<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dance-architecture-09" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DNS-Bound Identities Architecture">An Architecture for DNS-Bound Client and Sender Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dance-architecture-09"/>
    <author initials="A." surname="Wilson" fullname="Ash Wilson">
      <organization>Valimail</organization>
      <address>
        <email>ash.d.wilson@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Huque" fullname="Shumon Huque">
      <organization>Salesforce</organization>
      <address>
        <email>shuque@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Johansson" fullname="Olle Johansson">
      <organization>Edvina.net</organization>
      <address>
        <email>oej@edvina.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Internet</area>
    <workgroup>DANCE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 51?>

<t>This architecture document defines terminology, interaction, and authentication patterns,
related to the use of DANE DNS records for TLS client and messaging peer identity,
within the context of existing object security and TLS-based protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    DANE Authentication for Network Clients Everywhere Working Group mailing list (dance@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dance/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ashdwilson/draft-dance-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A digital identity, in an abstract sense, possesses at least two features: an identifier (or name),
and a means of proving ownership of the identifier.
One of the most resilient mechanisms for tying an identifier to a method for proving ownership of
the identifier is the digital certificate, issued by a well-run Certification Authority (CA).
The CA acts as a mutually trusted third party, a root of trust.</t>
      <t>Certificate-based identities are limited in scope by the issuing CA, or by the namespace of the
application responsible for issuing or validating the identity.</t>
      <t>Attempting to use organizational PKI outside the organization can be challenging.
In order to authenticate a certificate, the certificate’s CA must be trusted.
CAs have no way of controlling identifiers in certificates issued by other CAs.
Consequently, trusting multiple CAs at the same time can enable entity identifier collisions.
Asking an entity to trust your CA implies trust in anything that your CA signs.
This is why many organizations operate a private CA, and require users and devices connecting to the
organization’s networks or applications to possess certificates issued by the organization’s CA.</t>
      <t>These limitations make the implementation and ongoing maintenance of a PKI costly, and have a
chilling effect on the broader adoption of certificate-based IoT device identity and user identity.
If certificate-based device and user identity were easier to manage, more broadly trusted, and less
operationally expensive, more organizations and applications would be able to use it.</t>
      <t>The lack of trust between PKI domains has lead to a lack of simple and globally scalable solutions
for secure end-to-end inter-domain communication between entities, such as SIP phones, email and
chat accounts and IoT devices belonging to different organizations.</t>
      <t>DANCE seeks to make PKI-based user and IoT device identity universally discoverable, more broadly recognized,
and less expensive to maintain by using DNS as the constraining namespace and lookup mechanism.
DANCE builds on patterns established by the original DANE RFCs to enable client and sending entity
certificate, public key, and trust anchor discovery.
DANCE allows entities to possess a first-class identity, which, thanks to DNSSEC, may be trusted by any
application also trusting the DNS.
A first-class identity is an application-independent identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t><strong>Identity provisioning:</strong> This refers to the set of tasks required to securely provision an asymmetric key pair for the device, sign the certificate (if the public credential is not simply a raw public key), and publish the public key or certificate in DNS.
These steps not necessarily performed by the same party or organization.
Examples:</t>
      <ul spacing="normal">
        <li>
          <t>A device manufacturer may instantiate the key pair, and a systems integrator may be
responsible for issuing (and publishing) the device certificate in DNS.</t>
        </li>
        <li>
          <t>A device manufacturer may publish the device identity records in DNS. The system integrator
needs to perform network and application access configuration, since the identity already exists in DNS.</t>
        </li>
        <li>
          <t>A user may instantiate a key pair, based upon which an organization's CA may produce
a certificate after internally assuring the user identity, and the systems integrator
may publish the CA root certificate in DNS.</t>
        </li>
      </ul>
      <t><strong>DANCE protocol:</strong> A DANCE protocol is protocol that has been taught to use DANE client mchanisms..</t>
      <t><strong>Client:</strong> This architecture document adopts the definition of "Client" from RFC 8446: "The endpoint initiating the TLS connection"</t>
      <t><strong>User:</strong> A client whose name consists of a user identity and a DNS owner name prefixed with a _user label.</t>
      <t><strong>Server:</strong> This architecture document adopts the definition of "Server" from RFC 8446: "The endpoint that did not initiate the TLS connection"</t>
      <t><strong>Store-and-forward system:</strong> A message handling system in-path between the sending agent and the receiving agent.</t>
      <t><strong>Systems integrator:</strong> The party responsible for configuration and deployment of application components.
In some cases, the systems integrator also installs the software onto the device, and may provision the device identity in DNS.</t>
      <t><strong>Consumer:</strong> The entity or organization which pays for the value provided by the application, and defines the success criteria for the output of the application.</t>
    </section>
    <section anchor="communication-patterns">
      <name>Communication Patterns</name>
      <section anchor="clientserver">
        <name>Client/Server</name>
        <t>Client/server communication patterns imply a direct connection between an entity which provides a service (the server), and an entity which initiates a connection to the server, called a client.
A secure implementation of this pattern includes a TLS-protected session directly between the client and the server.
A secure implementation may also include public key-based mutual authentication.</t>
        <t>Extending DANE to include client identity allows the server to authenticate clients independent of the private PKI used to issue the client certificate.
This reduces the complexity of managing the CA certificate collection, and mitigates the possibility of client identifier collision.
