACME client certificate chain in the PKCS#7 response to the PKCS#10 TLV request. The TEAP server MUST return the ACME server trust anchor in a PKCS#7 response to a Trusted-Server-Root TLV request. As outlined in <xref target="id-kp-cmcra"/>, the TEAP server SHOULD also return the trust anchor that was used for issuing its own identity certificate, if different from the ACME server trust anchor.</t>

</section>
</section>
<section anchor="id-kp-cmcra"><name>id-kp-cmcRA</name>

<t>BRSKI <xref target="RFC8995"/> mandates that the id-kp-cmcRA extended key usage OID is set in the Registrar (or EST RA) end entity certificate that the Registrar uses when signing voucher request messages sent to the MASA. Public ACME servers may not be willing to issue end entity certificates that have the id-kp-cmcRA extended key usage OID set. In these scenarios, the EST RA may be used by the pledge to get issued certificates by a public ACME server, but the EST RA itself will need an end entity certificate that has been issued by a different CA (e.g. an operator deployed private CA) and that has the id-kp-cmcRA OID set.</t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>ACME <xref target="RFC8555"/> Section 6.7 defines multiple errors that may be returned by an ACME server to an ACME client. TEAP <xref target="RFC7170"/> Section 4.2.6 defines multiple errors that may be returned by a TEAP server to a client in an Error TLV. EST <xref target="RFC7030"/> Section 4.2.3 defines how an EST server may return an error encoded in a CMC <xref target="RFC5272"/> response, or may return a human readable error in the response body.</t>

<t>If a client sends a certificate enrollment request to an EST RA for an identifier that the RA does not control, the RA MUST respond with a suitable 4xx HTTP <xref target="RFC9110"/> error code, and MUST NOT send an enrollment request to the ACME server. The RA MAY include a CMCFailInfo <xref target="RFC5272"/> error code of badIdentity.</t>

<t>If a client sends a certificate enrollment request to a TEAP server for an identifier that the TEAP server does not control, the TEAP server MUST respond with an Error TLV with error code 1024 Bad Identity In Certificate Signing Request, and MUST NOT send an enrollment request to the ACME server.</t>

<t>If the EST RA or TEAP server sends an enrollment request to the ACME server and receives an error response from the ACME server, the following mapping from ACME errors to CMC <xref target="RFC5272"/> Section 6.1.4 CMCFailInfo and TEAP <xref target="RFC7170"/> Section 4.2.6 error codes is RECOMMENDED.</t>

<texttable>
      <ttcol align='left'>ACME</ttcol>
      <ttcol align='left'>CMCFailInfo</ttcol>
      <ttcol align='left'>TEAP Error Code</ttcol>
      <c>badCSR</c>
      <c>badRequest</c>
      <c>1025 Bad CSR</c>
      <c>caa</c>
      <c>badRequest</c>
      <c>1025 Bad CSR</c>
      <c>rejectedIdentifier</c>
      <c>badIdentity</c>
      <c>1024 Bad Identity In CSR</c>
      <c>all other errors</c>
      <c>internalCAError</c>
      <c>1026 Internal CA Error</c>
</texttable>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not make any requests to IANA.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This draft is informational and makes no changes to the referenced specifications.
All security considerations from these referenced documents are applicable here:</t>

<t><list style="symbols">
  <t>EST <xref target="RFC7030"/></t>
  <t>BRSKI <xref target="RFC8995"/></t>
  <t>BRSKI Default Cloud Registrar <xref target="I-D.ietf-anima-brski-cloud"/></t>
  <t>TEAP <xref target="RFC7170"/></t>
</list></t>

<t>Additionally, all Security Considerations in ACME in the following areas are equally applicable to ACME Integrations.</t>

<t>It is expected that the integration mechanisms proposed here will primarily use the 'dns-01' challenge documented in <xref target="RFC8555"/> Section 8.4.  The security considerations in <xref target="RFC8555"/> says:</t>

<t>The DNS is a common point of vulnerability for all of these
   challenges.  An entity that can provision false DNS records for a
   domain can attack the DNS challenge directly and can provision false
   A/AAAA records to direct the ACME server to send its HTTP validation
   query to a remote server of the attacker's choosing.</t>

<t>It is expected that the TEAP-EAP server/EST Registrar will perform DNS dynamic updates.
This can be done in a variety of ways, including use of <xref target="RFC3007"/> Dynamic updates (with <xref target="RFC2136"/>), secured with either SIG(0) <xref target="RFC2931"/>, or TSIG keys.
Other proprietary APIs and interactions are also common, secured by some local credential.</t>

<t>A concern is the disclosure of the credential used to update the DNS records.
If an attacker gains access to the credential, they can provision their own certificates into
the name space of the entity.</t>

