<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dance-architecture-05" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="DNS-Bound Identities Architecture">An Architecture for DNS-Bound Client and Sender Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dance-architecture-05"/>
    <author initials="A." surname="Wilson" fullname="Ash Wilson">
      <organization>Valimail</organization>
      <address>
        <email>ash.d.wilson@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Huque" fullname="Shumon Huque">
      <organization>Salesforce</organization>
      <address>
        <email>shuque@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Johansson" fullname="Olle Johansson">
      <organization>Edvina.net</organization>
      <address>
        <email>oej@edvina.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2024" month="April" day="24"/>
    <area>Internet</area>
    <workgroup>DANCE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 39?>

<t>This architecture document defines terminology, interaction, and authentication patterns,
related to the use of DANE DNS records for TLS client and messaging peer identity,
within the context of existing object security and TLS-based protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    DANE Authentication for Network Clients Everywhere Working Group mailing list (dance@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dance/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ashdwilson/draft-dance-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A digital identity, in an abstract sense, possesses at least two features: an identifier (or name),
and a means of proving ownership of the identifier.
One of the most resilient mechanisms for tying an identifier to a method for proving ownership of
the identifier is the digital certificate, issued by a well-run Certification Authority (CA).
The CA acts as a mutually trusted third party, a root of trust.</t>
      <t>Certificate-based identities are limited in scope by the issuing CA, or by the namespace of the
application responsible for issuing or validating the identity.</t>
      <t>An example of this limitation is well-illustrated by organizational Public Key Infrastructure (PKI).
Organizational PKI is very often coupled with email and LDAP systems, and can be used for associating
a human or machine identity identifier with a public key.
Within the organization, authentication systems already agree on the roots of trust for validating entity certificates issued by organizational PKI.</t>
      <t>Attempting to use organizational PKI outside the organization can be challenging.
In order to authenticate a certificate, the certificate’s CA must be trusted.
CAs have no way of controlling identifiers in certificates issued by other CAs.
Consequently, trusting multiple CAs at the same time can enable entity identifier collisions.
Asking an entity to trust your CA implies trust in anything that your CA signs.
This is why many organizations operate a private CA, and require users and devices connecting to the
organization’s networks or applications to possess certificates issued by the organization’s CA.</t>
      <t>These limitations make the implementation and ongoing maintenance of a PKI costly, and have a
chilling effect on the broader adoption of certificate-based IoT device identity and user identity.
If certificate-based device and user identity were easier to manage, more broadly trusted, and less
operationally expensive, more organizations and applications would be able to use it.</t>
      <t>The lack of trust between PKI domains has lead to a lack of simple and globally scalable solutions
for secure end-to-end inter-domain communication between entities, such as SIP phones, email and
chat accounts and IoT devices belonging to different organizations.</t>
      <t>DANCE seeks to make PKI-based user and IoT device identity universally discoverable, more broadly recognized,
and less expensive to maintain by using DNS as the constraining namespace and lookup mechanism.
DANCE builds on patterns established by the original DANE RFCs to enable client and sending entity
certificate, public key, and trust anchor discovery.
DANCE allows entities to possess a first-class identity, which, thanks to DNSSEC, may be trusted by any
application also trusting the DNS.
A first-class identity is an application-independent identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t><strong>This section will be interesting to define. We have great examples of identity terminology in the https://datatracker.ietf.org/doc/html/draft-sarikaya-t2trg-sbootstrapping-06 document, but this document also admits that there is semantic drift on terms like “bootstrapping”, depending on who’s talking.</strong></t>
      <t><strong>How to Dance with ENTITY:</strong> This architecture document delegates many details of how DANCE can be used with some specific protocol to a document with the names "How to Dance with <em>entity</em>".</t>
      <t><strong>Identity provisioning:</strong> This refers to the set of tasks required to securely provision an asymmetric key pair for the device, sign the certificate (if the public credential is not simply a raw public key), and publish the public key or certificate in DNS.
Under some circumstances, these steps are not all performed by the same party or organization.
A device manufacturer may instantiate the key pair, and a systems integrator may be responsible for issuing (and publishing) the device certificate in DNS.
In some circumstances, a manufacturer may also publish device identity records in DNS.
In this case, the system integrator needs to perform network and application access configuration, since the identity already exists in DNS.
A user may instantiate a key pair, based upon which an organization's CA may produce a certificate after internally assuring the user identity, and the systems integrator may publish the CA root certificate in DNS.</t>
      <t><strong>DANCEr:</strong> A DANCEr is the term which is used to describe a protocol that has been taught to use DANE,
usually through a <em>How to Dance with</em> document.</t>
      <t><strong>Security Domain:</strong> DNS-bound client identity allows the device to establish secure communications with
any server with a DNS-bound identity, as long as a network path exists, the entity is configured to trust
its communicating peer by its DNS owner name, and agreement on protocols can be achieved.
The act of joining a security domain, in the past, may have involved certificate provisioning.
