<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-giron-acme-pqcnegotiation-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="acme-algoneg">ACME PQC Algorithm Negotiation</title>
    <seriesInfo name="Internet-Draft" value="draft-giron-acme-pqcnegotiation-01"/>
    <author fullname="Alexandre Augusto Giron">
      <organization>UTFPR, Brazil</organization>
      <address>
        <email>alexandregiron@utfpr.edu.br</email>
      </address>
    </author>
    <date year="2023" month="July" day="30"/>
    <area>None</area>
    <workgroup>None</workgroup>
    <keyword>Automated Certificate Management Environment</keyword>
    <keyword>X.509 Certificates</keyword>
    <keyword>Post-Quantum Cryptography</keyword>
    <abstract>
      <?line 41?>

<t>ACME is a critical protocol for accelerating HTTPS adoption on the Internet, automating digital certificate issuing for web servers. Because RFC 8555 assumes that both sides (client and server) support the primary cryptographic algorithms necessary for the certificate, ACME does not include algorithm negotiation procedures. However, in light of Post-Quantum Cryptography (PQC), many signature algorithm alternatives can be used, allowing for different trade-offs (e.g., signature vs. public key size). In addition, alternative PQC migration strategies exist, such as KEMTLS, which employs KEM public keys for authentication. This document describes an algorithm negotiation mechanism for ACME. The negotiation allows different strategies and provides KEMTLS certificate issuing capabilities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="TBD"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-giron-acme-pqcnegotiation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/TBD"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Automated Certificate Management Environment (ACME) is defined in RFC 8555 <xref target="RFC8555"/>. ACME automates X.509 certificate issuance for Web Servers, thus easing the configuration process in providing encrypted channels over the Internet, often by using HTTPS/TLS protocols. Backed by the Let's Encrypt project, ACME has contributed to a secure Internet by giving the opportunity for system administrators and developers to secure their websites easily and free. ACME specifies how an ACME client can request a certificate to an ACME server with automation capabilities. The server requires a "proof" that the client holds control of the web server's identifier (often a domain name). After this validation process, the server can issue one or more "Domain Validated" (DV) certificate(s) so the client can configure an HTTPS server for the particular domain name(s).</t>
      <t>Basically, ACME requires three steps for the clients when issuing a certificate. First, a client creates an anonymous account to the desired ACME server. Note, however, that it is assumed that the client already trust in the ACME server's certificate, otherwise the client can not connect to the server securely. A secure channel between ACME peers is a requirement fulfilled often by a TLS connection, thus the client must trust in the certificate chain provided by the ACME server. Secondly, after creating an account, the ACME server must prove the ownership of an identifier (i.e., domain name) by means of an ACME challenge. Currently, HTTP-01, DNS-01 and TLS-ALPN-01 are standardized by IETF (others are being proposed, e.g., <xref target="I-D.ietf-acme-authority-token"/>. Lastly, after proving the control of the identifier, the client request a certificate by sending a Certificate-Signing Request (CSR) to the ACME server. The server validates the request and the CSR. If everything went ok, the client can download the requested certificate(s). Note the sequential process: account creation, challenge validation, and then requesting/issuing the certificate.</t>
      <t>In order to request and issue a certificate, ACME specification obligates implementations to support elliptical curve algorithm "ES256" <xref target="RFC7518"/> and state that they should support  the "Ed25519" algorithm <xref target="RFC8037"/>. Since the messages in ACME follows the JSON Web Signature standard <xref target="RFC7515"/>, the algorithm support details are specified outside ACME. Therefore, if an ACME server does not support the algorithm or a particular parameter that the client has requested, the server throws "badPublicKey", "badCSR" or "badSignatureAlgorithm" (RFC 8555, Section 6.7).</t>
