<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.1.2 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>

<rfc ipr="trust200902" docName="draft-sheffer-acme-star-request-00" category="std">

  <front>
    <title abbrev="ACME STAR Request">Generating Certificate Requests for Short-Term, Automatically-Renewed (STAR) Certificates</title>

    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica I+D</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <author initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica I+D</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author initials="A." surname="Pastor Perales" fullname="Antonio Agustin Pastor Perales">
      <organization>Telefonica I+D</organization>
      <address>
        <email>antonio.pastorperales@telefonica.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Nokia</organization>
      <address>
        <email>thomas.fossati@nokia.com</email>
      </address>
    </author>

    <date year="2017" month="June" day="16"/>

    <area>Security</area>
    <workgroup>ACME</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo proposes a protocol that allows a domain name owner to delegate to a third
party (such as a CDN) control over a certificate that bears one or more names in that domain.
Specifically the third party creates a Certificate Signing Request
for the domain, which can then be used by the domain owner to request
a short term and automatically renewed (STAR) certificate.</t>

<t>This is a component in a solution where a third-party such as a CDN can terminate TLS
sessions on behalf of a domain name owner (e.g., a content provider),
and the domain owner can cancel this delegation at any time without
having to rely on certificate revocation mechanisms.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document is a companion document to [I-D.ietf-acme-star]. To avoid
duplication, we give here a barebones description of the motivation for this solution.
For more details and further use cases, please refer to the
introductory sections of [I-D.ietf-acme-star].</t>

<t>A content provider (referred to in this document as Domain Name Owner,
DNO) has agreements in
place with one or more Content Delivery Networks (CDNs) that are
contracted to serve its content over HTTPS. The CDN terminates the
HTTPS connection at one of its edge cache servers and needs to present
its clients (browsers, set-top-boxes) a certificate whose name matches
the authority of the URL that is requested, i.e. that of the DNO.
However, many DNOs balk at sharing their long-term private keys with
another organization and, equally, delegates (henceforth referred to
as NDC, Name Delegation Consumer) would rather not have
to handle other parties’ long-term secrets.</t>

<t>This document describes a protocol where the DNO and the NDC agree on
a CSR template and the NDC
generates a CSR for a private key that it holds. The DNO then uses the
ACME protocol (as extended in [I-D.ietf-acme-star] to issue the
STAR certificate.</t>

<t>The generated short-term certificate is automatically renewed by an
ACME Certification Authority (CA) <xref target="I-D.ietf-acme-acme"/> and routinely
fetched into the NDC and used for HTTPS connections. The DNO can end the
delegation at any time by simply instructing the CA to stop the
automatic renewal and letting the certificate expire shortly thereafter.</t>

<section anchor="terminology" title="Terminology">

<t><list style="hanging">
  <t hangText='DNO'>
  Domain Name Owner, the owner of a domain that needs to be delegated.</t>
  <t hangText='NDC'>
  Name Delegation Consumer, the entity to which the domain name is delegated for a limited
time. This is often a CDN (in fact, readers may note the similarity of the two acronyms).</t>
  <t hangText='CDN'>
  Content Delivery Network, a widely distributed network
that serves the domain’s web content to a wide audience at
high performance.</t>
  <t hangText='STAR'>
  Short-Term, Automatically Renewed X.509 certificates.</t>
  <t hangText='ACME'>
  The IETF Automated Certificate Management Environment, a certificate
management protocol.</t>
  <t hangText='CA'>
  A Certificate Authority that implements the ACME protocol.</t>
</list></t>

</section>
<section anchor="conventions-used-in-this-document" title="Conventions used in this document">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and
“OPTIONAL” in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
</section>
<section anchor="protocol-flow" title="Protocol Flow">

<t>This section presents the protocol flow. For completeness, we include
the STAR Interface proposed in this draft, as well as the extended
ACME protocol as described in [I-D.ietf-acme-star].</t>

