<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yusef-lamps-rfc7030-renewal-recommendation-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="est-renew">Certificate Renewal Recommendations for Enrollment over Secure Transport</title>
    <seriesInfo name="Internet-Draft" value="draft-yusef-lamps-rfc7030-renewal-recommendation-02"/>
    <author initials="R." surname="Shekh-Yusef" fullname="Rifaat Shekh-Yusef">
      <organization>Ciena</organization>
      <address>
        <email>rifaat.s.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization>Entrust Limited</organization>
      <address>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="03"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>This document describes an extension to RFC7030, Enrollment over Secure Transport to
give an indication to a end-entity device when it should start attempting to renew its certificates.</t>
      <t>Prior art is that client decides, with a typical recommmendation to start when the remaining lifetime of the certificate is at the 50% point.
As typical certificate lifetimes are reduced from years to fractions of a year, the 50% may be far too early, and this document provides a way to give alternate advice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-yusef-lamps-rfc7030-renewal-recommendation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        lamps Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/rfc7030-renewal-recommendation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="1" sectionFormat="comma" target="RFC9773"/> explains why certificate lifetimes and renewal times need more deterministic control in the ACME <xref target="RFC8555"/> ecosystem.
Similar arguments apply to the <xref target="RFC7030"/> ecosystem.</t>
      <t>This document extends <xref target="RFC7030"/> to add support for renewal information, by adding a new entry to the HTTP URIs for Control list defined in <xref section="3.2.2" sectionFormat="comma" target="RFC7030"/></t>
      <t>This mechanism enables EST servers to provide suggested detailed renewal operations to EST clients, and enables clients to inform the EST server that they have successfully renewed and replaced a certificate.</t>
      <t>The /renewal-info URI is added, as an <bcp14>OPTIONAL</bcp14> operation, to the table in figure 5 in section 3.2.2 of <xref target="RFC7030"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>A new magic header will be returned during RFC7030 certificate enrollment, whether using simpleenroll, or fullcmc.</t>
    </section>
    <section anchor="renewal-information-request">
      <name>Renewal Information Request</name>
      <t>To retrieve the renewal information, the EST client uses the following HTTP request-line:</t>
      <t><tt>
GET /.well-known/est/renewal-info/&lt;certificate-id&gt;;
</tt></t>
      <t>The request includes a unique identifier for the certificate in question.
The unique identifier is constructed by concatenating the base64url encoding <xref target="RFC4648"/> of the keyIdentifier field of the certificate's Authority Key Identifier (AKI) <xref target="RFC5280"/> extension, the period character ".", and the base64url encoding of the DER-encoded Serial Number field (without the tag and length bytes).
All trailing "=" characters <bcp14>MUST</bcp14> be stripped from both parts of the unique identifier.</t>
      <t>Thus, the full request URL is constructed as follows (split onto multiple lines for readability), where the "||" operator indicates string concatenation:</t>
      <t><tt>
url = /.well-known/est/renewal-info
      || '/'
      || base64url(AKI keyIdentifier)
      || '.'
      || base64url(Serial)
</tt></t>
    </section>
    <section anchor="renewal-information-response">
      <name>Renewal Information Response</name>
      <t>The structure the EST RenewalInfo object is as follows:</t>
      <t>suggestedWindow (object, required):
      A JSON object with two keys, "start" and "end", whose values are
      timestamps, encoded in the format specified in <xref target="RFC3339"/>, which
      bound the window of time in which the CA recommends renewing the
      certificate.</t>
      <t>For example:</t>
      <t>```
   HTTP/1.1 200 OK
   Content-Type: application/json
   Retry-After: 21600</t>
      <t>{
     "suggestedWindow": {
       "start": "2025-01-02T04:00:00Z",
       "end": "2025-01-03T04:00:00Z"
     }
   }
```</t>
      <section anchor="base64-not-used">
        <name>Base64 Not Used</name>
        <t><xref target="RFC7030"/> mistakenly declared that all content would be base64 encoded.
<xref target="RFC8951"/> clarifies that the content is to be base64 encoded, whether or not there is a Content-Transfer-Encoding header present.
It further clarifies that future extensions (such as this document) will not use base64 encoding.
