<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>

<rfc ipr="trust200902" docName="draft-sheffer-acme-star-delegation-00" category="std">

  <front>
    <title abbrev="ACME STAR Delegation">An ACME Profile for Generating Delegated STAR Certificates</title>

    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica I+D</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <author initials="A." surname="Pastor Perales" fullname="Antonio Agustin Pastor Perales">
      <organization>Telefonica I+D</organization>
      <address>
        <email>antonio.pastorperales@telefonica.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Nokia</organization>
      <address>
        <email>thomas.fossati@nokia.com</email>
      </address>
    </author>

    <date year="2018" month="October" day="19"/>

    <area>Security</area>
    <workgroup>ACME</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo proposes a profile of the ACME protocol that allows the owner of an
identifier (e.g., a domain name) to delegate to a third party access to a
certificate associated with said identifier.  A primary use case is that of a
CDN (the third party) terminating TLS sessions on behalf of a content provider
(the owner of a domain name).  The presented mechanism allows the owner of the
identifier to retain control over the delegation and revoke it at any time by
cancelling the associated STAR certificate renewal with the ACME CA.  Another
key property of this mechanism is it does not require any modification to the
deployed TLS ecosystem.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document is a companion document to <xref target="I-D.ietf-acme-star"/>.  To avoid
duplication, we give here a bare-bones description of the motivation for this
solution.  For more details and further use cases, please refer to the
introductory sections of <xref target="I-D.ietf-acme-star"/>.</t>

<t>An Identifier Owner (IdO), that we can associate in the primary use case to a
content provider (also referred to as Domain Name Owner, DNO), has agreements
in place with one or more NDC (Name Delegation Consumer) to use and attest its
identity.  In the primary use case, we consider a CDN provider contracted to
serve the IdO content over HTTPS.  The CDN terminates the HTTPS connection at
one of its edge cache servers and needs to present its clients (browsers,
mobile apps, set-top-boxes) a certificate whose name matches the authority of
the URL that is requested, i.e., that of the IdO.  Understandably, most IdOs
balk at sharing their long-term private keys with another organization and,
equally, delegates would rather not have to handle other parties’ long-term
secrets.</t>

<t>This document describes a profile of the ACME protocol <xref target="I-D.ietf-acme-acme"/>
that allows the NDC to request the IdO, acting as a profiled ACME server, a
certificate for a delegated identity - i.e., one belonging to the IdO.  The IdO
then uses the ACME protocol (with the extensions described in
<xref target="I-D.ietf-acme-star"/>) to request issuance of a STAR certificate for the same
delegated identity.  The generated short-term certificate is automatically
renewed by the ACME Certification Authority (CA), periodically fetched by the NDC
and used to terminate HTTPS connections in lieu of the IdO.  The IdO can end
the delegation at any time by simply instructing the CA to stop the automatic
renewal and letting the certificate expire shortly thereafter.</t>

<t>In case the delegated identity is a domain name, this document also provides a
way for the NDC to inform the IdO about the CNAME mappings that need to be
installed in the IdO’s DNS zone to enable the aliasing of the delegated name,
thus allowing the complete name delegation workflow to be handled using a
single interface.</t>

<section anchor="terminology" title="Terminology">

<t><list style="hanging">
  <t hangText='IdO'>
  Identifier Owner, the owner of an identifier (e.g., a domain
name) that needs to be delegated.</t>
  <t hangText='DNO'>
  Domain Name Owner, a specific kind of IdO whose identifier is a
domain name</t>
  <t hangText='NDC'>
  Name Delegation Consumer, the entity to which the domain name is
delegated for a limited time.  This is a CDN in the primary use
case (in fact, readers may note the symmetry of the two
acronyms).</t>
  <t hangText='CDN'>
  Content Delivery Network, a widely distributed network that
serves the domain’s web content to a wide audience at high
performance.</t>
  <t hangText='STAR'>
  Short-Term, Automatically Renewed X.509 certificates.</t>
  <t hangText='ACME'>
  The IETF Automated Certificate Management Environment, a
certificate management protocol.</t>
  <t hangText='CA'>
  A Certificate Authority that implements the ACME protocol.</t>
</list></t>

</section>
<section anchor="conventions-used-in-this-document" title="Conventions used in this document">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="protocol-flow" title="Protocol Flow">

<t>This section presents the protocol flow.  For completeness, we include the ACME
profile proposed in this draft as well as the extended ACME protocol described
in <xref target="I-D.ietf-acme-star"/>.</t>