      <t>The main problem caused by the absence of an algorithm negotiation procedure in ACME is that clients does not know in advance if the server has support to a particular algorithm for the certificate. Therefore, the client must create an account, perform the validation, send a CSR and then receive an error ("badPublicKey"). This "trial-and-error" process  spends client and server resources inefficiently. Having an algorithm negotiation process, the client could check several ACME servers until the client finds the support it needs, without wasting time creating an account and validating the domain for each one of the servers.</t>
      <t>Currently, NIST is selecting Post-Quantum Cryptography (PQC) algorithms for standardization. Dilithium (primary), Falcon, and Sphincs+ have been selected, but other signature algorithms may appear. Similarly, Kyber was selected for standardization as a Key Encapsulation Mechanism (KEM), but others are still candidates (BIKE, HQC, Classic McEliece). Some of these algorithms are probably going to replace the classical alternatives, such as "RS256" and "ES256", since the latter are known to be vulnerable to a Cryptographically Relevant Quantum Computer <xref target="PQC"/>. The PQC algorithms have several parameters, not to mention the "hybrid mode", combining them to the classical alternatives. One can expect that, in the near future, ACME clients will chose the best PQC algorithm (and the mode) that better suit its needs.  Consequently, the HTTPS/TLS servers will be able to secure their connections against the quantum threat.</t>
      <t>In the PQC migration context, TLS has a promising alternative called KEMTLS <xref target="KEMTLS"/>. KEMTLS replaces digital signatures in TLS handshakes by using a KEM algorithm. Therefore, a KEMTLS server must have a KEM certificate: a digital certificate containing the web server's KEM public key and a signature provided by the CA. As of now, ACME does not support KEM algorithms for certificates.</t>
      <t>On the other hand, Güneysu et al. showed how to build a CSR-like process to issue a KEM certificate <xref target="VerifiableGeneration"/>. In theory, ACME could use such a method to issue a KEM certificate without significant changes at the protocol level. However, PoP using verifiable generation for KEMs has some drawbacks, e.g.:</t>
      <ul spacing="normal">
        <li>So far, the method is proposed for Kyber and FrodoKEM only. Although the method can also be applied to other algorithms, the security proofs are on a "per-algorithm" basis.</li>
        <li>The method increase sizes, consequently increasing the communication cost for the ACME's protocol.</li>
      </ul>
      <t>The emphasis of this document is on the KEMTLS certificate use case. KEMTLS aims to reduce the size of cryptographic objects for the PQC migration context. KEMTLS can reduce byte costs for a post-quantum TLS but at the cost of increasing sizes in ACME by using verifiable generation processes.</t>
      <t>This document describes an algorithm negotiation procedure for ACME. The process gives flexibility for ACME clients to select the certificate algorithm that better fits its needs, with the PQC landscape options in mind. The document also specifies options for  ACME peers when negotiate a KEM certificate issuance, with or without a CSR-like process, thus contributing to the KEMTLS adoption.</t>
    </section>
    <section anchor="certificate-algorithm-negotiation">
      <name>Certificate Algorithm Negotiation</name>
      <t>With flexibility in mind, by using the process described in this document, ACME servers allow the following options for their clients:</t>
      <ul spacing="normal">
        <li>OPTION 1 (PQTLS): Client account keys and certificate keys are from signature scheme(s). Certificates are signed, i.e., Issuer CA uses digital signature keys). The issuance process is the same as specified in RFC 8555 <xref target="RFC8555"/>.</li>
        <li>OPTION 2 (KEMTLS): Client account keys use a signature scheme; Certificate keys are from a KEM. Certificates are signed by the Issuer CA key. The issuance process is modified as specified in this document.</li>
        <li>OPTION 3 (KEM-POP): Client account keys use a signature scheme; Certificate keys are from a KEM. Certificates are signed by the Issuer CA key. The issuance process is the same as specified in RFC 8555 <xref target="RFC8555"/> (not covered in this document, please refer to <xref target="VerifiableGeneration"/> for a discussion).</li>
      </ul>