<section anchor="proto-preconditions" title="Preconditions">

<t>The protocol assumes the following preconditions are met:</t>

<t><list style="symbols">
  <t>A mutually authenticated channel between NDC and DNO pre-exists.
This is called “STAR channel” and all STAR protocol exchanges between
NDC and DNO are run over it.  It provides the guarantee that requests
and responses are authentic.</t>
  <t>NDC and DNO have agreed on a “CSR template” to use, including at a minimum:
  <list style="symbols">
      <t>Subject name (e.g., “somesite.example.com”),</t>
      <t>Requested algorithms,</t>
      <t>Key length,</t>
      <t>Key usage.</t>
    </list>
The NDC is required to use this template for every CSR created under the same delegation.</t>
  <t>DNO has registered through the ACME interface exposed by the
Certificate Authority (CA) using the usual ACME registration
procedure. In ACME terms, the DNO has an Account on the server
and is ready to issue Orders.</t>
</list></t>

</section>
<section anchor="proto-bootstrap" title="Bootstrap">

<t>The NDC (STAR Client) generates a key-pair, wraps it into a Certificate
Signing Request (CSR) according to the agreed upon CSR template, and sends
it to the DNO (STAR Proxy) over the pre-established STAR channel.  The
DNO uses the NDC identity provided on the STAR channel to look up the
CSR template that applies to the requesting NDC and decides whether or
not to accept the request. Assuming everything is in order,
it then “forwards” the NDC request to the ACME CA by means of the
usual ACME application procedure. Specifically, the DNO, in its role as an
ACME client, requests the CA to issue a STAR certificate, i.e., one that:</t>

<t><list style="symbols">
  <t>Has a short validity (e.g., 24 to 72 hours);</t>
  <t>Is automatically renewed by the CA for a certain period of time;</t>
  <t>Is downloadable from a (highly available) public link without requiring any special authorization.</t>
</list></t>

<t>Other than that, the ACME protocol flows as normal between DNO and CA,
in particular DNO is responsible for satisfying the requested ACME
challenges until the CA is willing to issue the requested certificate.
Per normal ACME processing, the DNO is given back an Order ID for the issued STAR
certificate to be used in subsequent interaction with the CA (e.g., if
the certificate needs to be terminated.)</t>

<t>Concurrently, a response is sent back to the NDC with an
endpoint to  poll for completion of the certificate generation process.</t>

<t>The bootstrap phase ends when the DNO obtains the OK from the ACME CA
and posts the certificate’s URL to the “completion endpoint” where the
NDC can retrieve it.</t>

<figure title="Bootstrap" anchor="figprotoboot"><artwork><![CDATA[
                     ...........................
STAR                 :  STAR Proxy /           :              ACME/STAR
Client               :           ACME Client   :               Server
  |                  :    |               |    :                  |
  |                  :    |               |   ACME registration   |
  +-------.          :    |               |<--------------------->|
  |       |          :    |               |   STAR capabilities   |
  |   generate CSR   :    |               |    :                  |
  |       |          :    |               |    :                  |
  |<------'          :    |               |    :                  |
  |                  :    |               |    :                  |
  |     Request new  :    |               |    :                  |
  +---------------------->|               |    :                  |
  |     cert for CSR :    |               |    :                  |
  |                  :    +-------.       |    :                  |
  |                  :    |       |       |    :                  |
  |                  :    |   Verify CSR  |    :                  |
  |                  :    |       |       |    :                  |
  |                  :    +<------'       |    :                  |
  |   Accepted, poll at   |               |    :                  |
  |<----------------------+               |    :                  |
  |    "completion URL"   |- - - - - - - >|    Application for    |
  |                  :    |               +---------------------->|
  |                  :    |               |    STAR certificate   |
  |                  :    |               |    :                  |
  |  GET "completion URL" |               |    :  Challenge       |
  |<--------------------->|               |<--------------------->|
  |   in progress    :    |               |    :  Response        |
  |                  :    |               |    :                  |
  |                  :    |               |  Finalize/Certificate |
  |                  :    |               |<----------------------+
  |  GET "completion URL" |< - - - - - - -|    : + Order Id       |
  +---------------------->|               |    :                  |
  |                  :    |               |    :                  |
  |  200, certificate URL |               |    :                  |
  |<----------------------+               |    :                  |
  |   and other metadata  |               |    :                  |
  |                  :    |               |    :                  |
                     `.........................'
]]></artwork></figure>