<section anchor="proto-preconditions" title="Preconditions">

<t>The protocol assumes the following preconditions are met:</t>

<t><list style="symbols">
  <t>The IdO exposes an ACME server interface to the NDC(s) comprising the account
management interface;</t>
  <t>The NDC has registered an ACME account with the IdO;</t>
  <t>NDC and IdO have agreed on a “CSR template” to use, including at a minimum:
subject name (e.g., “somesite.example.com”), requested algorithms, key
length, key usage.  The NDC is required to use this template for every CSR
created under the same delegation;</t>
  <t>IdO has registered an ACME account with the Certificate Authority (CA)</t>
</list></t>

<t>Note that even if the IdO implements the ACME server role, it is not acting as
a CA: in fact, from the point of view of the certificate issuance process, the
IdO only works as a “policing” forwarder of the NDC’s key-pair and is
responsible for completing the identity verification process towards the ACME
CA.</t>

</section>
<section anchor="overview" title="Overview">

<t>The interaction between the NDC and the IdO is governed by the profiled ACME
workflow detailed in <xref target="sec-profile"/>.  The interaction between the IdO and the
CA is ruled by ACME STAR <xref target="I-D.ietf-acme-star"/>.</t>

<t>The outline of the combined protocol is as follow (<xref target="fig-endtoend"/>):</t>

<t><list style="symbols">
  <t>NDC sends an Order for the delegated identifier to IdO;</t>
  <t>IdO creates an Order resource in state “ready” with a “finalize” URL;</t>
  <t>NDC immediately sends a finalize request (which includes the CSR) to the IdO;</t>
  <t>IdO verifies the CSR according to the agreed CSR template;</t>
  <t>If the CSR verification fails, the Order is moved to an “invalid” state and
everything stops;</t>
  <t>If the CSR verification is successful, IdO moves the Order to state
“processing”, and sends an Order’ (using its own account) for the delegated
identifier to the ACME STAR CA;</t>
  <t>If the ACME STAR protocol fails, Order’ moves to “invalid” and the same state
is reflected in the NDC Order;</t>
  <t>If the ACME STAR run is successful (i.e., Order’ is “valid”), IdO copies the
“star-certificate” URL from Order’ to Order and moves its state “valid”.</t>
</list></t>

<t>The NDC can now download, install and use the certificate bearing the name
delegated by the IdO.</t>

<t>Note that, because the identity validation is suppressed, the NDC sends the
finalize request, including the CSR, to the IdO immediately after the Order has
been acknowledged.  The IdO must buffer a (valid) CSR until the Validation
phase completes successfully.</t>

<figure title="End to end flow" anchor="fig-endtoend"><artwork><![CDATA[
     NDC                      IdO                   CA
     Client              Server  Client             Server

     Order
     Signature ------->

     [ No identity validation ]

     CSR
     Signature ------->

                                 Order'
                                 Signature ------->
                                           <------- Required
                                                    Authorizations

                                 Responses
                                 Signature ------->

                                 <~~~~~~~~Validation~~~~~~~~>


                                 CSR
                                 Signature ------->

    <~~~~~~Await issuance~~~~~~> <~~~~~~Await issuance~~~~~~>

              <------------------------------------ Certificate
]]></artwork></figure>

</section>
<section anchor="sec-profile" title="Delegated Identity Profile">

<section anchor="sec-profile-ndc-to-ido" title="Order Object on the NDC-IdO side">

<t>The Order object created by the NDC:</t>

<t><list style="symbols">
  <t>MUST contain identifiers with the new “delegated” field set to true;</t>
  <t>MUST NOT contain the notBefore and notAfter fields;</t>
  <t>MAY contain any of the “recurrent-*” fields listed in Section 3.1.1 of
<xref target="I-D.ietf-acme-star"/>;</t>
  <t>In case the identifier type is “dns”, it MAY contain a “cname” field with the
alias of the identifier in the NDC domain.  This field is used by the IdO to
create the DNS aliasing needed to redirect the resolvers to the delegated
entity.</t>
</list></t>

<figure><artwork><![CDATA[
   POST /acme/new-order HTTP/1.1
   Host: acme.dno.example
   Content-Type: application/jose+json

   {
     "protected": base64url({
       "alg": "ES256",
       "kid": "https://acme.dno.example/acme/acct/evOfKhNU60wg",
       "nonce": "5XJ1L3lEkMG7tR6pA00clA",
       "url": "https://acme.dno.example/acme/new-order"
     }),
     "payload": base64url({
       "identifiers": [
         {
           "type": "dns",
           "value": "abc.ndc.dno.example.",
           "delegated": true,
           "cname": "abc.ndc.example."
         }
       ],
     }),
     "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
   }
]]></artwork></figure>

<t>The Order object that is created on the IdO:</t>

<t><list style="symbols">
  <t>MUST start in the “ready” state;</t>
  <t>MUST contain an “authorizations” array with zero elements;</t>
  <t>MUST NOT contain the “notBefore” and “notAfter” fields.</t>
</list></t>

