<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-httpbis-secondary-server-certs-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="HTTP Server Secondary Cert Auth">Secondary Certificate Authentication of HTTP Servers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-secondary-server-certs-01"/>
    <author initials="E." surname="Gorbaty" fullname="Eric Gorbaty" role="editor">
      <organization>Apple</organization>
      <address>
        <email>e_gorbaty@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Bishop" fullname="Mike Bishop" role="editor">
      <organization>Akamai</organization>
      <address>
        <email>mbishop@evequefou.be</email>
      </address>
    </author>
    <date/>
    <area>art</area>
    <workgroup>HTTP</workgroup>
    <keyword>exported authenticators</keyword>
    <keyword>masque</keyword>
    <abstract>
      <?line 46?>

<t>This document defines a way for HTTP/2 and HTTP/3 servers to send additional
certificate-based credentials after a TLS connection is established, based
on TLS Exported Authenticators.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://httpwg.org/http-extensions/draft-ietf-httpbis-secondary-server-certs.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-httpbis-secondary-server-certs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/httpwg/http-extensions/labels/secondary-server-certs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP <xref target="HTTP"/> clients need to know that the content they receive on a
connection comes from the origin from which they intended to retrieve it. The
traditional form of server authentication in HTTP has been in the form of a
single X.509 certificate provided during the TLS <xref target="TLS13"/> handshake.</t>
      <t>TLS supports one server and one client certificate on a connection. These
certificates may contain multiple identities, but only one certificate may be
provided.</t>
      <t>Many HTTP servers host content from several origins. HTTP/2 <xref target="H2"/> and
HTTP/3 <xref target="H3"/> permit clients to reuse an existing HTTP connection to a
server provided that the secondary origin is also in the certificate provided
during the TLS handshake. In many cases, servers choose to maintain separate
certificates for different origins but still desire the benefits of a shared
HTTP connection. This document defines a capability for servers to use and
to authenticate with those seperate certificates over a shared connection.</t>
      <t>The ability to maintain seperate certificates for different origins can also
allow proxies that cache content from secondary origins to communicate to
clients that they can service some of those origins directly, allowing the
proxy to behave as a TLS-terminating reverse proxy for those origins instead of
establishing a TLS encrypted tunnel through the proxy.</t>
      <section anchor="server-certificate-authentication">
        <name>Server Certificate Authentication</name>
        <t><xref section="9.1.1" sectionFormat="of" target="H2"/> and <xref section="3.3" sectionFormat="of" target="H3"/> describe how connections may
be used to make requests from multiple origins as long as the server is
authoritative for both. A server is considered authoritative for an origin if
DNS resolves the origin to the IP address of the server and (for TLS) if the
certificate presented by the server contains the origin in the Subject
Alternative Names field.</t>
        <t><xref target="ALTSVC"/> enables a step of abstraction from the DNS resolution. If
both hosts have provided an Alternative Service at hostnames which resolve to
the IP address of the server, they are considered authoritative just as if DNS
resolved the origin itself to that address. However, the server's one TLS
certificate is still required to contain the name of each origin in question.</t>
        <t><xref target="ORIGIN"/> relaxes the requirement to perform the DNS lookup if already
connected to a server with an appropriate certificate which claims support for
a particular origin.</t>
        <t>Servers which host many origins often would prefer to have separate certificates
for some sets of origins. This may be for ease of certificate management
(the ability to separately revoke or renew them), due to different sources of
certificates (a CDN acting on behalf of multiple origins), or other factors
which might drive this administrative decision. Clients connecting to such
origins cannot currently reuse connections, even if both client and server
would prefer to do so.</t>
        <t>Because the TLS SNI extension is exchanged in the clear, clients might also
prefer to retrieve certificates inside the encrypted context. When this
information is sensitive, it might be advantageous to request a general-purpose
certificate or anonymous ciphersuite at the TLS layer, while acquiring the
"real" certificate in HTTP after the connection is established.</t>
      </section>
      <section anchor="tls-exported-authenticators">
        <name>TLS Exported Authenticators</name>
        <t>TLS Exported Authenticators <xref target="EXPORTED-AUTH"/> are structured messages
that can be exported by either party of a TLS connection and validated by the
other party. Given an established TLS connection, an authenticator message can
be constructed proving possession of a certificate and a corresponding private