<t>For many uses, this may allow the attacker to get access to some enterprise resource.
When used to provision, for instance, a (SIP) phone system this would permit an attacker to impersonate a legitimate phone.
Not only does this allow for redirection of phone calls, but possibly also toll fraud.</t>

<t>Operators should consider restricting the integration server such that it can only update the DNS records for a specific zone or zones where ACME is required for client certificate enrollment automation.
For example, if all IoT devices in an organization enroll using EST against an EST RA, and all IoT devices will be issued certificates in a subdomain under iot.example.com, then the integration server could be issued a credential that only allows updating of DNS records in a zone that includes domains in the iot.example.com namespace, but does not allow updating of DNS records under any other example.com DNS namespace.</t>

<t>When performing challenge fulfilment via writing files to HTTP webservers, write access should only be granted to a specific set of servers, and only to a specific set of directories for storage of challenge files.</t>

<section anchor="denial-of-service-against-acme-infrastructure"><name>Denial of Service against ACME infrastructure</name>

<t>The intermediate node (the TEAP-EAP server, or the EST Registrar) should cache the resulting certificates such that if the communication with the pledge is lost, subsequent attempts
to enroll will result in the cache certificate being returned.</t>

<t>As many public ACME servers have per-day, per-IP and per-subjectAltName limits, it is prudent not to request identical certificates too often.
When the limits are hit, it is often a sign of operator or installer error: Multiple configuration resets occurring within a short period of time.</t>

<t>Many private CA relationships use <xref target="RFC8555"/> as their enrollment protocol, and in those cases, there may be very different limits.
But, rate limiting and caching still has some value in protecting external infrastructure.</t>

<t>The cache should be indexed by the complete contents of the Certificate Signing Request,
and should not persist beyond the notAfter date in the certificate.</t>

<t>This means that if the private/public keypair changes on the pledge, then a new certificate will be issued.
If the requested SubjectAltName changes, then a new certificate will be requested.</t>

<t>In a case where a device is simply factory reset, and enrolls again, then the same certificate can be returned.</t>

</section>
<section anchor="tls-channel-bindings"><name>TLS Channel Bindings</name>

<t>EST <xref section="3.5" sectionFormat="comma" target="RFC7030"/> and TEAP <xref section="3.8.2" sectionFormat="comma" target="RFC7170"/> specify mechanisms to bind the PKCS#10 CSR request with the TLS tunnel used to transport the CSR request by using the tls-unique value from the TLS subsystem. It is RECOMMENDED that implementations use these tls-unique channel binding mechanisms.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC8555' target='https://www.rfc-editor.org/info/rfc8555'>
<front>
<title>Automatic Certificate Management Environment (ACME)</title>
<author fullname='R. Barnes' initials='R.' surname='Barnes'><organization/></author>
<author fullname='J. Hoffman-Andrews' initials='J.' surname='Hoffman-Andrews'><organization/></author>
<author fullname='D. McCarney' initials='D.' surname='McCarney'><organization/></author>
<author fullname='J. Kasten' initials='J.' surname='Kasten'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t></abstract>
</front>
<seriesInfo name='RFC' value='8555'/>
<seriesInfo name='DOI' value='10.17487/RFC8555'/>
</reference>



<reference anchor='RFC7030' target='https://www.rfc-editor.org/info/rfc7030'>
<front>
<title>Enrollment over Secure Transport</title>
<author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'><organization/></author>
<author fullname='P. Yee' initials='P.' role='editor' surname='Yee'><organization/></author>
<author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t></abstract>
</front>
<seriesInfo name='RFC' value='7030'/>
<seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>



<reference anchor='RFC8995' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>


<reference anchor='I-D.ietf-anima-brski-cloud' target='https://datatracker.ietf.org/doc/html/draft-ietf-anima-brski-cloud-06'>
   <front>
      <title>BRSKI Cloud Registrar</title>
      <author fullname='Owen Friel' initials='O.' surname='Friel'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Rifaat Shekh-Yusef' initials='R.' surname='Shekh-Yusef'>
         <organization>Auth0</organization>
      </author>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <date day='17' month='May' year='2023'/>
      <abstract>
	 <t>   Bootstrapping Remote Secure Key Infrastructures defines how to
   onboard a device securely into an operator maintained infrastructure.
   It assumes that there is local network infrastructure for the device
   to discover and to help the device.  This document extends the new
   device behaviour so that if no local infrastructure is available,
   such as in a home or remote office, that the device can use a well
   defined &quot;call-home&quot; mechanism to find the operator maintained
   infrastructure.