<figure><artwork><![CDATA[
   {
     "status": "ready",
     "expires": "2016-01-01T00:00:00Z",

     "identifiers": [
      {
        "type": "dns",
        "value": "abc.ndc.dno.example.",
        "delegated": true,
        "cname": "abc.ndc.example."
      }
     ],

     "authorizations": [],

     "finalize": "https://acme.dno.example/acme/order/TO8rfgo/finalize"
   }
]]></artwork></figure>

<t>The IdO SHOULD copy any “recurrent-*” field from the NDC request into the
related STAR request to the ACME CA.</t>

<t>When the validation of the identifiers has been successfully completed and the
certificate has been issued by the CA, the IdO:</t>

<t><list style="symbols">
  <t>MUST move its Order resource status to “valid”;</t>
  <t>MUST copy the “star-certificate” field from the STAR Order;</t>
</list></t>

<t>The latter indirectly includes (via the NotBefore and NotAfter HTTP headers)
the renewal timers needed by the NDC to inform its certificate reload logic.</t>

<figure><artwork><![CDATA[
   {
     "status": "valid",
     "expires": "2016-01-01T00:00:00Z",

     "identifiers": [
      {
        "type": "dns",
        "value": "abc.ndc.dno.example.",
        "delegated": true,
        "cname": "abc.ndc.example."
      }
     ],

     "authorizations": [],

     "finalize": "https://acme.dno.example/acme/order/TO8rfgo/finalize",

     "star-certificate": "https://acme.ca.example/acme/order/yTr23sSDg9"
   }
]]></artwork></figure>

<t>If an “identifier” object of type “dns” was included,
the IdO MUST validate the specified CNAME at this point in the flow.
The NDC and IdO may have
a pre-established list of valid CNAME values. At the minimum, the IdO MUST verify that
both DNS names are syntactically valid.</t>

<t>Following this validation, the IdO can add the CNAME records to its
zone:</t>

<figure><artwork><![CDATA[
   abc.ndc.dno.example. CNAME abc.ndc.example.
]]></artwork></figure>

</section>
<section anchor="order-object-on-the-ido-ca-side" title="Order Object on the IdO-CA side">

<t>When sending the Order to the ACME CA, the IdO SHOULD strip the “delegated” and “cname”
attributes sent by the NDC (<xref target="sec-profile-ndc-to-ido"/>).  The IdO MUST add
the necessary STAR extensions to the Order.  In addition, to allow the NDC
to download the certificate using unauthenticated GET, the IdO MUST add the
recurrent-certificate-get attribute and set it to true.</t>

</section>
<section anchor="capability-discovery" title="Capability Discovery">

<t>In order to help a client to discover support for this profile, the directory
object of an ACME server MUST contain the following attribute inside the “meta”
field:</t>

<t><list style="symbols">
  <t>star-delegation-enabled: boolean flag indicating support for the profile
specified in this memo.  An ACME server that supports this delegation profile
MUST include this key, and MUST set it to true.</t>
</list></t>

</section>
<section anchor="on-cancelation" title="On Cancelation">

<t>It is worth noting that cancelation of the ACME STAR certificate is a
prerogative of the IdO.  The NDC does not own the relevant account key on the
ACME CA, therefore it can’t issue a cancelation request for the STAR cert.
Potentially, since it holds the STAR cert private key, it could request the
revocation of a single STAR certificate.  However, STAR explicitly disables the
revokeCert interface.</t>

</section>
</section>
</section>
<section anchor="cdni-use-cases" title="CDNI Use Cases">

<t>Members of the IETF CDNI (Content Delivery Network Interconnection) working
group are interested in delegating authority over web content to CDNs.  Their
requirements are described in a draft <xref target="I-D.fieau-cdni-https-delegation"/> that
considers several solutions addressing different delegation requirements.  This
section discusses two of these particular requirements in the context of the
STAR delegation workflow.</t>

<section anchor="multiple-parallel-delegates" title="Multiple Parallel Delegates">

<t>In some cases the content owner (IdO) would like to delegate authority over a
web site to multiple NDCs (CDNs).  This could happen if the IdO has agreements
in place with different regional CDNs for different geographical regions, or if
a “backup” CDN is used to handle overflow traffic by temporarily altering some
of the CNAME mappings in place.  The STAR delegation flow enables this use case
naturally, since each CDN can authenticate separately to the IdO (via its own
separate account) specifying its CSR, and the IdO is free to allow or deny each
certificate request according to its own policy.</t>