key. The mechanisms that this document defines are primarily focused on the
server's ability to generate TLS Exported Authenticators.</t>
        <t>Each Authenticator is computed using a Handshake Context and Finished MAC Key
derived from the TLS session. The Handshake Context is identical for both
parties of the TLS connection, while the Finished MAC Key is dependent on
whether the Authenticator is created by the client or the server.</t>
        <t>Successfully verified Authenticators result in certificate chains, with verified
possession of the corresponding private key, which can be supplied into a
collection of available certificates. Likewise, descriptions of desired
certificates can also be supplied into these collections.</t>
      </section>
      <section anchor="http-layer-certificate-authentication">
        <name>HTTP-Layer Certificate Authentication</name>
        <t>This document defines HTTP/2 and HTTP/3 <tt>CERTIFICATE</tt> frames (<xref target="certs-http"/>) to
carry the relevant certificate messages, enabling certificate-based
authentication of servers independent of TLS version. This mechanism can be
implemented at the HTTP layer without breaking the existing interface between
HTTP and applications above it.</t>
        <t>TLS Exported Authenticators <xref target="EXPORTED-AUTH"/> allow the opportunity for an
HTTP/2 and HTTP/3 servers to send certificate frames which can be used to prove
the servers authenticity for multiple origins.</t>
        <t>This document additionally defines SETTINGS parameters for HTTP/2 and HTTP/3
(<xref target="settings"/>) that allow the client and server to indicate support for
HTTP-Layer certificate authentication.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="discovery">
      <name>Discovering Additional Certificates at the HTTP Layer</name>
      <t>A certificate chain with proof of possession of the private key corresponding to
the end-entity certificate is sent as a sequence of <tt>CERTIFICATE</tt> frames (see
<xref target="http2-cert"/>, <xref target="http3-cert"/>) to the client. Once the holder of a certificate
has sent the chain and proof, this certificate chain is cached by the recipient
and available for future use.</t>
      <section anchor="settings-usage">
        <name>Indicating Support for HTTP-Layer Certificate Authentication</name>
        <t>The <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> parameters for HTTP/2 and HTTP/3 are
defined in <xref target="settings"/> so that clients and servers can indicate support for
secondary certificate authentication of servers.</t>
        <t>HTTP/2 and HTTP/3 endpoints who wish to indicate support for HTTP-Layer
certificate authentication <bcp14>MUST</bcp14> send a <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>
parameter set to "1" in their SETTINGS frame. Endpoints <bcp14>MUST NOT</bcp14> use any of the
authentication functionality described in this document unless the parameter has
been negotiated by both sides.</t>
        <t>Endpoints <bcp14>MUST NOT</bcp14> send a <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> parameter with a
value of 0 after previously sending a value of 1.</t>
        <t><tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> indicates that servers are able to offer
additional certificates to demonstrate control over other origin hostnames, and
that clients are able to make requests for hostnames received in a TLS Exported
Authenticator that the server sends.</t>
      </section>
      <section anchor="cert-available">
        <name>Making Certificates Available</name>
        <t>When both peers have advertised support for HTTP-layer certificates in a given
direction as in <xref target="settings-usage"/>, the indicated endpoint can supply
additional certificates into the connection at any time. That is, if both
endpoints have sent <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> and validated the value
received from the peer, the server may send certificates spontaneously, at any
time, as described by the <tt>Spontaneous Server Authentication</tt> message sequence
in <xref section="3" sectionFormat="of" target="EXPORTED-AUTH"/>.</t>
        <t>This does mean that if a server knows it supports secondary certificate
authentication, and it receives <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> from the
client, that it can enqueue certificates immediately following the received
SETTINGS frame.</t>
        <t>Certificates supplied by servers can be considered by clients without further
action by the server. A server <bcp14>SHOULD NOT</bcp14> send certificates which do not cover
origins which it is prepared to service on the current connection, and <bcp14>SHOULD
NOT</bcp14> send them if the client has not indicated support with
<tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>.</t>
        <t>A client <bcp14>MUST NOT</bcp14> send certificates to the server. The server <bcp14>SHOULD</bcp14> close the
connection upon receipt of a CERTIFICATE frame from a client.</t>
        <figure anchor="ex-http-server-unprompted-basic">
          <name>Simple unprompted server authentication</name>
          <sourcecode type="drawing"><![CDATA[
Client                                        Server
   <-- (stream 0 / control stream) CERTIFICATE --
   ...