If the client is a user, the certificate holds an additional user identity supplied under the prerogative of a DNS owner name, which reduces the complexity of authenticating both internal and external users, through protocol mechanisms like SASL EXTERNAL <xref target="RFC4422"/>.</t>
      </section>
      <section anchor="peer2peer">
        <name>Peer2peer</name>
        <t>The extension also allows an application to find an application identity and set up a secure communication channel directly.
This pattern can be used in mesh networking, IoT and in many communication protocols for multimedia sessions, chat and messaging, where each endpoint may represent a device or a user.</t>
      </section>
      <section anchor="decoupled">
        <name>Decoupled</name>
        <t>Decoupled architecture, frequently incorporating store-and-forward systems, provides no direct connection between the producer and consumer of information.
The producer (or sending agent) and consumer (or receiving agent) are typically separated by at least one host running messaging-oriented middleware.
The Messaging-oriented middleware components may act as a server for the purpose of establishing TLS sessions for the producer and consumer.
This allows the assertion of identity between the middleware and sending agent, and the middleware and receiving agent.
The trust relationship between the sending agent and receiving agent is based on the presumed trustworthiness of the middleware, unless an identity can be attached to the message itself, independent of transport and middleware components.</t>
        <t>Within many existing store-and-forward protocols, certificates may be transmitted within the signed message itself.
An example of this is S/MIME.
Within IoT applications, we find that networks may be more constrained.
Including certificates in message payloads can present an unnecessary overhead on constrained network links.
Decoupled applications benefit from an out-of-band public key discovery mechanism, which may enable the retrieval of certificates only when needed, and sometimes using a less expensive network connection.</t>
      </section>
    </section>
    <section anchor="client-authentication">
      <name>Client authentication</name>
      <section anchor="overview-dance-usage-examples">
        <name>Overview - DANCE usage examples</name>
        <t>A client system sets up a TLS connection to a server, attaching a client certificate with a
subjectAltName <tt>dNSName</tt> indicating the DNS owner name of the client <xref target="RFC5280"/>.
When the client is a user, then their user identity is a subjectAltName extension containing either an <tt>otherName</tt> type with uid attribute <xref target="RFC4519"/> or email address <xref target="RFC9598"/>.</t>
        <t>In the TLS connection the DANE-client-id <xref target="I-D.ietf-dance-client-id"/> extension is used to tell the server to use the certificate dNSName to find a DANE record including the public key of the certificate to be able to validate.
If the server can validate the DNSSEC response, the server validates the certificate and completes the TLS connection setup.</t>
        <t>Using DANE to convey certificate information for authenticating TLS clients gives a not-yet-authenticated client the ability to trigger a DNS lookup on the server side of the TLS connection.
An opportunity for DDOS may exist when malicious clients can trigger arbitrary DNS lookups.</t>
        <t>For instance, an authoritative DNS server <xref target="RFC9499"/> which has been configured to respond slowly, may cause a high concurrency of in-flight TLS authentication processes as well as open connections to upstream resolvers.
This sort of attack (of type slowloris) could have a performance or availability impact on the TLS server.</t>
        <section anchor="example-1-tls-authentication-for-https-api-interaction-dane-pattern-assurance">
          <name>Example 1: TLS authentication for HTTPS API interaction, DANE pattern assurance</name>
          <ul spacing="normal">
            <li>
              <t>The client initiates a TLS connection to the server.</t>
            </li>
            <li>
              <t>The TLS server compares the dane_clientid (conveyed via the DANE Client Identity extension) to a list of allowed client domains.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed, the TLS server then performs a DNS lookup for the client's TLSA record.
If the dane_clientid is not allowed, authentication fails.</t>
            </li>
            <li>
              <t>If the client's TLSA record matches the presented certificate or public key, the TLS handshake completes
successfully and the authenticated dane_clientid is presented to the web application in a header field.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>This pattern translates well to TLS/TCP load balancers, by using a TLS TLV instead of an HTTP header.</t>
            </li>
            <li>
              <t>No traffic reaches the application behind the TLS terminating proxy (and load balancer) unless DANE client authentication is successful.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-2-tls-authentication-for-https-api-interaction-dane-matching-in-web-application">
          <name>Example 2: TLS authentication for HTTPS API interaction, DANE matching in web application</name>
          <ul spacing="normal">
            <li>
              <t>The client initiates a TLS connection to the server.</t>
            </li>
            <li>
              <t>The TLS server accepts any certificate for which the client can prove possession of the corresponding private key.</t>
            </li>
            <li>
              <t>The TLS server passes the certificate to the web application in a header field.</t>
            </li>
            <li>
              <t>The HTTP request body contains the dane_clientid, and is passed to the web application.</t>
            </li>
            <li>
              <t>The web application compares the dane_clientid to a list of allowed clients or client domains.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed, the web application makes the DNS query for the TLSA records for dane_clientid</t>
            </li>
            <li>
              <t>If the presented certificate (which was authenticated by the TLS server) matches at least one TLSA record for dane_clientid, authentication succeeds.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>In a web application where a TLS-terminating load balancer sits in front of a web application, the authentication logic in the load balancer remains simple.</t>
            </li>
            <li>
              <t>The web application ultimately decides whether to make the DNS query to support DANE authentication.
This allows the web application to reject clients with identifiers which are not allowed, before making a DNS query for TLSA retrieval and comparison.