</section>
<section anchor="chained-delegation" title="Chained Delegation">

<t>In other cases, a content owner (IdO) delegates some domains to a large CDN
(uCDN), which in turn delegates to a smaller regional CDN, dCDN.  The DNO has a
contractual relationship with uCDN, and uCDN has a similar relationship with
dCDN.  However IdO may not even know about dCDN.</t>

<t>The STAR protocol does not prevent this use case, although there is no special
support for it: uCDN could forward requests from dCDN to DNO, and forward
responses back to dCDN.  Whether such proxying is allowed is governed by policy
and contracts between the parties.</t>

<t>One thing that might be necessary at the interface between uCDN and dCDN is a
mechanism by which the uCDN can advertise:</t>

<t><list style="symbols">
  <t>The namespace that is made available to the dCDN to mint its delegated names;</t>
  <t>The policy for creating the key material (allowed algorithms, minimum key
lengths, key usage, etc.) that the dCDN needs to satisfy.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>[[RFC Editor: please replace XXXX below by the RFC number.]]</t>

<section anchor="new-fields-in-the-meta-object-within-a-directory-object" title="New fields in the “meta” Object within a Directory Object">

<t>This document adds the following entries to the ACME Directory Metadata Fields:</t>

<texttable>
      <ttcol align='left'>Field Name</ttcol>
      <ttcol align='left'>Field Type</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>star-delegation-enabled</c>
      <c>boolean</c>
      <c>RCF XXXX</c>
</texttable>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>This work is partially supported by the European Commission under Horizon 2020
grant agreement no. 688421 Measurement and Architecture for a Middleboxed
Internet (MAMI). This support does not imply endorsement.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-acme-star">
<front>
<title>Support for Short-Term, Automatically-Renewed (STAR) Certificates in Automated Certificate Management Environment (ACME)</title>

<author initials='Y' surname='Sheffer' fullname='Yaron Sheffer'>
    <organization />
</author>

<author initials='D' surname='Lopez' fullname='Diego Lopez'>
    <organization />
</author>

<author initials='O' surname='Dios' fullname='Oscar de Dios'>
    <organization />
</author>

<author initials='A' surname='Pastor' fullname='Antonio Pastor'>
    <organization />
</author>

<author initials='T' surname='Fossati' fullname='Thomas Fossati'>
    <organization />
</author>

<date month='March' day='3' year='2018' />

<abstract><t>Public-key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an attacker. However the revocation process is often unreliable.  An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating this sequence upon compromise. This memo proposes an ACME extension to enable the issuance of short- term and automatically renewed (STAR) certificates.  [RFC Editor: please remove before publication]  While the draft is being developed, the editor's version can be found at https://github.com/yaronf/I-D/tree/master/STAR.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-acme-star-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-acme-star-03.txt' />
</reference>



<reference anchor="I-D.ietf-acme-acme">
<front>
<title>Automatic Certificate Management Environment (ACME)</title>

<author initials='R' surname='Barnes' fullname='Richard Barnes'>
    <organization />
</author>

<author initials='J' surname='Hoffman-Andrews' fullname='Jacob Hoffman-Andrews'>
    <organization />
</author>

<author initials='D' surname='McCarney' fullname='Daniel McCarney'>
    <organization />
</author>

<author initials='J' surname='Kasten' fullname='James Kasten'>
    <organization />
</author>

<date month='October' day='12' year='2018' />

<abstract><t>Public Key Infrastructure X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  Today, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.  RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH: The source for this draft is maintained in GitHub.  Suggested changes should be submitted as pull requests at https://github.com/ietf-wg-acme/acme [1].  Instructions are on that page as well.  Editorial changes can be managed in GitHub, but any substantive change should be discussed on the ACME mailing list (acme@ietf.org).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-acme-acme-16' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-acme-acme-16.txt' />
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.fieau-cdni-https-delegation">
<front>
<title>HTTPS delegation in CDNI</title>

<author initials='F' surname='Fieau' fullname='Frederic Fieau'>
    <organization />
</author>

<author initials='S' surname='Emile' fullname='Stephan Emile'>
    <organization />
</author>

<author initials='S' surname='Mishra' fullname='Sanjay Mishra'>
    <organization />
</author>

<date month='July' day='3' year='2017' />

<abstract><t>This document examines probable solutions for delegating encrypted content delivery within the context of CDN interconnection.  The HTTPS delegation also expects delivering content without compromising security, integrity and user privacy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-fieau-cdni-https-delegation-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-fieau-cdni-https-delegation-02.txt' />
</reference>




    </references>


<section anchor="document-history" title="Document History">

<t>[[Note to RFC Editor: please remove before publication.]]</t>

<section anchor="draft-sheffer-acme-star-delegation-00" title="draft-sheffer-acme-star-delegation-00">

<t><list style="symbols">
  <t>Initial version, some text extracted from draft-sheffer-acme-star-requests-02</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