   -- (stream N) GET /from-new-origin ---------->
   <----------------------- (stream N) 200 OK ---
]]></sourcecode>
        </figure>
        <t>A server <bcp14>MAY</bcp14> send a <tt>CERTIFICATE</tt> immediately after sending its <tt>SETTINGS</tt>.
However, it <bcp14>MAY</bcp14> also send certificates at any time later. For example, a proxy
might discover that a client is interested in an origin that it can reverse
proxy at the time that a client sends a <tt>CONNECT</tt> request. It can then send
certificates for those origins to allow for TLS-terminated reverse proxying to
those origins for the remainder of the connection lifetime.
<xref target="ex-http-server-unprompted-reverse"/> illustrates this behavior.</t>
        <figure anchor="ex-http-server-unprompted-reverse">
          <name>Reverse proxy server authentication</name>
          <sourcecode type="drawing"><![CDATA[
Client                                        Server
   -- (stream N) CONNECT /to-new-origin -------->
   <-- (stream 0 / control stream) CERTIFICATE --
   <-- (stream 0 / control stream) 200 OK -------
   ...
   -- (stream M) GET /to-new-origin ------------>
   <--- (stream M, direct from server) 200 OK ---
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="settings">
      <name>SETTINGS_HTTP_SERVER_CERT_AUTH</name>
      <t>SETTINGS parameters for HTTP/2 and HTTP/3 seperately are defined below.</t>
      <section anchor="http2-setting">
        <name>The SETTINGS_HTTP_SERVER_CERT_AUTH HTTP/2 SETTINGS Parameter</name>
        <t>This document adds a new HTTP/2 SETTINGS(0xTBD) parameter to those defined by
<xref section="6.5.2" sectionFormat="of" target="H2"/>.</t>
        <t>The new parameter name is <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>. The value of the
parameter <bcp14>MUST</bcp14> be 0 or 1.</t>
        <t>The usage of this parameter is described in <xref target="settings-usage"/>.</t>
      </section>
      <section anchor="http3-setting">
        <name>The SETTINGS_HTTP_SERVER_CERT_AUTH HTTP/3 SETTINGS Parameter</name>
        <t>This document adds a new HTTP/3 SETTINGS(0xTBD) parameter to those defined by
<xref section="7.2.4.1" sectionFormat="of" target="H3"/>.</t>
        <t>The new parameter name is <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>. The value of the
parameter <bcp14>MUST</bcp14> be 0 or 1.</t>
        <t>The usage of this parameter is described in <xref target="settings-usage"/>.</t>
      </section>
    </section>
    <section anchor="certs-http">
      <name>CERTIFICATE frame</name>
      <t>The CERTIFICATE frame contains an exported authenticator message from the TLS
layer that provides a chain of certificates and associated extensions, proving
possession of the private key corresponding to the end-entity certificate.</t>
      <t>A server sends a CERTIFICATE frame on stream 0 for HTTP/2 and on the control
stream for HTTP/3. The client is permitted to make subsequent requests for
resources upon receipt of a CERTIFICATE frame without further action from the
server.</t>
      <t>Upon receiving a complete series of CERTIFICATE frames, the receiver may
validate the Exported Authenticator value by using the exported authenticator
API. This returns either an error indicating that the message was invalid or
the certificate chain and extensions used to create the message.</t>
      <section anchor="http2-cert">
        <name>HTTP/2 CERTIFICATE frame</name>
        <t>A CERTIFICATE frame in HTTP/2 (type=0xTBD) carrries a TLS Exported authenticator
that clients can use to authenticate secondary origins from a sending server.</t>
        <t>The CERTIFICATE frame <bcp14>MUST</bcp14> be sent on stream 0. A CERTIFICATE frame received on
any other stream <bcp14>MUST</bcp14> not be used for server authentication.</t>
        <figure>
          <name>HTTP/2 CERTIFICATE Frame</name>
          <artwork type="ascii-art"><![CDATA[
CERTIFICATE Frame {
  Length (24),