No need to manage an allow-list in the load balancer.</t>
            </li>
            <li>
              <t>This can be implemented with no changes to the TLS handshake.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-3-tls-user-authentication-for-an-ldap-query">
          <name>Example 3: TLS user authentication for an LDAP query</name>
          <ul spacing="normal">
            <li>
              <t>The LDAP client initiates a TLS connection to the server, conveying the user's domain via the DANE Client Identity extension.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed and begins with a _user label, the TLS server then performs a DNS lookup for TLSA records holding the user's CA, and includes them when requesting a client certificate.</t>
            </li>
            <li>
              <t>If the client's certificate is signed by a CA found in the TLSA records and the certificate's dNSName prefixed with a _user label matches the dane_clientid then the client identity is authenticated to consist of the lowercase uid in the certificate, an "@" symbol and the lowercase UTF-8 representation of the certificate's dNSName (which lacks the "_user." prefix).</t>
            </li>
            <li>
              <t>The LDAP server responds to SASL EXTERNAL authentication by obtaining the authenticated user identity in userid@domain.name form and, if so requested, attempts to change to an authorization identity.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>SASL authentication under TLS encryption is common to many protocols, including new ones.</t>
            </li>
            <li>
              <t>This LDAP example demonstrates the potential of authentication with realm crossover support as a precursor to fine access control to possibly sensitive data.</t>
            </li>
            <li>
              <t>User identities cannot be iterated in DNS; TLS 1.3 conceals the client certificate; TLS in general conceals the user's choice of authorization identity during SASL EXTERNAL.</t>
            </li>
            <li>
              <t>This can be implemented with no changes to the TLS handshake.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-4-iot-device-to-cloud">
          <name>Example 4: IoT: Device to cloud</name>
          <t>Direct device-to-cloud communication is common in simple IoT applications.
Authentication in these applications is usually accomplished using shared credentials like API keys, or using client certificates.
Client certificate authentication frequently requires the consumer to maintain a CA.
Before client DANE, the CA trust anchor certificate would be installed into the cloud application, and used in the TLS authentication process.</t>
          <t>Using client DANE for device identity can allow parties other than the implementer to operate the CA.
A hardware manufacturer can provide a pre-established identity, with the certificate or public key already published in DNS.
This makes PKI-based identity more approachable for small organizations which currently lack the resources to operate an organizational CA.</t>
        </section>
        <section anchor="example-5-lorawan">
          <name>Example 5: LoRaWAN</name>
          <t>For the end-device onboarding in LoRaWAN, the "network server" and the "join server" <xref target="RFC8376"/> needs to establish mutual TLS authentication in order to exchange configuration parameters.
Certificate Authority based mutual TLS authentication doesn't work in LoRaWAN due to the non availability of the CA trust store in the LoRaWAN network stack.
Self-signed certificate based mutual-TLS authentication method is the alternative solution.</t>
          <t>DANE based client identity allows the server to authenticate clients during the TLS handhsake.
Thus, independent of the private PKI used to issue the client's self-signed certificate, the "network server" and the "join server" could be mutually authenticated.</t>
        </section>
        <section anchor="example-6-edge-computing">
          <name>Example 6: Edge Computing</name>
          <t><xref target="I-D.hong-t2trg-iot-edge-computing"/> may require devices to mutually authenticate in the field.
A practical example of this pattern is the edge computing in construction use case <xref section="6.2.1" sectionFormat="comma" target="I-D.hong-t2trg-iot-edge-computing"/>
Using traditional certificate-based identity, the sensor and the gateway may have certificates issued by
the same organizational PKI.
By using DANE for client and sender identity, the sensor and the gateway may have identities represented
by the equipment supplier, and still be able to mutually authenticate.
Important sensor measurements forwarded by the gateway to the cloud may bear the DNS owner name and signature of
the originating sensor, and the cloud application may authenticate the measurement independent of the gateway
which forwarded the information to the application.</t>
        </section>
        <section anchor="example-7-domain-users">
          <name>Example 7: Domain Users</name>
          <t>The allocation of user identities is the prerogative of a domain, in line with the nesting suggested in URI notation.
Domains may even choose to assign domain user identities to services, possibly with easily recognised identities like +mail+archive@domain.name.
Domains who publish TLSA records for a CA under a _user name underneath their domain allow the validation of user identities as mentioned in a certificate as TLS client or peer identities.
This mechanism is not restricted to domain-internal users, but can be used to validate users under any domain.</t>
          <t>Since ENUM maps telephone numbers to DNS owner names, it is possible to employ these same mechanisms for telephone number users.
Any DANCE protocol may however define alternate derivation procedures to obtain the DNS owner name for a phone number from specialised PKIX or LDAP attributes such as telephoneNumber, telexNumber, homePhone, mobile and pager.</t>
          <t>There is no reason why other uses, such as store-and-forward with S/MIME, could not benefit from this DNS-based PKI, as long as they remain mindful that anything in the certificate is the prerogative of the domain publishing the TLSA record, and the only reliable identity statements are for resources underneath the domain -- notably, the assignment of uid names.</t>
        </section>
        <section anchor="example-8-sip-and-webrtc-inter-domain-privacy">
          <name>Example 8: SIP and WebRTC inter-domain privacy</name>
          <t>End to end security in SIP is currently based on a classical S/MIME model which has not received much implementation.
There are also SIP standards that build upon a trust chain anchored on the HTTP trust chain (SIP identity, STIR).
WebRTC has a trust model between the web browser and the servers using TLS, but no inter-domain trust infrastructure.
WebRTC lacks a definition of namespace to map to DNS, where SIP is based on an email-style addressing scheme.
