<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lebihan-srv-identifier-validation-extension-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="ACME SRV Validation">Automated Certificate Management Environment (ACME) SRV Identifier Validation Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-lebihan-srv-identifier-validation-extension-00"/>
    <author fullname="Michel Le Bihan">
      <address>
        <email>michel@lebihan.pl</email>
      </address>
    </author>
    <date year="2025" month="August"/>
    <keyword>ACME</keyword>
    <keyword>SRV</keyword>
    <keyword>certificate validation</keyword>
    <keyword>service delegation</keyword>
    <keyword>multi-tenancy</keyword>
    <abstract>

<t>This document specifies an extension to the Automated Certificate Management Environment (ACME) protocol to enable validation and issuance of certificates containing SRV-ID identifiers as defined in RFC 4985. This allows secure delegation of services where the service domain and hosting infrastructure are controlled by different entities, addressing the multi-tenancy challenges in protocols that use SRV records for service discovery.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://mimi89999.github.io/srv-identifier-validation-extension/draft-lebihan-srv-identifier-validation-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lebihan-srv-identifier-validation-extension/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mimi89999/srv-identifier-validation-extension"/>.</t>
    </note>
  </front>
  <middle>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many application protocols can use DNS SRV records <xref target="RFC2782"/> for service discovery and delegation to third-party hosting providers. Organizations often wish to maintain their domain identity (e.g., example.com) while delegating the actual service hosting to specialized providers.</t>
      <t>Currently, obtaining proper PKIX certificates for such delegated services presents significant operational challenges. The hosting provider cannot easily obtain certificates for the customer's domain without either:</t>
      <ul spacing="normal">
        <li>
          <t>Access to the customer's DNS infrastructure for validation</t>
        </li>
        <li>
          <t>Access to the customer's web server for HTTP validation</t>
        </li>
        <li>
          <t>The customer obtaining certificates and sharing private keys</t>
        </li>
      </ul>
      <t>These approaches are either operationally infeasible, introduce security risks, or do not scale effectively in multi-tenant environments.</t>
      <t>This document extends ACME <xref target="RFC8555"/> to support SRV-ID identifiers <xref target="RFC4985"/>, enabling hosting providers to obtain certificates that properly identify delegated services without requiring control over the source domain's infrastructure.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>This document uses the following terms:</t>
      <dl>
        <dt>Source Domain:</dt>
        <dd>
          <t>The domain that owns the service identity (e.g., example.com in _myservice.example.com)</t>
        </dd>
        <dt>Target Domain:</dt>
        <dd>
          <t>The domain providing the actual service hosting (e.g., hosting.example.net)</t>
        </dd>
        <dt>SRV-ID:</dt>
        <dd>
          <t>An identifier type defined in <xref target="RFC4985"/> representing a service-specific identity</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Consider an organization using example.com that wishes to delegate multiple services to different providers:</t>
      <ul spacing="normal">
        <li>
          <t>Service A to provider-a.example</t>
        </li>
        <li>
          <t>Service B to provider-b.example</t>
        </li>
        <li>
          <t>Service C to provider-c.example</t>
        </li>
      </ul>
      <t>These services might be discovered via SRV records such as:</t>
      <artwork><![CDATA[
_service-a._tcp.example.com. 86400 IN SRV 0 5 5001 provider-a.example.
_service-b._tcp.example.com. 86400 IN SRV 0 5 5002 provider-b.example.
_service-c._tcp.example.com. 86400 IN SRV 0 5 5003 provider-c.example.