      <t>Given that a KEMTLS certificate handles two algorithms (a KEM and a signature), and the possible trade-offs in different use cases (such as IoT <xref target="KEMTLS-BENCH-IOT"/>, this document specifies clients to negotiate not only what is the desired KEM scheme, but also what is the signature that the Issuer CA is willing to use. Such a detailed negotiation for the certificate better address the application's needs. On the other hand, the negotiation described here is simplified  for signature-based certificates (PQTLS option), where only one digital signature scheme is requested by the client.</t>
      <section anchor="cert-algorithms-endpoint">
        <name>Cert-algorithms endpoint</name>
        <t>In order to allow ACME client implementations to select their preferred certificate algorithms, this document specifies servers to implement a new endpoint named /cert-algorithms. The new endpoint can be reached after a GET /dir (see Figure 1 below). The client does not need to create an account with the server, thus saving resources. As PQC standardization evolves, this document does not specify one default configuration or algorithm. ACME implementations can select their preferred (or default) configurations, but they should also allow users to choose at least in the first certificate issuance (renewals can be automated with the same configuration).</t>
        <t>+------+                       +------+
 | ACME |                       | ACME |
 |Client|                       |Server|
 +--+---+                       +--+---+
    |    GET /dir                  |
    |-----------------------------&gt;|
    +------------------------------+
    |                   HTTP 200   |
    |                              |
    |    GET /new-nonce            |
    |-----------------------------&gt;|
    |&lt;-----------------------------+
    |                   HTTP 200   |
    |                              |
    |    GET /cert-algorithms      |
    |-----------------------------&gt;|
    |&lt;-----------------------------+
    |                   HTTP 200   |</t>
        <t>Figure 1: Obtaining algorithm support information</t>
        <t>Depending on the server's support, the server might implement one or several classical, PQC, and hybrid PQC algorithms for certificates. In this context, hybrid algorithms are often called "composite" <xref target="I-D.ounsworth-pq-composite-sigs"/>, in which cryptographic objects are concatenated in a single structure. If the algorithm supported by the server is a signature algorithm, the server replies with the corresponding OID; this is the same as if hybrids are allowed (assuming the composite model and corresponding OIDs <xref target="I-D.ounsworth-pq-composite-keys"/><xref target="I-D.ounsworth-pq-composite-sigs"/>. Nevertheless, by means of this new algorithm negotiation endpoint, clients can verify in advance if the server supports the desired algorithms.</t>
      </section>
      <section anchor="algorithm-list-definition">
        <name>Algorithm List Definition</name>
        <t>Upon HTTP GET requests to the /cert-algorithms endpoint, ACME servers reply with a JSON-formatted list of supported algorithms, as follows:</t>
        <t>{
     "PQTLS": {
       "Dilithium2": "1.3.6.1.4.1.2.267.7.4.4",
       "P256_Dilithium2": "1.3.9999.2.7.1",
       "Dilithium3" : "1.3.6.1.4.1.2.267.7.6.5",
        ...
     },
     "KEMTLS": {
       "Kyber-512-with-Dilithium2-sha256": "Kyber-512-with-Dilithium2-sha256",
       "P256-Kyber-512-with-P256-Dilithium2-sha256": "P256-Kyber-512-with-P256-Dilithium2-sha256"
       ...
     },
     "KEM-POP" : {
       "Kyber": "Reserved-TBD",
       "FrodoKEM" : "Reserved-TBD",
     }
}</t>
        <t>Servers <bcp14>MUST</bcp14> provide such a list with at least one algorithm. Note the distinction between Signatures, KEMTLS, and KEM-POP, as an alternative to telling the clients a different naming to support (possibly) different issuance processes. Moreover, the OIDs presented on this list are from the OQS project <xref target="OQS"/>, but they are subject to change whenever the Internet drafts evolve (such as <xref target="I-D.ounsworth-pq-composite-keys"/>).</t>
      </section>
    </section>
    <section anchor="kem-certificate-issuance-modes">
      <name>KEM Certificate Issuance Modes</name>
      <t>ACME Certificate issuance process does not require modifications when issuing PQC signature certificates. However, this document proposes the following changes to the ACME protocol for KEM certificates. Assuming that the ACME client has already performed account registration and challenge, Figures 2 and 3 show two ways to issue a KEM certificate. Figure 2 requires 3 RTTs, while Figure 3 optimizes performance to 1 RTT. The main difference is that the optimized mode does not guarantee key confirmation. The 1-RTT mode is similar to the "Indirect Method" of PoP defined in RFC 4210 <xref target="RFC4210"/>. ACME servers <bcp14>SHOULD</bcp14> enforce the 3-RTT mode if they require a confirmation that the client actually possesses the certificate's private key. If performance is desired, the 1-RTT mode is suitable since it reduces the number of signed requests and polling time.</t>