Now, it can be as simple as using a manufacturer-provisioned identity to join the device to the network and application.
[Is the security domain defined by how broadly the identity is recognized, or by the breadth of the application or network access policy?]</t>
      <t><strong>Client:</strong> This architecture document adopts the definition of "Client" from RFC 8446: "The endpoint initiating the TLS connection"</t>
      <t><strong>User:</strong> A client whose name consists of a user identity and a DNS owner name prefixed with a _user label.</t>
      <t><strong>Server:</strong> This architecture document adopts the definition of "Server" from RFC 8446: "The endpoint that did not initiate the TLS connection"</t>
      <t><strong>Sending agent:</strong> Software which encodes and transmits messages.
A sending agent may perform tasks related to generating cryptographic signatures and/or encrypting messages before transmission.</t>
      <t><strong>Receiving agent:</strong> Software which interprets and processes messages.
A receiving agent may perform tasks related to the decryption of messages, and verification of message signatures.</t>
      <t><strong>Store-and-forward system:</strong> A message handling system in-path between the sending agent and the receiving agent.</t>
      <t><strong>Hardware supplier role:</strong> The entity which manufactures or assembles the physical device.
In many situations, multiple hardware suppliers are involved in producing a given device.
In some cases, the hardware supplier may provision an asymmetric key pair for the device and establish the device identity in DNS.
In some cases, the hardware supplier may ship a device with software pre-installed.</t>
      <t><strong>Systems integrator:</strong> The party responsible for configuration and deployment of application components.
In some cases, the systems integrator also installs the software onto the device, and may provision the device identity in DNS.</t>
      <t><strong>Consumer:</strong> The entity or organization which pays for the value provided by the application, and defines the success criteria for the output of the application.</t>
    </section>
    <section anchor="communication-patterns">
      <name>Communication Patterns</name>
      <section anchor="clientserver">
        <name>Client/Server</name>
        <t>Client/server communication patterns imply a direct connection between an entity which provides a service (the server), and an entity which initiates a connection to the server, called a client.
A secure implementation of this pattern includes a TLS-protected session directly between the client and the server.
A secure implementation may also include public key-based mutual authentication.</t>
        <t>Extending DANE to include client identity allows the server to authenticate clients independent of the private PKI used to issue the client certificate.
This reduces the complexity of managing the CA certificate collection, and mitigates the possibility of client identifier collision.
If the client is a user, the certificate holds an additional user identity supplied under the prerogative of a DNS owner name, which reduces the complexity of authenticating both internal and external users, through protocol mechanisms like SASL EXTERNAL <xref target="RFC4422"/>.</t>
      </section>
      <section anchor="peer2peer">
        <name>Peer2peer</name>
        <t>The extension also allows an application to find an application identity and set up a secure communication channel directly.
This pattern can be used in mesh networking, IoT and in many communication protocols for multimedia sessions, chat and messaging, where each endpoint may represent a device or a user.</t>
      </section>
      <section anchor="decoupled">
        <name>Decoupled</name>
        <t>Decoupled architecture, frequently incorporating store-and-forward systems, provides no direct connection between the producer and consumer of information.
The producer (or sending agent) and consumer (or receiving agent) are typically separated by at least one host running messaging-oriented middleware.
The Messaging-oriented middleware components may act as a server for the purpose of establishing TLS sessions for the producer and consumer.
This allows the assertion of identity between the middleware and sending agent, and the middleware and receiving agent.
The trust relationship between the sending agent and receiving agent is based on the presumed trustworthiness of the middleware, unless an identity can be attached to the message itself, independent of transport and middleware components.</t>
        <t>Within many existing store-and-forward protocols, certificates may be transmitted within the signed message itself.
An example of this is S/MIME.
Within IoT applications, we find that networks may be more constrained.
Including certificates in message payloads can present an unnecessary overhead on constrained network links.
Decoupled applications benefit from an out-of-band public key discovery mechanism, which may enable the retrieval of certificates only when needed, and sometimes using a less expensive network connection.</t>
      </section>
    </section>
    <section anchor="client-authentication">
      <name>Client authentication</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>The client sets up a TLS connection to a server, attaches a client certificate with one subjectAltName element dNSName indicating the DNS onwer name of the client.
If the client is a user, their user identity is added in one subjectAltName element otherName holding their uid attribute <xref target="RFC4519"/>.</t>
        <t>In the TLS connection the DANE-client-id extension is used to tell the server to use the certificate dNSName to find a DANE record including the public key of the certificate to be able to validate.
If the server can validate the DNSSEC response, the server validates the certificate and completes the TLS connection setup.
(PKIX offers rfc822Name with userid@domain.name as alternative for a user's uid &amp; dNSName, but it is limited to ASCII and suggests email only).</t>
        <t>Using DANE to convey certificate information for authenticating TLS clients gives a not-yet-authenticated client the ability to trigger a DNS lookup on the server side of the TLS connection.
An opportunity for DDOS may exist when malicious clients can trigger arbitrary DNS lookups.