  Type (8) = 0xTBD,

  Unused Flags (8),

  Reserved (1),
  Stream Identifier (31) = 0,

  Authenticator (..),
}
]]></artwork>
        </figure>
        <t>The Length, Type, Unused Flag(s), Reserved, and Stream Identifier fields are
described in <xref section="4" sectionFormat="of" target="H2"/>.</t>
        <t>The CERTIFICATE frame does not define any flags.</t>
        <t>The authenticator field is a portion of the opaque data returned from the TLS
connection exported authenticator authenticate API. See <xref target="exp-auth"/> for more
details on the input to this API.</t>
        <t>The CERTIFICATE frame applies to the connection, not a specific stream. An
endpoint <bcp14>MUST</bcp14> treat a CERTIFICATE frame with a stream identifier other than
0x00 as a connection error.</t>
      </section>
      <section anchor="http3-cert">
        <name>HTTP/3 CERTIFICATE frame</name>
        <t>A CERTIFICATE frame in HTTP/3 (type=0xTBD) carrries a TLS Exported authenticator
that clients can use to authenticate secondary origins from a sending server.</t>
        <t>The CERTIFICATE frame <bcp14>MUST</bcp14> be sent on the control stream. A CERTIFICATE frame
received on any other stream <bcp14>MUST</bcp14> not be used for server authentication.</t>
        <figure>
          <name>HTTP/3 CERTIFICATE Frame</name>
          <artwork type="ascii-art"><![CDATA[
CERTIFICATE Frame {
  Type (i) = 0xTBD,
  Length (i),
  Authenticator (...),
}
]]></artwork>
        </figure>
        <t>The Type and Length fields are described in <xref section="7.1" sectionFormat="of" target="H3"/>.</t>
        <t>The authenticator field is a portion of the opaque data returned from the TLS
connection exported authenticator authenticate API. See <xref target="exp-auth"/> for more
details on the input to this API.</t>
        <t>The CERTIFICATE frame applies to the connection, not a specific stream. An
endpoint <bcp14>MUST</bcp14> treat a CERTIFICATE frame received on any stream other than the
control stream as a connection error.</t>
      </section>
      <section anchor="exp-auth">
        <name>Exported Authenticator Characteristics</name>
        <t>The Exported Authenticator API defined in <xref target="EXPORTED-AUTH"/> takes as input a
request, a set of certificates, and supporting information about the
certificate (OCSP, SCT, etc.). The result is an opaque token which is used
when generating the <tt>CERTIFICATE</tt> frame.</t>
        <t>Upon receipt of a <tt>CERTIFICATE</tt> frame, an endpoint which has negotiated support
for secondary certfiicates <bcp14>MUST</bcp14> perform the following steps to validate the
token it contains:</t>
        <ul spacing="normal">
          <li>
            <t>Using the <tt>get context</tt> API, retrieve the <tt>certificate_request_context</tt> used
to generate the authenticator, if any. Because the <tt>certificate_request_context</tt>
for spontaneous server certificates is chosen by the server, the usage of
the <tt>certificate_request_context</tt> is implementation-dependent. For details,
see <xref section="5" sectionFormat="of" target="EXPORTED-AUTH"/>.</t>
          </li>
          <li>
            <t>Use the <tt>validate</tt> API to confirm the validity of the authenticator with
regard to the generated request, if any.</t>
          </li>
        </ul>
        <t>If the authenticator cannot be validated, this <bcp14>SHOULD</bcp14> be treated as a connection
error.</t>
        <t>Once the authenticator is accepted, the endpoint can perform any other checks
for the acceptability of the certificate itself.</t>
      </section>
    </section>
    <section anchor="errors">
      <name>Indicating Failures During HTTP-Layer Certificate Authentication</name>
      <t>Because this document permits certificates to be exchanged at the HTTP framing
layer instead of the TLS layer, several certificate-related errors which are
defined at the TLS layer might now occur at the HTTP framing layer.</t>