      <artwork><![CDATA[
 +------+                       +------+                    +------+                       +------+
 | ACME |                       | ACME |                    | ACME |                       | ACME |
 |Client|                       |Server|                    |Client|                       |Server|
 +--+---+                       +--+---+                    +--+---+                       +--+---+
    |                              |                           |                              |
    |pk,sk <- KEM.Keygen()         |                           |pk,sk <- KEM.Keygen()         |
    |                              |                           |                              |
    | POST /finalize [pk,mode]     |                           | POST /finalize [pk,mode]     |
    |----------------------------->|                           |----------------------------->|
    |                              |                           |                              |
    |        Z,ct <- KEM.Encaps(pk)|                           |        Z,ct <- KEM.Encaps(pk)|
    |  ct                          |                           |        enc_cert <-enc(Z,cert)|
    |<-----------------------------+                           | ct,enc_cert                  |
    |                              |                           |<-----------------------------+
    |Z <- KEM.Decaps(ct,sk)        |                           |                              |
    |                              |                           |Z <- KEM.Decaps(ct,sk)        |
    | POST /key-confirm [Z]        |                           |cert <- dec(Z,enc_cert)       |
    |----------------------------->|                           |                              |
    |<-----------------------------+
    |                   HTTP 200   |
    |                     or 401   |
    | POST /certZ                  |                   [ ] Message signed by the client's account
    |----------------------------->|                       key
    |<-----------------------------+
    |           application-pem    |
]]></artwork>
      <t>Figure 2: 3-RTT KEMTLS Certificate Issuance Process        Figure 3: 1-RTT KEMTLS Certificate Issuance Process</t>
      <t>Figure 2 shows the 3-RTT mode. The client can not use a CSR for a KEMTLS certificate, so it generates a key pair and send a "modified CSR", where the public key is a KEM public key, and the signature is random (dummy) data. The server then identifies and extracts the mode and the KEM public key from the modified CSR. Having implemented the KEM algorithm, the server encapsulates under the client's public key sending back the ciphertext to the client. The client performs a decapsulation and confirms the shared secret using the /key-confirm endpoint. ACME servers willing to issue KEMTLS certificates <bcp14>MUST</bcp14> implement this endpoint.</t>
      <t>Figure 3 shortens the KEMTLS process because it replies a ciphertext and the encrypted certificate before key confirmation. Since it is encrypted, clients without the private key cannot use the certificate. Having the private key, the client decapsulates the shared secret Z and derives a symmetric key from it (see Section 3.2). The symmetric key is used to decrypt the certificate. In this way, issuing a KEMTLS certificate does not impose additional RTTs compared to the 1-RTT CSR standard process, i.e., POSTing a CSR to /finalize. The 3-RTT mode, on the other hand, imposes the RTT related to the key-confirmation endpoint.</t>
      <t>Note, however, that key confirmation can be addressed differently in the 1-RTT mode. First, ACME servers could limit the use of this mode or ask for a delayed key confirmation, depending on CA policies (see Section 5 for a discussion). Secondly, if required, ACME servers could establish a TLS handshake with the client's domain at a later (perhaps more convenient) moment. A valid TLS handshake would tell that the client could use the encrypted certificate, thus proving possession of the private key. Lastly, for the applications where it is enough to prove possession of the account's private key (and not the certificate), the 1-RTT mode could be used.</t>