For instance, an authoritative DNS server which has been configured to respond slowly, may cause a high concurrency of in-flight TLS authentication processes as well as open connections to upstream resolvers.
This sort of attack (of type slowloris) could have a performance or availability impact on the TLS server.</t>
        <section anchor="example-1-tls-authentication-for-https-api-interaction-dane-pattern-assurance">
          <name>Example 1: TLS authentication for HTTPS API interaction, DANE pattern assurance</name>
          <ul spacing="normal">
            <li>
              <t>The client initiates a TLS connection to the server.</t>
            </li>
            <li>
              <t>The TLS server compares the dane_clientid (conveyed via the DANE Client Identity extension) to a list of allowed client domains.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed, the TLS server then performs a DNS lookup for the client's TLSA record.
If the dane_clientid is not allowed, authentication fails.</t>
            </li>
            <li>
              <t>If the client's TLSA record matches the presented certificate or public key, the TLS handshake completes successfully and the authenticated dane_clientid is presented to the web application in the (TBD) header field.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>This pattern translates well to TLS/TCP load balancers, by using a TCP TLV instead of an HTTP header.</t>
            </li>
            <li>
              <t>No traffic reaches the application behind the load balancer unless DANE client authentication is successful.</t>
            </li>
          </ul>
          <section anchor="example-2-tls-authentication-for-https-api-interaction-dane-matching-in-web-application">
            <name>Example 2: TLS authentication for HTTPS API interaction, DANE matching in web application</name>
            <ul spacing="normal">
              <li>
                <t>The client initiates a TLS connection to the server.</t>
              </li>
              <li>
                <t>The TLS server accepts any certificate for which the client can prove possession of the corresponding private key.</t>
              </li>
              <li>
                <t>The TLS server passes the certificate to the web application in (TBD) header field.</t>
              </li>
              <li>
                <t>The HTTP request body contains the dane_clientid, and is passed to the web application.</t>
              </li>
              <li>
                <t>The web application compares the dane_clientid to a list of allowed clients or client domains.</t>
              </li>
              <li>
                <t>If the dane_clientid is allowed, the web application makes the DNS query for the TLSA records for dane_clientid</t>
              </li>
              <li>
                <t>If the presented certificate (which was authenticated by the TLS server) matches at least one TLSA record for dane_clientid, authentication succeeds.</t>
              </li>
            </ul>
            <t>This pattern has the following advantages:</t>
            <ul spacing="normal">
              <li>
                <t>In a web application where a TLS-terminating load balancer sits in front of a web application, the authentication logic in the load balancer remains simple.</t>
              </li>
              <li>
                <t>The web application ultimately decides whether to make the DNS query to support DANE authentication.
This allows the web application to reject clients with identifiers which are not allowed, before making a DNS query for TLSA retrieval and comparison.
No need to manage an allow-list in the load balancer.</t>
              </li>
              <li>
                <t>This can be implemented with no changes to the TLS handshake.</t>
              </li>
            </ul>
          </section>
          <section anchor="example-3-tls-user-authentication-for-an-ldap-query">
            <name>Example 3: TLS user authentication for an LDAP query</name>
            <ul spacing="normal">
              <li>
                <t>The LDAP client initiates a TLS connection the the server, conveying the user's domain via the DANE Client Identity extension.</t>
              </li>
              <li>
                <t>If the dane_clientid is allowed and begins with a _user label, the TLS server then performs a DNS lookup for TLSA records holding the user's CA, and includes them when requesting a client certificate.</t>
              </li>
              <li>
                <t>If the client's certificate is signed by a CA found in the TLSA records and the certificate's dNSName prefixed with a _user label matches the dane_clientid then the client identity is authenticated to consist of the lowercase uid in the certificate, an "@" symbol and the lowercase UTF-8 representation of the certificate's dNSName (which lacks the "_user." prefix).</t>
              </li>
              <li>
                <t>The LDAP server responds to SASL EXTERNAL authentication by obtaining the authenticated user identity in userid@domain.name form and, if so requested, attempts to change to an authorization identity.</t>
              </li>
            </ul>
            <t>This pattern has the following advantages:</t>
            <ul spacing="normal">
              <li>
                <t>SASL authentication under TLS encryption is common to many protocols, including new ones.</t>
              </li>
              <li>
                <t>This LDAP example demonstrates the potential of authentication with realm crossover support as a precursor to fine access control to possibly sensitive data.</t>
              </li>
              <li>
                <t>User identities cannot be iterated in DNS; TLS 1.3 conceals the client certificate; TLS in general conceals the user's choice of authorization identity during SASL EXTERNAL.</t>
              </li>
              <li>
                <t>This can be implemented with no changes to the TLS handshake.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="iot-device-to-cloud">
          <name>IoT: Device to cloud</name>
          <t>Direct device-to-cloud communication is common in simple IoT applications.
Authentication in these applications is usually accomplished using shared credentials like API keys, or using client certificates.