      <t>There are two classes of errors which might be encountered, and they are handled
differently.</t>
      <section anchor="misbehavior">
        <name>Misbehavior</name>
        <t>This category of errors could indicate a peer failing to follow requirements in
this document or might indicate that the connection is not fully secure. These
errors are fatal to stream or connection, as appropriate.</t>
        <dl>
          <dt>CERTIFICATE_UNREADABLE (0xERROR-TBD):</dt>
          <dd>
            <t>An exported authenticator could not be validated.</t>
          </dd>
        </dl>
      </section>
      <section anchor="invalid-certificates">
        <name>Invalid Certificates</name>
        <t>Unacceptable certificates (expired, revoked, or insufficient to satisfy the
request) are not treated as stream or connection errors. This is typically not
an indication of a protocol failure. Clients <bcp14>SHOULD</bcp14> establish a new connection
in an attempt to reach an authoritative server if they deem a
certificate from the server unacceptable.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This mechanism defines an alternate way to obtain server and client certificates
other than in the initial TLS handshake. While the signature of exported
authenticator values is expected to be equally secure, it is important to
recognize that a vulnerability in this code path is at least equal to a
vulnerability in the TLS handshake.</t>
      <section anchor="impersonation">
        <name>Impersonation</name>
        <t>This mechanism could increase the impact of a key compromise. Rather than
needing to subvert DNS or IP routing in order to use a compromised certificate,
a malicious server now only needs a client to connect to <em>some</em> HTTPS site
under its control in order to present the compromised certificate. Clients
<bcp14>SHOULD</bcp14> consult DNS for hostnames presented in secondary certificates if they
would have done so for the same hostname if it were present in the primary
certificate.</t>
        <t>As recommended in <xref target="ORIGIN"/>, clients opting not to consult DNS ought to employ
some alternative means to increase confidence that the certificate is
legitimate, such as an <tt>ORIGIN</tt> frame.</t>
        <t>As noted in the Security Considerations of <xref target="EXPORTED-AUTH"/>, it is difficult to
formally prove that an endpoint is jointly authoritative over multiple
certificates, rather than individually authoritative on each certificate. As a
result, clients <bcp14>MUST NOT</bcp14> assume that because one origin was previously
colocated with another, those origins will be reachable via the same endpoints
in the future. Clients <bcp14>MUST NOT</bcp14> consider previous secondary certificates to be
validated after TLS session resumption. Servers <bcp14>MAY</bcp14> re-present certificates
if a TLS Session is resumed.</t>
      </section>
      <section anchor="fingerprinting">
        <name>Fingerprinting</name>
        <t>This document defines a mechanism which could be used to probe servers for origins
they support, but it opens no new attack that was not already possible by
making repeat TLS connections with different SNI values.</t>
      </section>
      <section anchor="persistence-of-service">
        <name>Persistence of Service</name>
        <t>CNAME records in the DNS are frequently used to delegate authority for an origin
to a third-party provider. This delegation can be changed without notice, even
to the third-party provider, simply by modifying the CNAME record in question.</t>
        <t>After the owner of the domain has redirected traffic elsewhere by changing the
CNAME, new connections will not arrive for that origin, but connections which
are properly directed to this provider for other origins would continue to
claim control of this origin (via Secondary Certificates). This is proper
behavior based on the third-party provider's configuration, but would likely