</section>
<section anchor="proto-auto-renewal" title="Refresh">

<t>The CA automatically re-issues the certificate (using the same CSR)
before it expires and publishes it to the URL that the NDC has come to
know at the end of the bootstrap phase.  The NDC downloads and
installs it. This process goes on until either:</t>

<t><list style="symbols">
  <t>DNO terminates the delegation, or</t>
  <t>Automatic renewal expires.</t>
</list></t>

<figure title="Auto renewal" anchor="figprotorefresh"><artwork><![CDATA[
        STAR                    ACME/STAR
        Client                  Server
          |     Retrieve cert     |                     [...]
          |<--------------------->|                      |
          |                       +------.              /
          |                       |      |             /
          |                       | Automatic renewal :
          |                       |      |             \
          |                       |<-----'              \
          |     Retrieve cert     |                      |
          |<--------------------->|                   72 hours
          |                       |                      |
          |                       +------.              /
          |                       |      |             /
          |                       | Automatic renewal :
          |                       |      |             \
          |                       |<-----'              \
          |     Retrieve cert     |                      |
          |<--------------------->|                   72 hours
          |                       |                      |
          |                       +------.              /
          |                       |      |             /
          |                       | Automatic renewal :
          |                       |      |             \
          |                       |<-----'              \
          |                       |                      |
          |         [...]         |                    [...]
]]></artwork></figure>

</section>
<section anchor="proto-termination" title="Termination">

<t>The DNO may request early termination of the STAR certificate by including
the Order ID in a certificate termination request to the ACME
interface, defined below.
After the CA receives and verifies the request, it shall:</t>

<t><list style="symbols">
  <t>Cancel the automatic renewal process for the STAR certificate;</t>
  <t>Change the certificate publication resource to return an error
indicating the termination of the delegation to external clients, including the NDC.</t>
</list></t>

<t>Note that it is not necessary to explicitly revoke the short-term certificate.</t>

<figure title="Termination" anchor="figprototerm"><artwork><![CDATA[
   STAR                    STAR                   ACME/STAR
   Client                  Proxy                  Server
     |                       |                       |
     |                       |  Terminate Order ID   |
     |                       +---------------------->|
     |                       |                       +-------.
     |                       |                       |       |
     |                       |                       |  End auto renewal  
     |                       |                       |  Remove cert link
     |                       |                       |  etc.
     |                       |                       |       |
     |                       |         Done          |<------'
     |                       |<----------------------+
     |                       |                       |
     |                                               |
     |                 Retrieve cert                 |
     +---------------------------------------------->|
     |                 Error: terminated             |
     |<----------------------------------------------+
     |                                               |
]]></artwork></figure>

</section>
</section>
<section anchor="protocol-details" title="Protocol Details">

<t>This section describes the STAR
API between the STAR Client and the STAR Proxy.</t>

<section anchor="star-api" title="STAR API">

<t>This API allows the STAR Client to request a STAR certificate via the
STAR Proxy, using a previously agreed-upon CSR template.</t>

<t>The API consists of a single resource, “registration”. A new
Registration is created with a POST request, and the
Registration instance is polled to obtain its details.</t>

<section anchor="creating-a-registration" title="Creating a Registration">

<t>To create a registration, use:</t>

<figure><artwork><![CDATA[
POST /star/registration
Host: star-proxy.example.net
Content-Type: application/json