For WebRTC the application developer needs to define the name space and mapping to DNS.</t>
          <t>By using DNS as a shared root of trust, SIP and WebRTC end points can anchor the keys used for DTLS/SRTP media channel setup.
In addition, SIP devices can establish security in the SIP messaging by using DNS to find the callee’s and the callers digital identity.</t>
          <t>For an example, read <xref target="I-D.johansson-sipcore-dane-sip"/>(SIPDANE).</t>
        </section>
        <section anchor="example-9-dns-over-tls-client-authentication">
          <name>Example 9: DNS over TLS client authentication</name>
          <t>DNS-over-TLS client authentication is applicable to most portions of the
transport segments of the DNS infrastructure.
Current best practise for authentication between DNS infrastructure tends to be based
upon a shared secret in the form of TSIG.</t>
          <t>From authoritative to authoritative secondary, it can be applied to
XFR-over-TLS ("XoT") as an upgrade to TSIG, removing the need for out-of-band
communication of shared secrets, currently a weak point in that portion of
the infrastructure.</t>
          <t>From authoritative servers to recursive servers <xref target="RFC9499"/>, in situations in which both
are part of a common trust-group or have access to the same non-public or
split-horizon zone data, client authentication allows authoritative servers
to give selective access to specific recursive servers. Alternatively, some
recursive servers could authenticate in order to gain access to
non-content-related special services, such as a higher query rate-limit quota
than is publicly available.</t>
          <t>Between recursive resolvers and caching/forwarding or stub resolvers <xref target="RFC9499"/>,
authentication can be used to gain access to special services, such as
subscription-based malware blocking, or visibility of corporate split-horizon
internal zone, or to distinguish between subscribers to different performance tiers.</t>
          <t>In the ideal implementation, client and server would bidirectionally authenticate, using DANE client certificates to bootstrap TLS transport security.</t>
        </section>
        <section anchor="example-10-smtp-starttls">
          <name>Example 10: SMTP, STARTTLS</name>
          <t>SMTP has included the ability to upgrade in-protocol to TLS using the STARTTLS <xref target="RFC7817"/> command.
When upgrading the connection, the client checks the server certificate using the DNS-ID mechanisms described in <xref target="RFC9525"/>.
Support for this is very common and most email on the Internet is transmitted in this way.</t>
          <t>The use of client TLS certificates has not yet become common, in part because it is unclear how or what the server would check the certificate against.</t>
          <t>For mail-transfer-agent (MTA) to MTA communications, the use of a TLSA RR as described in <xref target="I-D.ietf-dance-client-auth"/> permits the SMTP server to check the identity of the parties trying to send email.
There are many use cases, but a major one is often dealing with authenticated relaying of email.</t>
        </section>
        <section anchor="example-11-ssh-client">
          <name>Example 11: SSH client</name>
          <t>SSH servers have for some time been able to put their host keys into DNS using <xref target="RFC4255"/>.</t>
          <t>In many SSH server implementations the list of users that is authorized to login to an account is given by listing their public keys in a per-user file ("authorized_keys").
The file provides both authorization (who may login), and authentication (how they prove their identity).
While this is an implementation detail, doing both in one place has been one of Secure Shell's major reason for success.</t>
          <t>However, there are downsides to this: a user can not easily replace their key without visiting every host they are authorized to access and update the key on that host.
Separation of authorization and authentication in this case would involve putting the key material in a third place, such as in a DANE record in DNS, and then listing only the DNS owner name in the authorization file:</t>
          <ul spacing="normal">
            <li>
              <t>A user who wants to update their key need only update DNS in that case.</t>
            </li>
            <li>
              <t>A user who has lost access to their key, but can still update DNS (or can have a colleague update it) would more easily be able to recover.</t>
            </li>
            <li>
              <t>An administrator who controls the domain would be able to remove a departing user's key from DNS, preventing the user from authenticating in the future.</t>
            </li>
          </ul>
          <t>The DNS record used could be TLSA, but it is possible with some protocol work that it could instead be SSHFP.
Since SSH can trust CA certificates from X.509 <xref target="RFC6187"/>, those may be published for user authentication.</t>
        </section>
        <section anchor="example-12-network-access">
          <name>Example 12: Network Access</name>
          <t>Network access refers to an authentication process by which a node is admitted securely onto network infrastructure.
This is most common for wireless networks (wifi, 802.15.4), but has also routinely been done for wired infrastructure using 802.1X mechanisms with EAPOL.</t>
          <t>While there are EAP protocols that do not involve certificates, such as EAPSIM <xref target="RFC4186"/>, the use of symmetric key mechanisms as the "network key" <xref target="WPAPSK"/> (is common in many homes.
The use of certificate based mechanisms are expected to increase, due to challenges, such as Randomized and Changing MAC addresses (RCM), as described in <xref target="I-D.ietf-madinas-use-cases"/>.</t>
          <section anchor="eap-tls-with-radius">
            <name>EAP-TLS with RADIUS</name>
            <t>Enterprise EAP methods use a version of TLS to form a secure transport.
Client and server-side certificates are used as credentials.
EAP-TLS <xref target="RFC9190"/> does not run over TCP, but rather over a reliable transport provided by EAP.
To keep it simple the EAP "window" is always one, and there are various amounts of overhead that needs to be accounted for, and the EAP segment size is often noticeably smaller than the normal ethernet 1500 bytes.
<xref target="RFC3748"/> does guarantee a minimum payload of 1020 bytes.</t>
            <t>The client side certificates are often larger than 1500 bytes and can take two or three round trip times to transport from the supplicant to the authenticator.