The response detailed above is not base64 encoded.</t>
      </section>
    </section>
    <section anchor="renewal-operations">
      <name>Renewal Operations</name>
      <t>Clients <bcp14>MUST</bcp14> attempt renewal at a time of their choosing based on the suggested renewal window, obtained in the previous step.</t>
      <t>The following algorithm is <bcp14>RECOMMENDED</bcp14> for choosing a renewal time:</t>
      <ol spacing="normal" type="1"><li>
          <t>Select a uniform random time within the suggested window.</t>
        </li>
        <li>
          <t>If the selected time is in the past, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, if the client can schedule itself to attempt renewal
at exactly the selected time, do so.</t>
        </li>
        <li>
          <t>Otherwise, if the selected time is before the next time that the
client would wake up normally, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, sleep until the time indicated by the Retry-After
header and return to Step 1.</t>
        </li>
      </ol>
      <t>In all cases, renewal attempts are subject to the client's existing error backoff and retry intervals.</t>
      <t>A RenewalInfo object in which the end timestamp equals or precedes the start timestamp is invalid.  Servers <bcp14>MUST NOT</bcp14> serve such a response, and clients <bcp14>MUST</bcp14> treat one as though they failed to receive any response from the server (e.g., retry at an appropriate interval, renew on a fallback schedule, etc.).</t>
    </section>
    <section anchor="fetching-schedule">
      <name>Fetching Schedule</name>
      <t>The advice in <xref section="4.3" sectionFormat="comma" target="RFC9773"/> applies:</t>
      <t>Clients <bcp14>SHOULD</bcp14> fetch a certificate's RenewalInfo immediately after
   issuance.</t>
      <t>During the lifetime of a certificate, the renewal information needs
   to be fetched frequently enough that clients learn about changes in
   the suggested window quickly, but without overwhelming the server.
   This protocol uses the Retry-After header [RFC9110] to indicate to
   clients how often to retry.  Note that in other HTTP applications,
   Retry-After often indicates the minimum time to wait before retrying
   a request.  In this protocol, it indicates the desired (i.e., both
   requested minimum and maximum) amount of time to wait.</t>
      <t>Clients <bcp14>MUST NOT</bcp14> check a certificate's RenewalInfo after the
   certificate has expired.  Clients <bcp14>MUST NOT</bcp14> check a certificate's
   RenewalInfo after they consider the certificate to be replaced (for
   instance, after a new certificate for the same identifiers has been
   received and configured).</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A very short certificate lifetime renewal time will cause clients to communicate with the EST Registrar more frequently.</t>
      <t>EST connections for renewals typically make use of mutually authenticated TLS.
When the client certificate being an IDevID, or the last issued certificate, often an LDevID, there is potential to disclose identities during this connection when using TLS 1.2.</t>
      <t>TLS 1.3 does not suffer from this problem, and it's use is <bcp14>RECOMMENDED</bcp14> as per <xref target="I-D.ietf-uta-require-tls13"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Not sure what yet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Might need a header allocation</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many bits of text are taken from <xref target="RFC9773"/>.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3339" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC8951" target="https://www.rfc-editor.org/info/rfc8951" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8951.xml">
          <front>
            <title>Clarification of Enrollment over Secure Transport (EST): Transfer Encodings and ASN.1</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Werner" initials="T." surname="Werner"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document updates RFC 7030: Enrollment over Secure Transport to resolve some errata that were reported and that have proven to cause interoperability issues when RFC 7030 was extended.</t>
              <t>This document deprecates the specification of "Content-Transfer-Encoding" headers for Enrollment over Secure Transport (EST) endpoints. This document fixes some syntactical errors in ASN.1 that were present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8951"/>
          <seriesInfo name="DOI" value="10.17487/RFC8951"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9773" target="https://www.rfc-editor.org/info/rfc9773" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9773.xml">
          <front>
            <title>ACME Renewal Information (ARI) Extension</title>
            <author fullname="A. Gable" initials="A." surname="Gable"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies how an Automated Certificate Management Environment (ACME) server may provide suggestions to ACME clients as to when they should attempt to renew their certificates. This allows servers to mitigate load spikes and ensures that clients do not make false assumptions about appropriate certificate renewal periods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9773"/>
          <seriesInfo name="DOI" value="10.17487/RFC9773"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.ietf-uta-require-tls13" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-require-tls13-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-require-tls13.xml">
          <front>
            <title>New Protocols Using TLS Must Require TLS 1.3</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram"/>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>TLS 1.3 use is widespread, it has had comprehensive security proofs, and it improves both security and privacy over TLS 1.2. Therefore, new protocols that use TLS must require TLS 1.3. As DTLS 1.3 is not widely available or deployed, this prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only. This document updates RFC9325 and discusses post-quantum cryptography and the security and privacy improvements over TLS 1.2 as a rationale for that update.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-12"/>
        </reference>
      </references>
    </references>
    <?line 219?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