{
    "csr": "...",    // CSR in PEM format
    "lifetime": 365, // requested registration lifetime in days,
                     // between 1 and 1095
    "validity": 7    // requested certificate validity in days
}
]]></artwork></figure>

<t>The STAR Proxy MAY treat both “lifetime” and “validity” periods as hints.
Upon success, the call returns the new Registration resource.</t>

<figure><artwork><![CDATA[
HTTP/1.1 201 Created
Location: https://star-proxy.example.net/star/registration/567
]]></artwork></figure>

</section>
<section anchor="polling-the-registration" title="Polling the Registration">

<t>The returned Registration can be polled until the information is available from the ACME server.</t>

<figure><artwork><![CDATA[
GET /star/registration/567
Host: star-proxy.example.net
]]></artwork></figure>

<t>In responding to poll requests while the validation is still in
progress, the server MUST return a 200 (OK) response and MAY include a
Retry-After header field to suggest a polling interval to the client.
The Retry-After value MUST be expressed in seconds.  If the
Retry-After header is present, in order to avoid surprising
interactions with heuristic expiration times, a max-age Cache-Control
SHOULD also be present and set to a value slightly smaller than the Retry-After value.</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Retry-After: 10
Cache-Control: max-age=9

{
    "status": "pending"
}
]]></artwork></figure>

<t>When the operation is successfully completed, the ACME Proxy returns:</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Expires: Sun, 09 Sep 2018 14:09:00 GMT

{
    "status": "valid", // or "failed"
    "lifetime": 365, // lifetime of the registration in days,
                     //  possibly less than requested
    "certificates": "https://acme-server.example.org/certificates/A51A3"
}
]]></artwork></figure>

<t>The Expires header applies to the Registration resource itself, and may be as
small as a few minutes.
It is unrelated to the Order’s lifetime which is measured in days or longer.
The “certificates” attribute
contains a URL of the certificate pull endpoint, received from the
ACME Server.</t>

<t>If the registration fails for any reason, the server returns a “200 OK”
response, with the status as “failed”
and a “reason” attribute containing a human readable error message.</t>

</section>
</section>
<section anchor="transport-security-for-the-star-protocol" title="Transport Security for the STAR Protocol">

<t>Traffic between the STAR Client and the STAR Proxy MUST be protected with HTTPS.
For interoperability, all implementations
MUST support HTTP Basic Authentication <xref target="RFC7617"/>. However some deployments
MAY prefer mutually-
authenticated HTTPS or two-legged OAUTH.</t>

</section>
</section>
<section anchor="cdni-use-cases" title="CDNI Use Cases">

<t>Members of the IETF CDNI (Content Delivery Network Interconnection)
working group are interested in delegating
authority over web content to CDNs. Their requirements are described
in a draft <xref target="I-D.fieau-cdni-https-delegation"/> that compares
several solutions. This section discusses two particular requirements
in the context of the STAR protocol.</t>

<section anchor="multiple-parallel-delegates" title="Multiple Parallel Delegates">

<t>In some cases the DNO would like to delegate authority over a web site
to multiple CDNs. This could happen if the DNO has agreements in place
with different regional CDNs for different geographical regions. STAR
enables this use case naturally, since each CDN can authenticate
separately to the DNO specifying its CSR, and the DNO is free to allow
or deny each certificate request according to its own policy.</t>

</section>
<section anchor="chained-delegation" title="Chained Delegation">

<t>In other cases, a content owner (DNO) delegates some domains to a
large CDN (CDN1), which in turn delegates to a smaller regional
CDN, CDN2. The DNO has a contractual relationship with CDN1, and CDN1
has a similar relationship with CDN2. However DNO may not even know
about CDN2.</t>

<t>The STAR protocol does not prevent this use case, although there is
no special support for it. CDN1 can forward requests from CDN2 to DNO,
and forward responses back to CDN2. Whether such proxying is allowed
is governed by policy and contracts between the parties.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<section anchor="star-protocol-authentication" title="STAR Protocol Authentication">