      <section anchor="post-examples">
        <name>POST Examples</name>
        <t>Considering the first POST to /finalize (Figure 2), which would be similar to a standard POST <xref target="RFC8555"/>, an example of a reply would be as follows. This example considers a CSR built with a KEM public key (Kyber-512) and dummy data in the CSR's signature.</t>
        <t>HTTP/1.1 200 OK
Content-Type: application/json
Replay-Nonce: CGf81JWBsq8QyIgPCi9Q9X
Link: <eref target="https://example.com/acme/directory">https://example.com/acme/directory</eref>;rel="index"
{
  "key-confirm-data": {
    "ct": "9HwLdArXTDC/otcTWNWYcOgRxWOeUahZj3Ri7SrKlCo4syv...Cl79urEXkhoUhWcqWzb2",
    "ct-alg": "Kyber-512"
  },
  "key-confirm-url": "https://example.com/key-confirm/Rg5dV14Gh1Q"
}</t>
        <t>Note that this reply contains the 'key-confirm-data' and 'key-confirm-url' so ACME clients can proceed accordingly. After decapsulating the shared secret from "ct", the client can POST to the key confirm URL.</t>
        <t>POST /key-confirm/Rg5dV14Gh1Q HTTP/1.1
Host: example.com
Content-Type: application/jose+json</t>
        <t>{
     "protected": base64url({
       "alg": "Dilithium2",
       "kid": "https://example.com/acme/acct/evOfKhNU60wg",
       "nonce": "Q_s3MWoqT05TrdkM2MTDcw",
       "url": "https://example.com/key-confirm/Rg5dV14Gh1Q"
     }),
     "payload": base64url({
       "Z": "r0Sk+fqvfceIetPIdszNs7PMylb3G/B536mZDj0B8Rs="
     }),
     "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}</t>
        <t>The POST is signed with Dilithium2 in this example. Note that the client is sending "Z" back in a secure channel (i.e., an underlying TLS connection between the ACME peers), so Z is not being disclosed to a passive attacker. The shared secret Z is used to prove the private key's possession. The ACME server compares the received Z with the order's information and starts issuing the certificate. If Z mismatches the server's storage, an HTTP error 401 is sent. If Z matches, there are no further modifications in the protocol, so the client and server proceed as RFC 8555 <xref target="RFC8555"/> dictates, i.e., clients start polling until their certificates are ready to be downloaded.</t>
      </section>
      <section anchor="deriving-keys-for-encrypting-a-kem-certificate">
        <name>Deriving keys for encrypting a KEM Certificate</name>
        <t>When using the 1-RTT mode for KEM certificate issuance, ACME peers <bcp14>MUST</bcp14> implement a Key-Derivation Function (KDF) and a Symmetric encryption algorithm. Since ACME can be considered as a "TLS-enabler" protocol, and for simplicity of implementations, ACME peers <bcp14>SHOULD</bcp14> provide HKDF <xref target="RFC5869"/> (as in TLS <xref target="RFC8446"/>) to derive the keys for encrypting the certificate. The hash function for  HKDF is obtained from the ciphersuite (see Section 3.3 below).</t>
        <t>Following the notation provided in RFC 5869, for the 1-RTT mode, ACME peers <bcp14>SHOULD</bcp14> implement the following "two-step" Key-Derivation Method:</t>
        <t>PRK &lt;- HKDF-Extract(salt, Z)
   OKM &lt;- HKDF-Expand(PRK, info, L)</t>
        <t>where Z is the KEM output (shared secret), salt is an optional and non-secret random value, PRK is the intermediary pseudorandom key, info is optional context information, L is the length of OKM, and OKM is the output keying material. The length of OKM (in octets) depends on the ciphersuite. This document recommends filling the 'salt' octets with the Key Authorization String (KAS)  and the 'info' field as the hash of the POST /finalize message. Note that the OKM can comprise the key (using OKM's left-most bytes) and Initialization Vectors (IVs), if required, in the OKM's right-most bytes.</t>
      </section>
      <section anchor="encrypting-a-kem-certificate-in-a-jwe-message">
        <name>Encrypting a KEM Certificate in a JWE message</name>
        <t>Section 5.1 in RFC 7518 <xref target="RFC7518"/> defines a set of symmetric algorithms for encryting JSON-formatted messages. The encrypted certificate <bcp14>SHOULD</bcp14> be sent in a JWE Ciphertext format specified in RFC 7516 <xref target="RFC7516"/>. Following Section 5.1 of RFC 7516, ACME servers encrypts M as the base64-encoded certificate using OKM. No Key agreement is performed at the JWE domain, thus ACME peers <bcp14>MUST</bcp14> perform JWE Direct Encryption, i.e., selecting "dir" as the "alg" field  (Section 4.1 of RFC 7518 <xref target="RFC7518"/>) and one encryption algorithm defined in Section 5.1 of RFC 7518 <xref target="RFC7518"/> for the "enc" field in the JOSE header. As a result, the JWE message contains only the ciphertext field and the header; the remaining JWE fields are absent (note that it could mean empty or zero-ed octets). ACME clients decrypt the JWE Ciphertext following Section 5.2 of RFC 7516.</t>