   To this, this document defines how to contact a well-known cloud
   registrar, and two ways in which the new device may be redirected
   towards the operator maintained infrastructure.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-anima-brski-cloud-06'/>
   
</reference>



<reference anchor='RFC7170' target='https://www.rfc-editor.org/info/rfc7170'>
<front>
<title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
<author fullname='H. Zhou' initials='H.' surname='Zhou'><organization/></author>
<author fullname='N. Cam-Winget' initials='N.' surname='Cam-Winget'><organization/></author>
<author fullname='J. Salowey' initials='J.' surname='Salowey'><organization/></author>
<author fullname='S. Hanna' initials='S.' surname='Hanna'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1.  TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel.  Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t></abstract>
</front>
<seriesInfo name='RFC' value='7170'/>
<seriesInfo name='DOI' value='10.17487/RFC7170'/>
</reference>


<reference anchor='I-D.ietf-acme-subdomains' target='https://datatracker.ietf.org/doc/html/draft-ietf-acme-subdomains-07'>
   <front>
      <title>Automated Certificate Management Environment (ACME) for Subdomains</title>
      <author fullname='Owen Friel' initials='O.' surname='Friel'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Richard Barnes' initials='R.' surname='Barnes'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Tim Hollebeek' initials='T.' surname='Hollebeek'>
         <organization>DigiCert</organization>
      </author>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <date day='1' month='March' year='2023'/>
      <abstract>
	 <t>   This document specifies how Automated Certificate Management
   Environment (ACME) can be used by a client to obtain a certificate
   for a subdomain identifier from a certification authority.  This
   document specifies how a client can fulfill a challenge against an
   ancestor domain but may not need to fulfill a challenge against the
   explicit subdomain if certification authority policy allows issuance
   of the subdomain certificate without explicit subdomain ownership
   proof.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-acme-subdomains-07'/>
   
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5272' target='https://www.rfc-editor.org/info/rfc5272'>
<front>
<title>Certificate Management over CMS (CMC)</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<author fullname='M. Myers' initials='M.' surname='Myers'><organization/></author>
<date month='June' year='2008'/>
<abstract><t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t><t>1.  The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t><t>2.  The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t><t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5272'/>
<seriesInfo name='DOI' value='10.17487/RFC5272'/>
</reference>



<reference anchor='RFC9110' target='https://www.rfc-editor.org/info/rfc9110'>
<front>
<title>HTTP Semantics</title>
<author fullname='R. Fielding' initials='R.' role='editor' surname='Fielding'><organization/></author>
<author fullname='M. Nottingham' initials='M.' role='editor' surname='Nottingham'><organization/></author>
<author fullname='J. Reschke' initials='J.' role='editor' surname='Reschke'><organization/></author>
<date month='June' year='2022'/>
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the &quot;http&quot; and &quot;https&quot; Uniform Resource Identifier (URI) schemes. </t><t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t></abstract>
</front>
<seriesInfo name='STD' value='97'/>
<seriesInfo name='RFC' value='9110'/>
<seriesInfo name='DOI' value='10.17487/RFC9110'/>
</reference>


<reference anchor='I-D.ietf-lamps-rfc7030-csrattrs' target='https://datatracker.ietf.org/doc/html/draft-ietf-lamps-rfc7030-csrattrs-02'>
   <front>
      <title>Clarification of RFC7030 CSR Attributes definition</title>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Owen Friel' initials='O.' surname='Friel'>
         <organization>Cisco</organization>
      </author>
      <author fullname='David von Oheimb' initials='D.' surname='von Oheimb'>
         <organization>Siemens</organization>
      </author>
      <author fullname='Dan Harkins' initials='D.' surname='Harkins'>
         <organization>The Industrial Lounge</organization>
      </author>
      <date day='8' month='April' year='2023'/>
      <abstract>
	 <t>   The Enrollment over Secure Transport (EST, RFC7030) is ambiguous in
   its specification of the CSR Attributes Response.  This has resulted
   in implementation challenges and implementor confusion.

   This document updates RFC7030 (EST) and clarifies how the CSR
   Attributes Response can be used by an EST server to specify both CSR
   attribute OIDs and also CSR attribute values, in particular X.509
   extension values, that the server expects the client to include in
   subsequent CSR request.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lamps-rfc7030-csrattrs-02'/>
   
</reference>


<reference anchor='I-D.ietf-uta-use-san' target='https://datatracker.ietf.org/doc/html/draft-ietf-uta-use-san-00'>
   <front>
      <title>Update to Verifying TLS Server Identities with X.509 Certificates</title>
      <author fullname='Rich Salz' initials='R.' surname='Salz'>
         <organization>Akamai Technologies</organization>
      </author>
      <date day='1' month='April' year='2021'/>
      <abstract>
	 <t>   In the decade since [RFC6125] was published, the
   subjectAlternativeName extension (SAN), as defined in [RFC5280] has
   become ubiquitous.  This document updates [RFC6125] to specify that
   the fall-back techniques of using the commonName attribute to
   identify the service must not be used.  This document also places
   some limitations on the use of wildcards in SAN fields.