Client certificate authentication frequently requires the consumer to maintain a CA.
Before client DANE, the CA trust anchor certificate would be installed into the cloud application, and used in the TLS authentication process.</t>
          <t>Using client DANE for device identity can allow parties other than the implementer to operate the CA.
A hardware manufacturer can provide a pre-established identity, with the certificate or public key already published in DNS.
This makes PKI-based identity more approachable for small organizations which currently lack the resources to operate an organizational CA.</t>
        </section>
        <section anchor="lorawan">
          <name>LoRaWAN</name>
          <t>For the end-device onboarding in LoRaWAN, the "network server" and the "join server" <xref target="RFC8376"/> needs to establish mutual TLS authentication in order to exchange configuration parameters.
Certificate Authority based mutual TLS authentication doesn't work in LoRaWAN due to the non availability of the CA trust store in the LoRaWAN network stack.
Self-signed certificate based mutual-TLS authentication method is the alternative solution.</t>
          <t>DANE based client identity allows the server to authenticate clients during the TLS handhsake.
Thus, independent of the private PKI used to issue the client's self-signed certificate, the "network server" and the "join server" could be mutually authenticated.</t>
        </section>
        <section anchor="edge-computing">
          <name>Edge Computing</name>
          <t><eref target="Edge Computing">https://datatracker.ietf.org/doc/html/draft-hong-t2trg-iot-edge-computing-01</eref> may require devices to mutually authenticate in the field.
A practical example of this pattern is the edge computing in construction use case [https://datatracker.ietf.org/doc/html/draft-hong-t2trg-iot-edge-computing-01#section-6.2.1].
Using traditional certificate-based identity, the sensor and the gateway may have certificates issued by
the same organizational PKI.
By using DANE for client and sender identity, the sensor and the gateway may have identities represented
by the equipment supplier, and still be able to mutually authenticate.
Important sensor measurements forwarded by the gateway to the cloud may bear the DNS owner name and signature of
the originating sensor, and the cloud application may authenticate the measurement independent of the gateway
which forwarded the information to the application.</t>
        </section>
        <section anchor="domain-users">
          <name>Domain Users</name>
          <t>The allocation of user identities is the prerogative of a domain, in line with the nesting suggested in URI notation.
Domains may even choose to assign domain user identities to services, possibly with easily recognised identities like +mail+archive@domain.name.
Domains who publish TLSA records for a CA under a _user name underneath their domain allow the validation of user identities as mentioned in a certificate as TLS client or peer identities.
This mechanism is not restricted to domain-internal users, but can be used to validate users under any domain.</t>
          <t>Since ENUM maps telephone numbers to DNS owner names, it is possible to employ these same mechanisms for telephone number users.
Any DANCEr may however define alternate derivation procedures to obtain the DNS owner name for a phone number from specialised PKIX or LDAP attributes such as telephoneNumber, telexNumber, homePhone, mobile and pager.</t>
          <t>There is no reason why other uses, such as store-and-forward with S/MIME, could not benefit from this DNS-based PKI, as long as they remain mindful that anything in the certificate is the prerogative of the domain publishing the TLSA record, and the only reliable identity statements are for resources underneath the domain -- notably, the assignment of uid names.</t>
        </section>
        <section anchor="sip-and-webrtc-inter-domain-privacy">
          <name>SIP and WebRTC inter-domain privacy</name>
          <t>End to end security in SIP is currently based on a classical S/MIME model which has not received much implementation.
There are also SIP standards that build upon a trust chained anchored on the HTTP trust chain (SIP identity, STIR).
WebRTC has a trust model between the web browser and the servers using TLS, but no inter-domain trust infrastructure.
WebRTC lacks a definition of namespace to map to DNS, where SIP is based on an email-style addressing scheme.
For WebRTC the application developer needs to define the name space and mapping to DNS.</t>
          <t>By using DNS as a shared root of trust SIP and WebRTC end points can anchor the keys used for DTLS/SRTP media channel setup.
In addition, SIP devices can establish security in the SIP messaging by using DNS to find the callee’s and the callers digital identity.</t>
          <t><xref target="I-D.johansson-sipcore-dane-sip"/>(SIPDANE)</t>
        </section>
        <section anchor="dns-over-tls-client-authentication">
          <name>DNS over TLS client authentication</name>
          <t>DNS-over-TLS client authentication is applicable to most portions of the
transport segments of the DNS infrastructure.