]]></artwork>
      <t>Without DNSSEC (which has limited deployment), these delegations are vulnerable to DNS spoofing attacks. Current ACME validation methods cannot be used by the hosting providers to obtain certificates for example.com without coordination that is often impractical.</t>
      <t>Existing approaches have significant limitations:</t>
      <ul spacing="normal">
        <li>
          <t><strong>DANE <xref target="RFC6698"/></strong>: Requires DNSSEC deployment, which remains limited across many TLDs and registrars</t>
        </li>
        <li>
          <t><strong>POSH <xref target="RFC7711"/></strong>: Requires placing files in .well-known on the source domain's web server. If that web server is compromised (e.g., through a CMS vulnerability), an attacker could modify the POSH files</t>
        </li>
        <li>
          <t><strong>dns-account-01 <xref target="I-D.ietf-acme-dns-account-label"/></strong>: While this challenge type allows multiple providers to independently validate the same domain through unique DNS labels, it ties the validation to a specific ACME account URL that includes the CA endpoint. This creates operational inflexibility: if a hosting provider needs to switch CAs (due to rate limits, outages, pricing changes, or other operational reasons), every customer would need to update their DNS records to reflect the new account URL. This requirement is impractical at scale and effectively locks providers into a single CA</t>
        </li>
        <li>
          <t><strong>Certificate sharing</strong>: Requires distributing private keys between organizations, creating security and operational concerns</t>
        </li>
      </ul>
    </section>
    <section anchor="srv-identifier-type">
      <name>SRV Identifier Type</name>
      <t>This document defines a new ACME identifier type "srv" for use in authorization objects.</t>
      <t>An SRV identifier object has the following fields:</t>
      <dl>
        <dt>type (required, string):</dt>
        <dd>
          <t>The string "srv"</t>
        </dd>
        <dt>value (required, string):</dt>
        <dd>
          <t>The SRVName as defined in <xref target="RFC4985"/>, in the format "_service.domain". <bcp14>MUST</bcp14> begin with an underscore followed by the service name, then a dot, then the domain name. This format corresponds to the SRVName structure in <xref target="RFC4985"/> Section 2, which omits the protocol component found in DNS SRV records.</t>
        </dd>
      </dl>
      <t>Example identifier object:</t>
      <sourcecode type="json"><![CDATA[
{
  "type": "srv",
  "value": "_myservice.example.com"
}
]]></sourcecode>
    </section>
    <section anchor="identifier-validation-challenges">
      <name>Identifier Validation Challenges</name>
      <t>SRV identifiers <bcp14>MUST</bcp14> be validated using the dns-01 challenge type as defined in <xref target="RFC8555"/> Section 8.4, with the following modification:</t>
      <t>When validating an SRV identifier, the challenge TXT record <bcp14>MUST</bcp14> be provisioned under the service name rather than the base domain. Specifically:</t>
      <ol spacing="normal" type="1"><li>
          <t>The client constructs the validation domain name by prepending "_acme-challenge." to the SRV identifier value.</t>
        </li>
        <li>
          <t>For an SRV identifier "_myservice.example.com", the resulting validation domain would be: "_acme-challenge._myservice.example.com"</t>
        </li>
        <li>
          <t>The client provisions a TXT record at this location containing the base64url encoding of the SHA-256 digest of the key authorization, as specified in the standard dns-01 challenge.</t>
        </li>
      </ol>
      <t>The server performs validation by:</t>
      <ol spacing="normal" type="1"><li>
          <t>Computing the SHA-256 digest of the stored key authorization</t>
        </li>
        <li>
          <t>Querying for TXT records at the validation domain name constructed from the SRV identifier</t>
        </li>
        <li>
          <t>Verifying that the contents of one of the TXT records matches the digest value</t>
        </li>
      </ol>
      <t>HTTP-01 and other challenge types <bcp14>MUST NOT</bcp14> be used for SRV identifier validation, as they cannot properly demonstrate control of a service-specific identifier.</t>
    </section>
    <section anchor="validation-process">
      <name>Validation Process</name>
      <t>The validation flow is:</t>
      <ol spacing="normal" type="1"><li>
          <t>Client creates a newOrder request with an SRV identifier</t>
        </li>
        <li>
          <t>Server creates authorization with dns-01 challenge</t>
        </li>
        <li>
          <t>Client provisions DNS TXT record at the service-specific location</t>
        </li>
        <li>
          <t>Server validates the dns-01 challenge</t>
        </li>
        <li>
          <t>Upon successful validation, server issues certificate containing the SRV-ID from the original identifier value</t>
        </li>
      </ol>
      <t>The issued certificate <bcp14>MUST</bcp14> contain the SRV-ID in the subjectAltName extension as specified in <xref target="RFC4985"/>, using the id-on-dnsSRV form.</t>