<t>The STAR protocol allows its client to obtain certificates bearing the
DNO’s identity. Therefore strong client authentication is
mandatory.</t>

<t>When multiple NDCs may connect to the same DNO, the STAR protocol’s
authentication MUST allow the DNO to distinguish between different
NDCs, and the DNO MUST associate different Registration objects to
different clients. Among other benefits, this allows the DNO to cancel a STAR
registration for one of its clients instead of all of them.</t>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>This work is partially supported by the European Commission under
Horizon 2020 grant agreement no. 688421 Measurement and Architecture
for a Middleboxed Internet (MAMI). This support does not imply endorsement.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC7617" target='http://www.rfc-editor.org/info/rfc7617'>
<front>
<title>The 'Basic' HTTP Authentication Scheme</title>
<author initials='J.' surname='Reschke' fullname='J. Reschke'><organization /></author>
<date year='2015' month='September' />
<abstract><t>This document defines the &quot;Basic&quot; Hypertext Transfer Protocol (HTTP) authentication scheme, which transmits credentials as user-id/ password pairs, encoded using Base64.</t></abstract>
</front>
<seriesInfo name='RFC' value='7617'/>
<seriesInfo name='DOI' value='10.17487/RFC7617'/>
</reference>



<reference anchor="I-D.ietf-acme-acme">
<front>
<title>Automatic Certificate Management Environment (ACME)</title>

<author initials='R' surname='Barnes' fullname='Richard Barnes'>
    <organization />
</author>

<author initials='J' surname='Hoffman-Andrews' fullname='Jacob Hoffman-Andrews'>
    <organization />
</author>

<author initials='J' surname='Kasten' fullname='James Kasten'>
    <organization />
</author>

<date month='March' day='13' year='2017' />

<abstract><t>Certificates in PKI using X.509 (PKIX) are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certificate authorities in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  Today, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a certification authority (CA) and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-acme-acme-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-acme-acme-06.txt' />
</reference>



<reference anchor="I-D.sheffer-acme-star">
<front>
<title>Use of Short-Term, Automatically-Renewed (STAR) Certificates to Delegate Authority over Web Sites</title>

<author initials='Y' surname='Sheffer' fullname='Yaron Sheffer'>
    <organization />
</author>

<author initials='D' surname='Lopez' fullname='Diego Lopez'>
    <organization />
</author>

<author initials='O' surname='Dios' fullname='Oscar de Dios'>
    <organization />
</author>

<author initials='T' surname='Fossati' fullname='Thomas Fossati'>
    <organization />
</author>

<date month='May' day='27' year='2017' />

<abstract><t>This memo proposes two mechanisms that work in concert to allow a third party (e.g., a content delivery network) to terminate TLS sessions on behalf of a domain name owner (e.g., a content provider).  The proposed mechanisms are:</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-sheffer-acme-star-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-sheffer-acme-star-02.txt' />
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.fieau-cdni-https-delegation">
<front>
<title>HTTPS delegation in CDNI</title>

<author initials='F' surname='Fieau' fullname='Frederic Fieau'>
    <organization />
</author>

<author initials='S' surname='Emile' fullname='Stephan Emile'>
    <organization />
</author>

<author initials='S' surname='Mishra' fullname='Sanjay Mishra'>
    <organization />
</author>

<date month='March' day='13' year='2017' />

<abstract><t>This document examines probable solutions for delegating encrypted content delivery within the context of CDN interconnection.  The HTTPS delegation also expects delivering content without compromising security, integrity and user privacy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-fieau-cdni-https-delegation-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-fieau-cdni-https-delegation-01.txt' />
</reference>




    </references>


<section anchor="document-history" title="Document History">

<t>[[Note to RFC Editor: please remove before publication.]]</t>

<section anchor="draft-sheffer-acme-star-request-00" title="draft-sheffer-acme-star-request-00">

<t><list style="symbols">
  <t>Initial version, the STAR API extracted from draft-sheffer-acme-star-02.</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