Current BCP for authentication between DNS infrastructure tends to be based
upon a shared secret in the form of TSIG.</t>
          <t>From authoritative to authoritative secondary, it can be applied to
XFR-over-TLS ("XoT") as an upgrade to TSIG, removing the need for out-of-band
communication of shared secrets, currently a weak point in that portion of
the infrastructure.</t>
          <t>From authoritative servers to recursive servers, in situations in which both
are part of a common trust-group or have access to the same non-public or
split-horizon zone data, client authentication allows authoritative servers
to give selective access to specific recursive servers. Alternatively, some
recursive servers could authenticate in order to gain access to
non-content-related special services, such as a higher query rate-limit quota
than is publicly available.</t>
          <t>Between recursive resolvers and caching/forwarding or stub resolvers,
authentication can be used to gain access to special services, such as
subscription-based malware blocking, or visibility of corporate split-horizon
internal zone, or to distinguish between subscribers to different performance tiers.</t>
          <t>In the ideal implementation, client and server would bidirectionally authenticate, using DANE client certificates to bootstrap TLS transport security.</t>
        </section>
        <section anchor="smtp-starttls">
          <name>SMTP, STARTTLS</name>
          <t>SMTP has included the ability to upgrade in-protocol to TLS using the STARTTLS <xref target="RFC7817"/> command.
When doing so the certificate of the server is checked against what the client was expecting.
Support for this is very common and most email on the Internet is transmitted in this way.</t>
          <t>The use of client TLS certificates has not yet become common, in part because it is unclear how or what the server would check the certificate against.</t>
          <t>For mail-transfer-agent (MTA) to MTA communications, the use of a TLSA RR in the DNS would permit SMTP servers to check the identity of the parties trying to send email.
There are many use cases, but a major one is often dealing with authenticated relaying of email.</t>
        </section>
        <section anchor="ssh-client">
          <name>SSH client</name>
          <t>SSH servers have for some time been able to put their host keys into DNS using <xref target="RFC4255"/>.</t>
          <t>In many SSH server implementations the list of users that is authorized to login to an account is given by listing their public keys in a per-user file ("authorized_keys").
The file provides both authorization (who may login), and authentication (how they prove their identity).
While this is an implementation detail, doing both in one place has been one of Secure Shell's major reason for success.</t>
          <t>However, there are downsides to this: a user can not easily replace their key without visiting every host they are authorized to access and update the key on that host.
Separation of authorization and authentication in this case would involve putting the key material in a third place, such as in a DANE record in DNS, and then listing only the DNS owner name in the authorization file:</t>
          <ul spacing="normal">
            <li>
              <t>A user who wants to update their key need only update DNS in that case.</t>
            </li>
            <li>
              <t>A user who has lost access to their key, but can still update DNS (or can have a colleague update it) would more easily be able to recover.</t>
            </li>
            <li>
              <t>An administrator who controls the domain would be able to remove a departing user's key from DNS, preventing the user from authenticating in the future.</t>
            </li>
          </ul>
          <t>The DNS record used could be TLSA, but it is possible with some protocol work that it could instead be SSHFP.
Since SSH can trust CA certificates from X.509, those may be published for user authentication.</t>
        </section>
        <section anchor="network-access">
          <name>Network Access</name>
          <t>Network access refers to an authentication process by which a node is admitted securely onto network infrastructure.
This is most common for wireless networks (wifi, 802.15.4), but has also routine been done for wired infrastructure using 802.1X mechanisms with EAPOL.</t>
          <t>While there are EAP protocols that do not involve certificates, such as EAPSIM (<xref target="RFC4186"/>, the use of symmetric key mechanisms as the "network key" is common in many homes.
The use of certificate based mechanisms are expected to increase, due to challenges, such as Randomized and Changing MAC addresses (RCM), as described in <xref target="I-D.ietf-madinas-use-cases"/>.</t>
          <section anchor="eap-tls-with-radius">
            <name>EAP-TLS with RADIUS</name>
            <t>Enterprise EAP methods use a version of TLS to form a secure transport.
Client and server-side certificates are used as credentials.
EAP-TLS does not run over TCP, but rather over a reliable transport provided by EAP.
To keep it simple the EAP "window" is always one, and there are various amounts of overhead that needs to be accounted for, and the EAP segment size is often noticeably smaller than the normal ethernet 1500 bytes.
<xref target="RFC3748"/> does guarantee a minimum payload of 1020 bytes.</t>
            <t>The client side certificates are often larger than 1500 bytes and can take two or three round trip times to transport from the supplicant to the authenticator.
In worst case scenarios, which are common with eduroam <xref target="RFC7593"/>, the EAP packets are transported some distance, easily across the entire planet.
The authenticating system (the "authentication server" in EAP terms) is a system at the institute that issued the client side certificate, and so already has access to the entire client certificate.
Transferring the client certificate is redundant.
That is, the authenticator already has access to the entire certificate, but the client does not know this to tbe case, so it sends the entire certificate anyway.</t>
            <t>The use of DANE Client IDs in TLS as described in <xref target="I-D.ietf-dance-tls-clientid"/> reduces the redundant bytes of certificate sent.</t>
            <section anchor="terminology">
              <name>Terminology</name>
              <t><strong>Supplicant:</strong> The entity which acts as the TLS client in the EAP-TLS authentication protocol.
This term is defined in IEEE 802.1x.
The suppliant acts as a client in the EAPOL (EAP over LAN) protocol, which is terminated at the authenticator (defined below).</t>
              <t><strong>Authentication server:</strong> The entity which acts as the TLS server in the EAP-TLS protocol.