      <t>The issued certificate <bcp14>MUST NOT</bcp14> include a Common Name (CN) in the subject field. Placing a SRVName in the CN field could lead to interpretation issues with software interpreting the SRVName in the CN field as a standard domain name.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="dns-security">
        <name>DNS Security</name>
        <t>This mechanism relies on the integrity of DNS SRV records. In the absence of DNSSEC, it is vulnerable to DNS spoofing attacks. ACME servers <bcp14>SHOULD</bcp14>:</t>
        <ul spacing="normal">
          <li>
            <t>Use DNSSEC-validating resolvers where possible</t>
          </li>
          <li>
            <t>Perform validation from multiple network vantage points</t>
          </li>
          <li>
            <t>Apply similar mitigations as for standard DNS-based validation</t>
          </li>
        </ul>
      </section>
      <section anchor="scope-of-authorization">
        <name>Scope of Authorization</name>
        <t>Unlike certificates with DNS-ID identifiers, certificates with SRV-ID identifiers are restricted to the specific service. This provides better isolation in multi-tenant environments where different services are hosted by different providers. A certificate for "_service-a.example.com" cannot be used to impersonate "_service-b.example.com" or the base domain example.com.</t>
      </section>
      <section anchor="client-support">
        <name>Client Support</name>
        <t>Clients <bcp14>MUST</bcp14> properly validate SRV-ID certificates and not accept them as valid for general DNS names. Protocol specifications using this extension <bcp14>SHOULD</bcp14> clearly define certificate validation requirements.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="acme-identifier-types">
        <name>ACME Identifier Types</name>
        <t>IANA is requested to add the following entry to the "ACME Identifier Types" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">srv</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-validation-methods">
        <name>ACME Validation Methods</name>
        <t>IANA is requested to add the following entry to the "ACME Validation Methods" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Label</th>
              <th align="left">Identifier Type</th>
              <th align="left">ACME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">dns-01</td>
              <td align="left">srv</td>
              <td align="left">Y</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2782">
          <front>
            <title>A DNS RR for specifying the location of services (DNS SRV)</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="L. Esibov" initials="L." surname="Esibov"/>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2782"/>
          <seriesInfo name="DOI" value="10.17487/RFC2782"/>
        </reference>
        <reference anchor="RFC4985">
          <front>
            <title>Internet X.509 Public Key Infrastructure Subject Alternative Name for Expression of Service Name</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name extension that allows a certificate subject to be associated with the service name and domain name components of a DNS Service Resource Record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4985"/>
          <seriesInfo name="DOI" value="10.17487/RFC4985"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC7711">
          <front>
            <title>PKIX over Secure HTTP (POSH)</title>
            <author fullname="M. Miller" initials="M." surname="Miller"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="November" year="2015"/>
            <abstract>
              <t>Experience has shown that it is difficult to deploy proper PKIX certificates for Transport Layer Security (TLS) in multi-tenanted environments. As a result, domains hosted in such environments often deploy applications using certificates that identify the hosting service, not the hosted domain. Such deployments force end users and peer services to accept a certificate with an improper identifier, resulting in degraded security. This document defines methods that make it easier to deploy certificates for proper server identity checking in non-HTTP application protocols. Although these methods were developed for use in the Extensible Messaging and Presence Protocol (XMPP) as a Domain Name Association (DNA) prooftype, they might also be usable in other non-HTTP application protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7711"/>
          <seriesInfo name="DOI" value="10.17487/RFC7711"/>
        </reference>
        <reference anchor="I-D.ietf-acme-dns-account-label">
          <front>
            <title>Automated Certificate Management Environment (ACME) DNS Labeled With ACME Account ID Challenge</title>
            <author initials="A." surname="Chariton">
              <organization/>
            </author>
            <date year="2025" month="May"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-acme-dns-account-label-01"/>
        </reference>
      </references>
    </references>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