        <t>When receiving an encrypting certificate, it concludes the 1-RTT mode. Therefore, there is no need for the ACME peers to exchange further JWS messages. On the other hand, depending on CA policies, ACME servers could allow a POST in /key-confirm endpoint in a later moment, if a delayed key confirmation is desired. Such a policy could be use to limit the usage of the 1-RTT mode, if desired, for example enforcing 3-RTT mode if a previous 1-RTT was not later "key confirmed" or checked by a TLS handshake (between the ACME server and the ACME client's domain that was  certified).</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>KEM Certificate: a X.509 certificate where the subject's public key is from a Key-Encapsulation Mechanism (KEM) but the signature comes from the Issuer Certificate Authority (CA) digital signature scheme.</t>
      <t>3-RTT Mode: a modification in ACME to allow issuance of KEM certificates with explicit key confirmation.</t>
      <t>1-RTT Mode: a modification in ACME to allow issuance of KEM certificates without key confirmation, delayed or implicit key confirmation.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>RFC 8555 <xref target="RFC8555"/> states that ACME relies on a secure channel, often provided by TLS. In this regard, this document does not impose any changes. The first modification is the /cert-algorithms endpoint, which should be open for clients to query. ACME servers could control the number of queries to this endpoint by controlling the nonces to avoid Denial-of-Service (DoS). The second modification is a feature; ACME servers can now support KEM certificates in an automated way. In both modifications, one question is about the security of the supported algorithms (i.e., select which algorithms to support). The recommendations in this document are built upon the announced standards by NIST. Given the ongoing PQC standardization, new algorithms and attacks on established schemes can appear, meaning that the recommendation for algorithm support can change in the future.</t>
      <t>RFC 8555 states that ACME clients prove the possession of the private keys for their certificate requests <xref target="RFC8555"/>. This document follows this guideline explicitly in the 3-RTT mode for KEM certificates. On the other hand, in the 1-RTT mode, key confirmation is implicit. It is assumed that an encrypted KEM certificate is not useful to anyone but the owner of the KEM private key. Therefore, if the certificate is being used, the client holds the private key as expected. Moreover, this document provides a guideline on performing a "delayed" key confirmation, i.e., by separately POSTing to the /key-confirm endpoint. An alternate solution would be for the ACME server to monitor TLS usage by the client's domain, also as an implicit way to confirm proof of possession.</t>
      <section anchor="integration-with-other-ecosystems">
        <name>Integration with other ecosystems</name>
        <t>The 3-RTT mode provides explicit key confirmation, which complies with RFC 8555, and it is also easier to integrate with other ecosystems, such as Certificate Transparency <xref target="RFC9162"/>. However, the 1-RTT mode imposes challenges, such as publishing the certificate without (prior) key confirmation. One solution would be a delayed log, in which the CA awaits key confirmation or perform a TLS handshake with the client's domain. If full integration is required, it would be easier to manage if the 3-RTT mode is enforced by default.</t>
      </section>
      <section anchor="revocation-considerations">
        <name>Revocation Considerations</name>
        <t>Section 7.6 (RFC 8555 <xref target="RFC8555"/>) allows clients to sign a revocation request using the certificate's private key under revocation or by using account keys. For KEM certificates, revocation <bcp14>SHOULD</bcp14> be performed using the account keys. An alternative solution could be implemented as follows:</t>
        <ul spacing="normal">
          <li>The client performs a POST to /revoke-cert endpoint as specified in RFC 8555, but including the KEM public key under revocation as the "jwk" field and the KEM certificate as the "certificate" field. The "signature" <bcp14>SHOULD</bcp14> be random (dummy) data.</li>