   The original context of [RFC6125] using X.509 certificates for server
   identity with Transport Layer Security (TLS), is not changed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-uta-use-san-00'/>
   
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="IDevID" target="https://1.ieee802.org/security/802-1ar">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks - Secure Device Identity</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC8366' target='https://www.rfc-editor.org/info/rfc8366'>
<front>
<title>A Voucher Artifact for Bootstrapping Protocols</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a &quot;voucher&quot;.</t><t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t><t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t></abstract>
</front>
<seriesInfo name='RFC' value='8366'/>
<seriesInfo name='DOI' value='10.17487/RFC8366'/>
</reference>



<reference anchor='RFC5652' target='https://www.rfc-editor.org/info/rfc5652'>
<front>
<title>Cryptographic Message Syntax (CMS)</title>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='September' year='2009'/>
<abstract><t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='70'/>
<seriesInfo name='RFC' value='5652'/>
<seriesInfo name='DOI' value='10.17487/RFC5652'/>
</reference>



<reference anchor='RFC2986' target='https://www.rfc-editor.org/info/rfc2986'>
<front>
<title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
<author fullname='M. Nystrom' initials='M.' surname='Nystrom'><organization/></author>
<author fullname='B. Kaliski' initials='B.' surname='Kaliski'><organization/></author>
<date month='November' year='2000'/>
<abstract><t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2986'/>
<seriesInfo name='DOI' value='10.17487/RFC2986'/>
</reference>



<reference anchor='RFC8017' target='https://www.rfc-editor.org/info/rfc8017'>
<front>
<title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
<author fullname='K. Moriarty' initials='K.' role='editor' surname='Moriarty'><organization/></author>
<author fullname='B. Kaliski' initials='B.' surname='Kaliski'><organization/></author>
<author fullname='J. Jonsson' initials='J.' surname='Jonsson'><organization/></author>
<author fullname='A. Rusch' initials='A.' surname='Rusch'><organization/></author>
<date month='November' year='2016'/>
<abstract><t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t><t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t><t>This document also obsoletes RFC 3447.</t></abstract>
</front>
<seriesInfo name='RFC' value='8017'/>
<seriesInfo name='DOI' value='10.17487/RFC8017'/>
</reference>



<reference anchor='RFC2315' target='https://www.rfc-editor.org/info/rfc2315'>
<front>
<title>PKCS #7: Cryptographic Message Syntax Version 1.5</title>
<author fullname='B. Kaliski' initials='B.' surname='Kaliski'><organization/></author>
<date month='March' year='1998'/>
<abstract><t>This document describes a general syntax for data that may have cryptography applied to it, such as digital signatures and digital envelopes.  This memo provides information for the Internet community. It does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='2315'/>
<seriesInfo name='DOI' value='10.17487/RFC2315'/>
</reference>



<reference anchor='RFC3007' target='https://www.rfc-editor.org/info/rfc3007'>
<front>
<title>Secure Domain Name System (DNS) Dynamic Update</title>
<author fullname='B. Wellington' initials='B.' surname='Wellington'><organization/></author>
<date month='November' year='2000'/>
<abstract><t>This document proposes a method for performing secure Domain Name System (DNS) dynamic updates.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3007'/>
<seriesInfo name='DOI' value='10.17487/RFC3007'/>
</reference>



<reference anchor='RFC2136' target='https://www.rfc-editor.org/info/rfc2136'>
<front>
<title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
<author fullname='P. Vixie' initials='P.' role='editor' surname='Vixie'><organization/></author>
<author fullname='S. Thomson' initials='S.' surname='Thomson'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<author fullname='J. Bound' initials='J.' surname='Bound'><organization/></author>
<date month='April' year='1997'/>
<abstract><t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone.  Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2136'/>
<seriesInfo name='DOI' value='10.17487/RFC2136'/>
</reference>



<reference anchor='RFC2931' target='https://www.rfc-editor.org/info/rfc2931'>
<front>
<title>DNS Request and Transaction Signatures ( SIG(0)s )</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<date month='September' year='2000'/>
<abstract><t>This document describes the minor but non-interoperable changes in Request and Transaction signature resource records ( SIG(0)s ) that implementation experience has deemed necessary.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2931'/>
<seriesInfo name='DOI' value='10.17487/RFC2931'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