In worst case scenarios, which are common with eduroam <xref target="RFC7593"/>, the EAP packets are transported some distance, easily across the entire planet.
The authenticating system (the "authentication server" in EAP terms) is a system at the institute that issued the client side certificate, and so already has access to the entire client certificate.
Transferring the client certificate is redundant.
That is, the authenticator already has access to the entire certificate, but the client does not know this to the case, so it sends the entire certificate anyway.</t>
            <t>The use of DANE Client IDs in TLS as described in <xref target="I-D.ietf-dance-tls-clientid"/> reduces the redundant bytes of certificate sent.</t>
            <section anchor="terminology">
              <name>Terminology</name>
              <t><strong>Supplicant:</strong> The entity which acts as the TLS client in the EAP-TLS authentication protocol.
This term is defined in IEEE 802.1x.
The suppliant acts as a client in the EAPOL (EAP over LAN) protocol, which is terminated at the authenticator (defined below).</t>
              <t><strong>Authentication server:</strong> The entity which acts as the TLS server in the EAP-TLS protocol.
RADIUS (RFC 2865) is a frequently-used authentication server protocol.</t>
              <t><strong>Authenticator:</strong> The authenticator is the device which acts as a server in the EAPOL (EAP over LAN) protocol, and is a client of the authentication server.
The authenticator is responsible for passing EAP messages between the supplicant and the authentication server, and for ensuring that only authenticated supplicants gain access to the network.</t>
              <t><xref target="EAP-TLS"/> is a mature and widely-used protocol for network authentication, for IoT and IT equipment.
IEEE 802.1x defines the encapsulation of EAP over LAN access technologies, like IEEE 802.11 wireless and IEEE 802.3 ethernet.
RADIUS is a protocol and server technology frequently used for supporting the server side of EAP-TLS authentication.
Guidance for implementing RADIUS strongly encourages the use of a single common CA for all supplicants, to mitigate the possibility of identifier collisions across PKIs.
The use of DANE for client identity can allow the safe use of any number of CAs.
DNS acts as a constraining namespace, which prevents two unrelated CAs from issuing valid certificates bearing the same identifier.
Certificates represented in DNS are valid, and all others are un-trusted.</t>
            </section>
          </section>
          <section anchor="radsec">
            <name>RADSEC</name>
            <t>The RADIUS protocol has a few recognized security problems.
<xref target="RADSEC"/> and <xref target="I-D.ietf-radext-radiusdtls-bis"/> addresses the challenges related to the weakness of MD5-based authentication and confidentiality over untrusted networks by establishing a TLS session between the RADIUS protocol client and the RADIUS protocol server.
The use of client-side certificates has been encouraged by the recent work.
There are no protocol or specification changes required to put client-side certificates into DNS.
The use of the <xref target="I-D.ietf-dance-client-id"/> with the created TLS connectio should suffice.
Note that this use cases addresses the security of the hop-by-hop RADIUS protocol, not the security of the end-to-end EAP(-TLS) session that might be carried within.</t>
          </section>
        </section>
        <section anchor="example-13-structured-data-messages-josecose">
          <name>Example 13: Structured data messages: JOSE/COSE</name>
          <t>JOSE and COSE provide formats for exchanging authenticated and encrypted structured data. JOSE defines the x5u field in <xref section="4.1.5" sectionFormat="comma" target="RFC7515"/>, and COSE defines a field of the same name in <xref section="2" sectionFormat="comma" target="I-D.ietf-cose-x509"/>.</t>
          <t>However, this URL field points to where the key can be found.
There is, as yet, no URI scheme which says that the key can be found via the DNS lookup itself.</t>
          <t>In order to make use of x5u, a DANCE protocol would have to define a new URI scheme that explained how to get the right key from DNS.</t>
        </section>
      </section>
    </section>
    <section anchor="protocol-implementations">
      <name>Protocol implementations</name>
      <t>For each protocol implementation, a specific usage document needs to be published. In this document,
the DANCE protocol requirements and usage needs to be specified (this is refered above as the "How to DANCE" document).
These documents should as a minimum contain the following sections:</t>
      <ul spacing="normal">
        <li>
          <t>Specifics on naming: How the name of the client is defined and how this is related to the name in
a DNS zone. This defines the organization of the related DNS zone. Whether a flat namespace is used,
or a way to use a DNS Zone hierarchy is applied to this usage. (see notes above on DNS zone design)</t>
        </li>
        <li>
          <t>Privacy: If the subject name is a personal identifier, how to protect that name from being exposed
in the DNS zone. <xref target="RFC7929"/> describes one way to handle privacy for personal identifiers in DNS.</t>
        </li>
        <li>
          <t>TTL: Recommended TTL settings for records in this usage</t>
        </li>
        <li>
          <t>Security: Security considerations for this usage</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>DNS clients should use DNS over TLS with trusted DNS resolvers to protect the identity of authenticating peers.</t>
      </section>
      <section anchor="integrity">
        <name>Integrity</name>
        <t>The integrity of public keys represented in DNS is most important.
An altered public key can enable device impersonation, and the denial of existence for a valid identity can cause devices to become un-trusted by the network or the application.
DNS records should be validated using the DNSSEC protocol.
When using a DNS stub resolver <xref target="RFC9499"/> rather than doing local validation, then the connection to the validating DNS resolver needs to be secured.</t>
        <t>Compartmentalizing failure domains within an application is a well-known architectural best practice.