          <li>ACME servers can distinguish such a request from the original ones since they can identify the KEM public key from the "alg" in the header and in the certificate. The ACME server generates and responds with "key-confirm-data" and "key-confirm-url", similar to Section 3.1.</li>
          <li>The ACME client completes the revocation process by POSTing to key-confirm-url in the same way as described in Section 3.1. The main distinction is that the "signature" <bcp14>SHOULD</bcp14> contain random (dummy) data. Such a URL should be specially created for revocation purposes so that the server does not verify the signature only if the shared secret matches the earlier encapsulation process.</li>
        </ul>
      </section>
      <section anchor="grease-csr">
        <name>"Grease" CSR</name>
        <t>When issuing KEM certificates, this document proposed not verifying the CSR for compatibility purposes. It is inspired in GREASE mode <xref target="I-D.ietf-tls-esni"/>, the Encrypted ClientHello feature can damage middlebox implementations. In ACME, servers might try to instantiate standard CSR objects from the POST request data. Random (dummy) data as a signature object in CSRs would avoid breaking implementations. However, ACME servers <bcp14>MUST</bcp14> allow grease CSRs only if the subject's public key algorithm is a KEM.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="I-D.ounsworth-pq-composite-sigs">
          <front>
            <title>Composite Signatures For Use In Internet PKI</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>CableLabs</organization>
            </author>
            <date day="29" month="May" year="2023"/>
            <abstract>
              <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptanalysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key,
   signature, or key encapsulation mechanism (KEM) such that they can be
   treated as a single atomic object at the protocol level.

   This document defines the structures CompositeSignatureValue, and
   CompositeSignatureParams, which are sequences of the respective
   structure for each component algorithm.  The explicit variant is
   defined which allows for a set of signature algorithm identifier OIDs
   to be registered together as an explicit composite signature
   algorithm and assigned an OID.

   This document is intended to be coupled with corresponding documents
   that define the structure and semantics of composite public and
   private keys and encryption [I-D.ounsworth-pq-composite-keys],
   however may also be used with non-composite keys, such as when a
   protocol combines multiple certificates into a single cryptographic
   operation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-sigs-09"/>
        </reference>
        <reference anchor="I-D.ounsworth-pq-composite-keys">
          <front>
            <title>Composite Public and Private Keys For Use In Internet PKI</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>D-Trust GmbH</organization>
            </author>
            <date day="29" month="May" year="2023"/>
            <abstract>
              <t>   The migration to post-quantum cryptography is unique in the history
   of modern digital cryptography in that neither the old outgoing nor
   the new incoming algorithms are fully trusted to protect data for the
   required data lifetimes.  The outgoing algorithms, such as RSA and
   elliptic curve, may fall to quantum cryptalanysis, while the incoming
   post-quantum algorithms face uncertainty about both the underlying
   mathematics as well as hardware and software implementations that
   have not had sufficient maturing time to rule out classical
   cryptanalytic attacks and implementation bugs.

   Cautious implementers may wish to layer cryptographic algorithms such
   that an attacker would need to break all of them in order to
   compromise the data being protected using either a Post-Quantum /
   Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or
   combinations thereof.  This document, and its companions, defines a
   specific instantiation of hybrid paradigm called "composite" where
   multiple cryptographic algorithms are combined to form a single key,
   signature, or key encapsulation mechanism (KEM) such that they can be
   treated as a single atomic object at the protocol level.

   This document defines the structures CompositePublicKey and
   CompositePrivateKey, which are sequences of the respective structure
   for each component algorithm.  Explicit pairings of algorithms are
   defined which should meet most Internet needs.