RADIUS (RFC 2865) is a frequently-used authentication server protocol.</t>
              <t><strong>Authenticator:</strong> The authenticator is the device which acts as a server the EAPOL (EAP over LAN) protocol, and is a client of the authentication server.
The authenticator is responsible for passing EAP messages between the supplicant and the authentication server, and for ensuring that only authenticated supplicants gain access to the network.</t>
              <t><eref target="EAP-TLS">https://datatracker.ietf.org/doc/html/rfc5216</eref> is a mature and widely-used protocol for network authentication, for IoT and IT equipment.
IEEE 802.1x defines the encapsulation of EAP over LAN access technologies, like IEEE 802.11 wireless and IEEE 802.3 ethernet.
RADIUS is a protocol and server technology frequently used for supporting the server side of EAP-TLS authentication.
Guidance for implementing RADIUS strongly encourages the use of a single common CA for all supplicants, to mitigate the possibility of identifier collisions across PKIs.
The use of DANE for client identity can allow the safe use of any number of CAs.
DNS acts as a constraining namespace, which prevents two unrelated CAs from issuing valid certificates bearing the same identifier.
Certificates represented in DNS are valid, and all others are un-trusted.</t>
            </section>
          </section>
          <section anchor="radsec">
            <name>RADSEC</name>
            <t>The RADIUS protocol has a few recognized security problems.
<eref target="RADSEC">https://datatracker.ietf.org/doc/html/rfc6614</eref> addresses the challenges related to the weakness of MD5-based authentication and confidentiality over untrusted networks by establishing a TLS session between the RADIUS protocol client and the RADIUS protocol server.
RADIUS datagrams are then transmitted between the authenticator and authentication server within the TLS session.
Updating the RADSEC standard to include the use of DANE for client and server identity would allow a RADIUS server and client to mutually authenticate, independent of the client’s and server’s issuing CAs.
The benefit for this use case is that a hosted RADIUS service may mutually authenticate any client device, like a WiFi access point or ethernet switch, via RADSEC, without requiring the distribution of CA certificates.</t>
          </section>
        </section>
      </section>
      <section anchor="object-security">
        <name>Object Security</name>
        <t>Issue #13</t>
        <section anchor="structured-data-messages-josecose">
          <name>Structured data messages: JOSE/COSE</name>
          <t>JOSE and COSE provide formats for exchanging authenticated and encrypted structured data. JOSE defines the x5u field in <xref section="4.1.5" sectionFormat="comma" target="RFC7515"/>, and COSE defines a field of the same name in <xref section="2" sectionFormat="comma" target="I-D.ietf-cose-x509"/>.</t>
          <t>However, this URL field points to where the key can be found.
There is, as yet, no URI scheme which says that the key can be found via the DNS lookup itself.</t>
          <t>In order to make use of x5u, a DANCEr would have to define a new URI scheme that explained how to get the right key from DNS.
(Open Issue #22, about <xref target="RFC4501"/>)</t>
        </section>
      </section>
      <section anchor="operational-anomaly-reporting">
        <name>Operational anomaly reporting</name>
        <t>Issue #14</t>
        <section anchor="mud-reporting-for-improper-provisioning">
          <name>MUD reporting for improper provisioning</name>
        </section>
        <section anchor="xarf-for-abuse-reporting">
          <name>XARF for abuse reporting</name>
        </section>
      </section>
      <section anchor="adjacent-ecosystem-components">
        <name>Adjacent Ecosystem Components</name>
        <section anchor="certification-authority">
          <name>Certification Authority</name>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>DNS clients should use DNS over TLS with trusted DNS resolvers to protect the identity of authenticating peers.</t>
      </section>
      <section anchor="integrity">
        <name>Integrity</name>
        <t>The integrity of public keys represented in DNS is most important.
An altered public key can enable device impersonation, and the denial of existence for a valid identity can cause devices to become un-trusted by the network or the application.
DNS records should be validated by the DNS stub resolver, using the DNSSEC protocol.</t>
        <t>Compartmentalizing failure domains within an application is a well-known architectural best practice.
Within the context of protecting DNS-based identities, this compartmentalization may manifest by hosting an identity zone on a DNS server which only supports the resource record types essential for representing device identities.
This can prevent a compromised identity zone DNS server from presenting records essential for impersonating web sites under the organization’s domain name.</t>
        <t>The naming pattern suggested in <eref target="https://datatracker.ietf.org/doc/html/draft-huque-dane-client-cert">https://datatracker.ietf.org/doc/html/draft-huque-dane-client-cert</eref> includes
an underscore label (_device) which also prevents the issuance of Web PKI-validating certificates in the
event a DNS server hosting a client identity zone, which is capable of presenting A and AAAA records, is compromised.
An alternative underscore label _user separates the TLSA records with the domain CA from the TLSA records for devices.</t>
      </section>
      <section anchor="availability">
        <name>Availability</name>
        <t>One of the advantages of DNS is that it has more than fourty years of demonstrated scaling.