Within the context of protecting DNS-based identities, this compartmentalization may manifest by hosting an identity zone on a DNS server which only supports the resource record types essential for representing device identities.
This can prevent a compromised identity zone DNS server from presenting records essential for impersonating web sites under the organization’s domain name.</t>
        <t>The naming pattern suggested in <xref target="I-D.ietf-dance-client-auth"/> includes
an underscore label (_device).
The underscore is not a valid character for names used in the Web PKI.
This prevents the issuance of any Web PKI-validating certificates for these names.</t>
        <t>This means that even were the authoritative DNS server compromised, it would not be possible to issue Web PKI certificates using, for instance, the <xref target="RFC8555"/> DNS-01 challenge.</t>
        <t>An alternative underscore label _user separates the TLSA records with the domain CA from the TLSA records for devices.</t>
      </section>
      <section anchor="availability">
        <name>Availability</name>
        <t>One of the advantages of DNS is that it has more than fourty years of demonstrated scaling.
It is a distributed database with a caching mechanism, and properly configured, it has proven resilient
to many kinds of outages and attacks.</t>
        <t>A key part of this availability is the proper use of Time To Live (TTL) values for resource records.
A cache is allowed to hang on to the data for a set time, the TTL, after which it must do a new query to find out if the data has changed, or perhaps been deleted.</t>
        <t>There is therefore a tension between resilience (higher TTL values), and agility (lower TTL values).
A lower TTL value allows for revocation or replacement of a key to become known much faster.
This allows for a more agile security posture.</t>
        <t>The TTL value is not enforced, which may lead to unexpected responses, like a malicious server
caching responses for a long time after the TTL for the record has expired. This may lead
to a situation where a revocation by removing the record from DNS doesn't come in
to effect as expected.</t>
        <t>On the other hand, lower TTLs cause the queries to occur more often,
which may reveal more information to an observer about which devices are active.
Encrypted transports like DoT/DoH/DoQ make these queries far less visible.
In addition to the on-path observer being able to see more, the resolver logs also may be a source of information.
It also allows for more opportunities for an attacker to affect the response time of the queries.</t>
      </section>
      <section anchor="tls-server-availability">
        <name>TLS Server availability</name>
        <t>TLS servers supporting DANCE should implement a list of domains that are valid for client authentication,
in order not to be open to DDOS attacks where a large number of clients force the server to do random DNS lookups.
More implementation details are to be found in the protocol specific documents.</t>
      </section>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>If the DNS owner name of the identity proven by a certificate is directly or indirectly relatable to a person, privacy needs to be considered when forming the name of the DNS resource record for the certificate.
This privacy is implied for domain users inasfar as the domain CA does not mention users.
When creating the DNS owner name, effects of DNS zone walking and possible harvesting of identities in the DNS zone will have to be considered.
The DNS owner name may not have to have a direct relation to the name of the subject or the subjectAltName of the certificate.
If there is such a relation, a DANCE protocol may specify support for CA certificates, stored under a wildcard in DNS.</t>
        <t>Further work has do be done in this area.</t>
        <section anchor="dns-scalability">
          <name>DNS Scalability</name>
          <t>In the use case for IoT, an implementation must be scalable to a large amount of devices.
In many cases, identities may also be very short lived as revocation is performed by simply removing a DNS record.
A zone will have to manage a large amount of changes as devices are constantly added and de-activated.</t>
          <t>In these cases it is important to consider the architecture of the DNS zone and when possible use a tree-like structure with many subdomain parts, much like reverse DNS records or how telephone numbers are represented in the ENUM standard (RFC 6116).</t>
          <t>If an authoritative resolver were configured to respond quite slowly using TCP, (for instance, a
<xref target="slowloris"/> attack), it possible that this would cause a TLS server to exhaust all it's TCP sockets.</t>
          <t>The availability of a client identity zone is essential to permitting clients to authenticate.
If the DNS infrastructure hosting client identities becomes unavailable, then the clients represented by that zone cannot be authenticated.</t>
        </section>
        <section anchor="change-of-ownership-for-iot-devices">
          <name>Change of ownership for IoT devices</name>
          <t>One of the significant use cases is where the devices are identified by their manufacturer assigned identities.
A significant savings was that enterprises would not have to run their own (private) PKI systems, sometimes even one system per device type.
But, with this usage style for DANCE there is no private PKI to run, and as a result there is no change of ownership required.
The device continues to use the manufacturer assigned identity.</t>
          <t>The device OwnerOperator is therefore at risk if the device's manufacturer goes out of business, or decides that they no longer wish to manufacturer that device.
Should that happen then the OwnerOperator of the device may be in trouble, and may find themselves having to replace the devices.</t>
          <t><xref section="10.4" sectionFormat="comma" target="RFC8995"/> (BRSKI) deals with concerns about manufacturers influence on devices.
In the case of BRSKI, the concern was limited to when the device ownership transfer was performed (the BRSKI transaction itself).
There was no concern once the OwnerOperator had taken control over the device through an <xref target="RFC8366"/> voucher.</t>
          <t>In the case of DANCE, the manufacturer is continuously involved with the day to day operation of the device.</t>
          <t>If this is of concern, then the OwnerOperator should perform some kind of transfer of ownership, such as using DPP, <xref target="RFC8995"/>(BRSKI), <xref target="RFC9140"/>(EAP-NOOB), and others yet to come.</t>
          <t>The DANCE method of using manufacturer assigned identities would therefore seem to be best used for devices which have a short lifetime: one much smaller than the uncertainty about the anticipated lifespan of the manufacturer.