   This document is intended to be coupled with corresponding documents
   that define the structure and semantics of composite signatures and
   encryption, such as [I-D.ounsworth-pq-composite-sigs] and
   [I-D.ounsworth-pq-composite-kem].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ounsworth-pq-composite-keys-05"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="T. Mononen" initials="T." surname="Mononen"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="KEMTLS">
          <front>
            <title>Post-Quantum TLS Without Handshake Signatures</title>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>Max Planck Institute for Security and Privacy &amp;amp; Radboud University, Bochum, Germany</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo, Waterloo, ON, Canada</organization>
            </author>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization>Radboud University, Nijmegen, Netherlands</organization>
            </author>
            <date month="October" year="2020"/>
          </front>
          <seriesInfo name="Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3372297.3423350"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="KEMTLS-BENCH-IOT">
          <front>
            <title>KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems</title>
            <author fullname="Ruben Gonzalez" initials="R." surname="Gonzalez">
              <organization/>
            </author>
            <author fullname="Thom Wiggers" initials="T." surname="Wiggers">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="Security, Privacy, and Applied Cryptography Engineering" value="pp. 99-117"/>
          <seriesInfo name="DOI" value="10.1007/978-3-031-22829-2_6"/>
          <seriesInfo name="ISBN" value="[&quot;9783031228285&quot;, &quot;9783031228292&quot;]"/>
          <refcontent>Springer Nature Switzerland</refcontent>
        </reference>
        <reference anchor="VerifiableGeneration">
          <front>
            <title>Proof-of-Possession for KEM Certificates using Verifiable Generation</title>
            <author fullname="Tim Güneysu" initials="T." surname="Güneysu">
              <organization>Ruhr University Bochum, Horst Görtz Institute for IT-Security &amp;amp; DFKI GmbH, Cyber-Physical Systems, Bochum, Germany</organization>
            </author>
            <author fullname="Philip Hodges" initials="P." surname="Hodges">
              <organization>University of Waterloo, Waterloo, ON, Canada</organization>
            </author>
            <author fullname="Georg Land" initials="G." surname="Land">
              <organization>Ruhr University Bochum, Horst Görtz Institute for IT-Security &amp;amp; DFKI GmbH, Cyber-Physical Systems, Bochum, Germany</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust, Ottawa, ON, Canada</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo, Waterloo, ON, Canada</organization>
            </author>
            <author fullname="Greg Zaverucha" initials="G." surname="Zaverucha">
              <organization>Microsoft Research, Redmond, WA, USA</organization>
            </author>
            <date month="November" year="2022"/>
          </front>
          <seriesInfo name="Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3548606.3560560"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="OQS">
          <front>
            <title>Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization/>
            </author>
            <author fullname="Michele Mosca" initials="M." surname="Mosca">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="Lecture Notes in Computer Science" value="pp. 14-37"/>
          <seriesInfo name="DOI" value="10.1007/978-3-319-69453-5_2"/>
          <seriesInfo name="ISBN" value="[&quot;9783319694528&quot;, &quot;9783319694535&quot;]"/>
          <refcontent>Springer International Publishing</refcontent>
        </reference>
        <reference anchor="PQC">
          <front>
            <title>Post-quantum cryptography</title>
            <author fullname="Daniel J. Bernstein" initials="D." surname="Bernstein">
              <organization/>
            </author>
            <author fullname="Tanja Lange" initials="T." surname="Lange">
              <organization/>
            </author>
            <date month="September" year="2017"/>
          </front>
          <seriesInfo name="Nature" value="vol. 549, no. 7671, pp. 188-194"/>
          <seriesInfo name="DOI" value="10.1038/nature23461"/>
          <refcontent>Springer Science and Business Media LLC</refcontent>
        </reference>
        <reference anchor="I-D.ietf-acme-authority-token">
          <front>
            <title>ACME Challenges Using an Authority Token</title>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>Neustar, Inc.</organization>
            </author>
            <author fullname="Mary Barnes" initials="M." surname="Barnes">
              <organization>Neustar, Inc.</organization>
            </author>
            <author fullname="David Hancock" initials="D." surname="Hancock">
              <organization>Comcast</organization>
            </author>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   Some proposed extensions to the Automated Certificate Management
   Environment (ACME) rely on proving eligibility for certificates
   through consulting an external authority that issues a token
   according to a particular policy.  This document specifies a generic
   Authority Token challenge for ACME which supports subtype claims for
   different identifiers or namespaces that can be defined separately
   for specific applications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-acme-authority-token-09"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="6" month="April" year="2023"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-16"/>
        </reference>
      </references>
    </references>
    <?line 287?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Lucas Pandolfo Perin</t>
      <t>Technology Innovation Institute, United Arab Emirates</t>
      <t>Victor do Valle Cunha</t>
      <t>Federal University of Santa Catarina, Brazil</t>
      <t>Ricardo Custódio</t>
      <t>Federal University of Santa Catarina, Brazil</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