not be what is intended by the owner of the origin.</t>
        <t>This is not an issue which can be mitigated by the protocol, but something about
which third-party providers <bcp14>SHOULD</bcp14> educate their customers before using the
features described in this document.</t>
      </section>
      <section anchor="confusion-about-state">
        <name>Confusion About State</name>
        <t>Implementations need to be aware of the potential for confusion about the state
of a connection. The presence or absence of a validated certificate can change
during the processing of a request, potentially multiple times, as
<tt>CERTIFICATE</tt> frames are received. A client that uses certificate
authentication needs to be prepared to reevaluate the authorization state of a
request as the set of certificates changes.</t>
        <t>Behavior for TLS-Terminated reverse proxies is also worth considering. If a
server which situationally reverse-proxies wishes for the client to view a
request made prior to receipt of certificates as TLS-Terminated, or wishes for
the client to start a new tunnel alternatively, this document does not currently
define formal mechanisms to facilitate that intention.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the <tt>CERTIFICATE</tt> frame type and
<tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> setting for both <xref target="H2"/> and <xref target="H3"/>.</t>
      <section anchor="frame-types">
        <name>Frame Types</name>
        <t>This specification registers the following entry in the "HTTP/2 Frame Type"
registry defined in <xref target="H2"/>:</t>
        <t>Code: : TBD</t>
        <t>Frame Type: : CERTIFICATE</t>
        <t>Reference: : This document</t>
        <t>This specification registers the following entry in the "HTTP/3 Frame Types"
registry established by <xref target="H3"/>:</t>
        <t>Value: : TBD</t>
        <t>Frame Type: : CERTIFICATE</t>
        <t>Status: : permanent</t>
        <t>Reference: : This document</t>
        <t>Change Controller: : IETF</t>
        <t>Contact: : ietf-http-wg@w3.org</t>
      </section>
      <section anchor="settings-parameters">
        <name>Settings Parameters</name>
        <t>This specification registers the following entry in the "HTTP/2 Settings"
registry defined in <xref target="H2"/>:</t>
        <t>Code: : TBD</t>
        <t>Name: : SETTINGS_HTTP_SERVER_CERT_AUTH</t>
        <t>Initial Value: : 0</t>
        <t>Reference: : This document</t>
        <t>This specification registers the following entry in the "HTTP/3 Settings"
registry defined in <xref target="H3"/>:</t>
        <t>Code: : TBD</t>
        <t>Name: : SETTINGS_HTTP_SERVER_CERT_AUTH</t>
        <t>Default: : 0</t>
        <t>Reference: : This document</t>
        <t>Change Controller: : IETF</t>
        <t>Contact: : ietf-http-wg@w3.org</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="H2">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="H3">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="EXPORTED-AUTH">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ALTSVC">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="ORIGIN">
          <front>
            <title>The ORIGIN HTTP/2 Frame</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies the ORIGIN frame for HTTP/2, to indicate what origins are available on a given connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8336"/>
          <seriesInfo name="DOI" value="10.17487/RFC8336"/>
        </reference>
      </references>
    </references>
    <?line 526?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Mike Bishop, Nick Sullivan, Martin Thomson and other
contributors for their work on the document that this is based on.</t>
      <t>And thanks to Eric Kinnear, Tommy Pauly, and Lucas Pardue for their guidance and
editorial contributions to this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