For instance, some kind of battery operated sensor which might be used in a large quantity at a construction site, and which can not be recharged.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-dance-client-id">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <reference anchor="I-D.ietf-dance-client-auth">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>OpenSSL Corporation</organization>
            </author>
            <date day="19" month="September" year="2025"/>
            <abstract>
              <t>   The DANE TLSA protocol describes how to publish Transport Layer
   Security (TLS) server certificates or public keys in the DNS.  This
   document updates RFC 6698 and RFC 7671.  It describes how to
   additionally use the TLSA record to publish client certificates or
   public keys, and also the rules and considerations for using them
   with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="pkiiot">
          <front>
            <title>PKI for IoT using the DNS infrastructure</title>
            <author fullname="Sandoche Balakrichenan" initials="S." surname="Balakrichenan">
              <organization>Afnic</organization>
            </author>
            <author fullname="Ibrahim Ayoub" initials="I." surname="Ayoub">
              <organization>Afnic</organization>
            </author>
            <author fullname="Benoit Ampeau" initials="B." surname="Ampeau">
              <organization>Afnic</organization>
            </author>
            <date month="September" year="2022"/>
          </front>
          <seriesInfo name="2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)" value="pp. 1-8"/>
          <seriesInfo name="DOI" value="10.1109/pkia56009.2022.9952253"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="EAP-TLS">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RADSEC">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="slowloris" target="https://en.wikipedia.org/wiki/Slowloris_(computer_security)">
          <front>
            <title>Slowloris Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August" day="15"/>
          </front>
        </reference>
        <reference anchor="WPAPSK" target="https://www.wi-fi.org/system/files/WPA_80211_v3_1_090922.pdf">
          <front>
            <title>WPA (Wi-Fi Protected Access). v3.1 2004</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="October" day="20"/>
          </front>
        </reference>
        <reference anchor="RFC4422">
          <front>
            <title>Simple Authentication and Security Layer (SASL)</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="K. Zeilenga" initials="K." role="editor" surname="Zeilenga"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms. It provides a structured interface between protocols and mechanisms. The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms. The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t>
              <t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection. In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t>
              <t>This document obsoletes RFC 2222. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4422"/>
          <seriesInfo name="DOI" value="10.17487/RFC4422"/>
        </reference>
        <reference anchor="RFC5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4519">
          <front>
            <title>Lightweight Directory Access Protocol (LDAP): Schema for User Applications</title>
            <author fullname="A. Sciberras" initials="A." role="editor" surname="Sciberras"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>This document is an integral part of the Lightweight Directory Access Protocol (LDAP) technical specification. It provides a technical specification of attribute types and object classes intended for use by LDAP directory clients for many directory services, such as White Pages. These objects are widely used as a basis for the schema in many LDAP directories. This document does not cover attributes used for the administration of directory servers, nor does it include directory objects defined for specific uses in other documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4519"/>
          <seriesInfo name="DOI" value="10.17487/RFC4519"/>
        </reference>
        <reference anchor="RFC9598">
          <front>
            <title>Internationalized Email Addresses in X.509 Certificates</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="W. Chuang" initials="W." surname="Chuang"/>
            <author fullname="C. Bonnell" initials="C." surname="Bonnell"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name and Issuer Alternative Name extension that allows a certificate subject to be associated with an internationalized email address.</t>
              <t>This document updates RFC 5280 and obsoletes RFC 8398.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9598"/>
          <seriesInfo name="DOI" value="10.17487/RFC9598"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8376">
          <front>
            <title>Low-Power Wide Area Network (LPWAN) Overview</title>
            <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation. This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8376"/>
          <seriesInfo name="DOI" value="10.17487/RFC8376"/>
        </reference>
        <reference anchor="I-D.hong-t2trg-iot-edge-computing">
          <front>
            <title>IoT Edge Challenges and Functions</title>
            <author fullname="Jungha Hong" initials="J." surname="Hong">
              <organization>ETRI</organization>
            </author>
            <author fullname="Yong-Geun Hong" initials="Y." surname="Hong">
              <organization>ETRI</organization>
            </author>
            <author fullname="Xavier de Foy" initials="X." surname="de Foy">
              <organization>InterDigital Communications</organization>
            </author>
            <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
              <organization>Huawei Technologies Duesseldorf GmbH</organization>
            </author>
            <author fullname="Eve Schooler" initials="E." surname="Schooler">
              <organization>Intel</organization>
            </author>
            <author fullname="Dirk KUTSCHER" initials="D." surname="KUTSCHER">
              <organization>University of Applied Sciences Emden/Leer</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Many IoT applications have requirements that cannot be met by the
   traditional Cloud (aka cloud computing).  These include time
   sensitivity, data volume, uplink cost, operation in the face of
   intermittent services, privacy and security.  As a result, the IoT is
   driving the Internet toward Edge computing.  This document outlines
   the requirements of the emerging IoT Edge and its challenges.  It
   presents a general model, and major components of the IoT Edge, with
   the goal to provide a common base for future discussions in T2TRG and
   other IRTF and IETF groups.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hong-t2trg-iot-edge-computing-05"/>
        </reference>
        <reference anchor="I-D.johansson-sipcore-dane-sip">
          <front>
            <title>TLS sessions in SIP using DNS-based Authentication of Named Entities (DANE) TLSA records</title>
            <author fullname="Olle E. Johansson" initials="O. E." surname="Johansson">
              <organization>Edvina AB</organization>
            </author>
            <date day="6" month="October" year="2014"/>
            <abstract>
              <t>   Use of TLS in the SIP protocol is defined in multiple documents,
   starting with RFC 3261.  The actual verification that happens when
   setting up a SIP TLS connection to a SIP server based on a SIP URI is
   described in detail in RFC 5922 - SIP Domain Certificates.