It is a distributed database with a caching mechanism, and properly configured, it has proven resilient
to many kinds of outages and attacks.</t>
        <t>A key part of this availability is the proper use of Time To Live (TTL) values for resource records.
A cache is allowed to hang on to the data for a set time, the TTL, after which it must do a new query to find out if the data has changed, or perhaps been deleted.</t>
        <t>There is therefore a tension between resilience (higher TTL values), and agility (lower TTL values).
A lower TTL value allows for revocation or replacement of a key to become known much faster.
This allows for a more agile security posture.</t>
        <t>On the other hand, lower TTLs cause the queries to occur more often, which may reveal more information to an observer about which devices are active.
Encrypted transports like DoT/DoH/DoQ make these queries far less visible.
In addition to the on-path observer being able to see more, the resolver logs also may be a source of information.
It also allows for more opportunities for an attacker to affect the response time of the queries.</t>
      </section>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>If the DNS owner name of the identity proven by a certificate is directly or indirectly relatable to a person, privacy needs to be considered when forming the name of the DNS resource record for the certificate.
This privacy is implied for domain users inasfar as the domain CA does not mention users.
When creating the DNS owner name, effects of DNS zone walking and possible harvesting of identities in the DNS zone will have to be considered.
The DNS owner name may not have to have a direct relation to the name of the subject or the subjectAltName of the certificate.
If there is such a relation, a DANCEr may specify support for CA certificates, stored under a wildcard in DNS.</t>
        <t>Further work has do be done in this area.</t>
        <t>AW: Consider if an approach like the email local-part hashing used in SMIMEA <eref target="https://datatracker.ietf.org/doc/html/rfc8162">https://datatracker.ietf.org/doc/html/rfc8162</eref> might work for this.
If the identifier/local-part is hashed and the certificate association is a SHA256 or SHA512 hash, the effort required to walk a zone would not produce much useful information.</t>
        <section anchor="dns-scalability">
          <name>DNS Scalability</name>
          <t>In the use case for IoT an implementation must be scalable to a large amount of devices.
In many cases, identities may also be very short lived as revocation is performed by simply removing a DNS record.
A zone will have to manage a large amount of changes as devices are constantly added and de-activated.</t>
          <t>In these cases it is important to consider the architecture of the DNS zone and when possible use a tree-like structure with many subdomain parts, much like reverse DNS records or how telephone numbers are represented in the ENUM standard (RFC 6116).</t>
          <t>If an authoritative resolver were configured to respond quite slowly (think slow loris [XXXrefereceXXX]), is it possible to cause a DoS on the TLS server via complete exhaustion of TCP connections?</t>
          <t>The availability of a client identity zone is essential to permitting clients to authenticate.
If the DNS infrastructure hosting client identities becomes unavailable, then the clients represented by that zone cannot be authenticated.</t>
          <t><strong>OEJ: We may want to have a discussion with the IETF DNS directorate. The scalability section above is from a discussion with one of the members...</strong></t>
        </section>
        <section anchor="change-of-ownership-for-iot-devices">
          <name>Change of ownership for IoT devices</name>
          <t>One of the significant use cases is where the devices are identified by their manufacturer assigned identities.
A significant savings was that enterprises would not have to run their own (private) PKI systems, sometimes even one system per device type.
But, with this usage style for DANCE there is no private PKI to run, and as a result there is no change of ownership required.
The device continues to use the manufacturer assigned identity.</t>
          <t>The device OwnerOperator is therefore at risk if the device's manufacturer goes out of business, or decides that they no longer wish to manufacturer that device.
Should that happen then the OwnerOperator of the device may be in trouble, and may find themselves having to replace the devices.</t>
          <t><xref section="10.4" sectionFormat="comma" target="RFC8995"/> (BRSKI) deals with concerns about manufacturers influence on devices.
In the case of BRSKI, the concern was limited to when the device ownership transfer was performed (the BRSKI transaction itself).
There was no concern once the OwnerOperator had taken control over the device through an <xref target="RFC8366"/> voucher.</t>
          <t>In the case of DANCE, the manufacturer is continuously involved with the day to day operation of the device.</t>
          <t>If this is of concern, then the OwnerOperator should perform some kind of transfer of ownership, such as using DPP, <xref target="RFC8995"/>(BRSKI), <xref target="RFC9140"/>(EAP-NOOB), and others yet to come.</t>
          <t>The DANCE method of using manufacturer assigned identities would therefore seem to be best used for devices which have a short lifetime: one much smaller than the uncertainty about the anticipated lifespan of the manufacturer.