   In this document, an alternative method is defined, using DNS-Based
   Authentication of Named Entities (DANE).  By looking up TLSA DNS
   records and using DNSsec protection of the required queries,
   including lookups for NAPTR and SRV records, a SIP Client can verify
   the identity of the TLS SIP server in a different way, matching on
   the SRV host name in the X.509 PKIX certificate instead of the SIP
   domain.  This provides more scalability in hosting solutions and make
   it easier to use standard CA certificates (if needed at all).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-johansson-sipcore-dane-sip-00"/>
        </reference>
        <reference anchor="RFC7817">
          <front>
            <title>Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document describes the Transport Layer Security (TLS) server identity verification procedure for SMTP Submission, IMAP, POP, and ManageSieve clients. It replaces Section 2.4 (Server Identity Check) of RFC 2595 and updates Section 4.1 (Processing After the STARTTLS Command) of RFC 3207, Section 11.1 (STARTTLS Security Considerations) of RFC 3501, and Section 2.2.1 (Server Identity Check) of RFC 5804.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7817"/>
          <seriesInfo name="DOI" value="10.17487/RFC7817"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="RFC6187">
          <front>
            <title>X.509v3 Certificates for Secure Shell Authentication</title>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="D. Stebila" initials="D." surname="Stebila"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>X.509 public key certificates use a signature by a trusted certification authority to bind a given public key to a given digital identity. This document specifies how to use X.509 version 3 public key certificates in public key algorithms in the Secure Shell protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6187"/>
          <seriesInfo name="DOI" value="10.17487/RFC6187"/>
        </reference>
        <reference anchor="RFC4186">
          <front>
            <title>Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM)</title>
            <author fullname="H. Haverinen" initials="H." role="editor" surname="Haverinen"/>
            <author fullname="J. Salowey" initials="J." role="editor" surname="Salowey"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Global System for Mobile Communications (GSM) Subscriber Identity Module (SIM). GSM is a second generation mobile network standard. The EAP-SIM mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and session keys of greater strength than the individual GSM triplets. The mechanism also includes network authentication, user anonymity support, result indications, and a fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4186"/>
          <seriesInfo name="DOI" value="10.17487/RFC4186"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-use-cases">
          <front>
            <title>Randomized and Changing MAC Address: Context, Network Impacts, and Use Cases</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yiu Lee" initials="Y." surname="Lee">
              <organization>Comcast</organization>
            </author>
            <date day="20" month="December" year="2024"/>
            <abstract>
              <t>   To limit the privacy issues created by the association between a
   device, its traffic, its location, and its user in [IEEE_802]
   networks, client and client Operating System vendors have started
   implementing MAC address randomization.  This technology is
   particularly important in Wi-Fi [IEEE_802.11] networks due to the
   over-the-air medium and device mobility.  When such randomization
   happens, some in-network states may break, which may affect network
   connectivity and user experience.  At the same time, devices may
   continue using other stable identifiers, defeating the MAC address
   randomization purposes.

   This document lists various network environments and a range of
   network services that may be affected by such randomization.  This
   document then examines settings where the user experience may be
   affected by in-network state disruption.  Last, this document
   examines two existing frameworks to maintain user privacy while
   preserving user quality of experience and network operation
   efficiency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-use-cases-19"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="I-D.ietf-dance-tls-clientid">
          <front>
            <title>TLS Extension for DANE Client Identity</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>OpenSSL Corporation</organization>
            </author>
            <date day="17" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-07"/>
        </reference>
        <reference anchor="I-D.ietf-radext-radiusdtls-bis">
          <front>
            <title>(Datagram) Transport Layer Security ((D)TLS) Encryption for RADIUS</title>
            <author fullname="Jan-Frederik Rieckers" initials="J." surname="Rieckers">
              <organization>Deutsches Forschungsnetz | German National Research and Education Network</organization>
            </author>
            <author fullname="Stefan Winter" initials="S." surname="Winter">
              <organization>Fondation Restena | Restena Foundation</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a transport profile for RADIUS using
   Transport Layer Security (TLS) over TCP or Datagram Transport Layer
   Security (DTLS) over UDP as the transport protocol.  This enables
   encrypting the RADIUS traffic as well as dynamic trust relationships
   between RADIUS servers.  The specification obsoletes the experimental
   specifications in RFC 6614 (RADIUS/TLS) and RFC 7360 (RADIUS/DTLS)
   and combines them in this specification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-radiusdtls-bis-09"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="13" month="October" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general.  For some algorithms, additional properties are defined that carry parameters relating to keys as needed.  The COSE Key structure is used for transporting keys outside of COSE messages.  This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-09"/>
        </reference>
        <reference anchor="RFC7929">
          <front>
            <title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys. DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS. This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record. Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the "web of trust" or manual verification. The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7929"/>
          <seriesInfo name="DOI" value="10.17487/RFC7929"/>
        </reference>
        <reference anchor="RFC8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8366" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8366.xml">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
      </references>
    </references>
    <?line 516?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