For instance, some kind of battery operated sensor which might be used in a large quantity at a construction site, and which can not be recharged.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4422">
          <front>
            <title>Simple Authentication and Security Layer (SASL)</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="K. Zeilenga" initials="K." role="editor" surname="Zeilenga"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms. It provides a structured interface between protocols and mechanisms. The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms. The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t>
              <t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection. In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t>
              <t>This document obsoletes RFC 2222. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4422"/>
          <seriesInfo name="DOI" value="10.17487/RFC4422"/>
        </reference>
        <reference anchor="RFC4519">
          <front>
            <title>Lightweight Directory Access Protocol (LDAP): Schema for User Applications</title>
            <author fullname="A. Sciberras" initials="A." role="editor" surname="Sciberras"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>This document is an integral part of the Lightweight Directory Access Protocol (LDAP) technical specification. It provides a technical specification of attribute types and object classes intended for use by LDAP directory clients for many directory services, such as White Pages. These objects are widely used as a basis for the schema in many LDAP directories. This document does not cover attributes used for the administration of directory servers, nor does it include directory objects defined for specific uses in other documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4519"/>
          <seriesInfo name="DOI" value="10.17487/RFC4519"/>
        </reference>
        <reference anchor="RFC8376">
          <front>
            <title>Low-Power Wide Area Network (LPWAN) Overview</title>
            <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation. This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8376"/>
          <seriesInfo name="DOI" value="10.17487/RFC8376"/>
        </reference>
        <reference anchor="I-D.johansson-sipcore-dane-sip">
          <front>
            <title>TLS sessions in SIP using DNS-based Authentication of Named Entities (DANE) TLSA records</title>
            <author fullname="Olle E. Johansson" initials="O. E." surname="Johansson">
              <organization>Edvina AB</organization>
            </author>
            <date day="6" month="October" year="2014"/>
            <abstract>
              <t>   Use of TLS in the SIP protocol is defined in multiple documents,
   starting with RFC 3261.  The actual verification that happens when
   setting up a SIP TLS connection to a SIP server based on a SIP URI is
   described in detail in RFC 5922 - SIP Domain Certificates.

   In this document, an alternative method is defined, using DNS-Based
   Authentication of Named Entities (DANE).  By looking up TLSA DNS
   records and using DNSsec protection of the required queries,
   including lookups for NAPTR and SRV records, a SIP Client can verify
   the identity of the TLS SIP server in a different way, matching on
   the SRV host name in the X.509 PKIX certificate instead of the SIP
   domain.  This provides more scalability in hosting solutions and make
   it easier to use standard CA certificates (if needed at all).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-johansson-sipcore-dane-sip-00"/>
        </reference>
        <reference anchor="RFC7817">
          <front>
            <title>Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document describes the Transport Layer Security (TLS) server identity verification procedure for SMTP Submission, IMAP, POP, and ManageSieve clients. It replaces Section 2.4 (Server Identity Check) of RFC 2595 and updates Section 4.1 (Processing After the STARTTLS Command) of RFC 3207, Section 11.1 (STARTTLS Security Considerations) of RFC 3501, and Section 2.2.1 (Server Identity Check) of RFC 5804.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7817"/>
          <seriesInfo name="DOI" value="10.17487/RFC7817"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="RFC4186">
          <front>
            <title>Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM)</title>
            <author fullname="H. Haverinen" initials="H." role="editor" surname="Haverinen"/>
            <author fullname="J. Salowey" initials="J." role="editor" surname="Salowey"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Global System for Mobile Communications (GSM) Subscriber Identity Module (SIM). GSM is a second generation mobile network standard. The EAP-SIM mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and session keys of greater strength than the individual GSM triplets. The mechanism also includes network authentication, user anonymity support, result indications, and a fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4186"/>
          <seriesInfo name="DOI" value="10.17487/RFC4186"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-use-cases">
          <front>
            <title>Randomized and Changing MAC Address Use Cases</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yiu Lee" initials="Y." surname="Lee">
              <organization>Comcast</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   To limit the privacy issues created by the association between a
   device, its traffic, its location and its user, client and client OS
   vendors have started implementing MAC address rotation.  When such a
   rotation happens, some in-network states may break, which may affect
   network connectivity and user experience.  At the same time, devices
   may continue using other stable identifiers, defeating the MAC
   rotation purposes.  This document lists various network environments
   and a set of network services that may be affected by such rotation.
   This document then examines settings where the user experience may be
   affected by in-network state disruption.  Last, this document
   examines solutions to maintain user privacy while preserving user
   quality of experience and network operation efficiency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-use-cases-09"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="I-D.ietf-dance-tls-clientid">
          <front>
            <title>TLS Extension for DANE Client Identity</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="8" month="January" year="2024"/>
            <abstract>
              <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-03"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="13" month="October" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general.  For some algorithms, additional properties are defined that carry parameters relating to keys as needed.  The COSE Key structure is used for transporting keys outside of COSE messages.  This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-09"/>
        </reference>
        <reference anchor="RFC4501">
          <front>
            <title>Domain Name System Uniform Resource Identifiers</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document defines Uniform Resource Identifiers for Domain Name System resources. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4501"/>
          <seriesInfo name="DOI" value="10.17487/RFC4501"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
      </references>
    </references>
    <?line 535?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
