<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-beck-tls-trust-anchor-ids-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title>TLS Trust Anchor Identifiers</title>
    <seriesInfo name="Internet-Draft" value="draft-beck-tls-trust-anchor-ids-00"/>
    <author initials="B." surname="Beck" fullname="Bob Beck">
      <organization>Google LLC</organization>
      <address>
        <email>bbe@google.com</email>
      </address>
    </author>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="D." surname="O'Brien" fullname="Devon O'Brien">
      <organization>Google LLC</organization>
      <address>
        <email>asymmetric@google.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="28"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 67?>

<t>This document defines the TLS Trust Anchors extension, a mechanism for relying parties and subscribers to convey trusted certification authorities. It describes individual certification authorities more succinctly than the TLS Certificate Authorities extension.</t>
      <t>Additionally, to support TLS clients with many trusted certification authorities, it supports a mode where servers describe their available certification paths and the client selects from them. Servers may describe this during connection setup, or in DNS for lower latency.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/tls-trust-expressions/draft-beck-tls-trust-anchor-ids.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-beck-tls-trust-anchor-ids/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/tls-trust-expressions"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS <xref target="RFC8446"/> endpoints typically authenticate using X.509 certificates <xref target="RFC5280"/>. These are assertions by a certification authority (CA) that associate a TLS key with DNS names or other identifiers. If the peer trusts the CA, it will accept this association. The authenticating party (usually the server) is known as the <em>subscriber</em> and the peer (usually the client) is the <em>relying party</em>.</t>
      <t><xref section="4.2.4" sectionFormat="of" target="RFC8446"/> defines the <tt>certificate_authorities</tt> extension, which allows the subscriber, who may have multiple certificates available, to select the correct certificate for the relying party. However, this extension’s size is impractical for some applications.</t>
      <t>Without such a negotiation mechanism, the subscriber must somehow obtain certificates which simultaneously satisfy all relying parties. This is a challenge for subscribers when relying parties are diverse. This translates to analogous challenges for CAs and relying parties:</t>
      <ul spacing="normal">
        <li>
          <t>For a new CA to be usable by subscribers, all relying parties must trust it. This is particularly challenging for older, un-updatable relying parties. Existing CAs face similar challenges when rotating or deploying new keys.</t>
        </li>
        <li>
          <t>When a relying party must update its policies to meet new security requirements, it must choose between compromising on user security or imposing a significant burden on subscribers that still support older relying parties.</t>
        </li>
      </ul>
      <t>The <tt>certificate_authorities</tt> extension’s size becomes impractical due to two factors. First, X.509 names are large. Second, many clients, notably web browsers, trust a large number of CAs. As of August 2023, the Mozilla CA Certificate Program <xref target="MOZILLA-ROOTS"/> contained 144 CAs, with an average name length of around 100 bytes. This document introduces Trust Anchor Identifiers, which aims to address both of these challenges.</t>
      <t>There are four parts to this mechanism:</t>
      <ol spacing="normal" type="1"><li>
          <t><xref target="trust-anchor-ids"/> defines <em>trust anchor identifiers</em>, which are short, unique identifiers for X.509 trust anchors.</t>
        </li>
        <li>
          <t><xref target="tls-extension"/> defines a TLS extension that communicates the relying party’s requested trust anchors, and the subscriber’s available ones. When the relying party is a TLS client, it can mitigate large lists by sending a, possibly empty, subset of its trust anchors to the TLS server. The server provides its list of available trust anchors in response so that the client can retry on mismatch.</t>
        </li>
        <li>
          <t><xref target="dns-service-parameter"/> allows TLS servers to advertise their available trust anchors in HTTPS or SVCB <xref target="RFC9460"/> DNS records. TLS clients can then request an accurate initial subset and avoid a retry penalty.</t>
        </li>
        <li>
          <t><xref target="acme-extension"/> defines an ACME <xref target="RFC8555"/> extension for provisioning multiple certification paths, each with an associated trust anchor identifier.</t>
        </li>
      </ol>
      <t>Together, they extend the <tt>certificate_authorities</tt> mechanism to a broader set of applications, enabling a more flexible and robust PKI.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitaIs, as shown here.</t>
      <t>This document additionally uses the TLS presentation language, defined in <xref section="3" sectionFormat="of" target="RFC8446"/>, and ASN.1, defined in <xref target="X680"/>.</t>
      <section anchor="terminology-and-roles">
        <name>Terminology and Roles</name>
        <t>This document discusses three roles:</t>
        <dl>
          <dt>Subscriber:</dt>
          <dd>
            <t>The party whose identity is being validated in the protocol. In TLS, this is the side sending the Certificate and CertificateVerify message.</t>
          </dd>
          <dt>Relying party:</dt>
          <dd>
            <t>The party authenticating the subscriber. In TLS, this is the side that validates a Certificate and CertificateVerify message.</t>
          </dd>
          <dt>Certification authority (CA):</dt>
          <dd>
            <t>The service issuing certificates to the subscriber.</t>
          </dd>
        </dl>
        <t>Additionally, there are several terms used throughout this document to describe this proposal:</t>
        <dl>
          <dt>Trust anchor:</dt>
          <dd>
            <t>A pre-distributed public key or certificate that relying parties use to determine whether a certification path is trusted.</t>
          </dd>
          <dt>Certification path:</dt>
          <dd>
            <t>An ordered list of X.509 certificates starting with the target certificate. Each certificate is issued by the next certificate, except the last, which is issued by a trust anchor.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="trust-anchor-ids">
      <name>Trust Anchor Identifiers</name>
      <t>This section defines trust anchor identifiers, which are short, unique identifiers for a trust anchor. To simplify allocation, these identifiers are defined with object identifiers (OIDs) <xref target="X680"/> and IANA-registered Private Enterprise Numbers (PENs) <xref target="RFC9371"/>:</t>
      <t>A trust anchor identifier is an OID under the OID arc of some PEN. For example, an organization with PEN 32473 might define a trust anchor identifier with the OID <tt>1.3.6.1.4.1.32473.1</tt>.</t>
      <t>Trust anchor identifiers have ASCII text representations, for use in text-based formats, and binary representations, for use in a binary protocol such as TLS. For compactness, both representations use relative object identifiers (see Section 33 of <xref target="X680"/>), relative to the OID prefix <tt>1.3.6.1.4.1</tt>. The text representation is the relative object identifier in dotted decimal notation. The above example’s text representation would be <tt>32473.1</tt>. The binary representation consists of  the contents octets of the relative object identifier's DER encoding, as described in Section 8.20 of <xref target="X690"/>. For example, the binary representation of <tt>32473.1</tt> would be the four-octet sequence <tt>{0x81, 0xfd, 0x59, 0x01}</tt>.</t>
      <section anchor="relying-party-configuration">
        <name>Relying Party Configuration</name>
        <t>Relying parties are configured with one or more supported trust anchors. Each trust anchor which participates in this protocol must have an associated trust anchor identifier.</t>
        <t>When trust anchors are self-signed X.509 certificates, the X.509 trust anchor identifier extension MAY be used to carry this identifier. The trust anchor identifier extension has an <tt>extnID</tt> of <tt>id-trustAnchorIdentifier</tt> and an <tt>extnValue</tt> containing a DER-encoded TrustAnchorIdentifier structure, defined below. The TrustAnchorIdentifier is a relative object identifier, determined as in <xref target="trust-anchor-ids"/>. This extension MUST be non-critical.</t>
        <artwork><![CDATA[
id-trustAnchorIdentifier OBJECT IDENTIFIER ::= { TBD }

TrustAnchorIdentifier ::= RELATIVE-OID
]]></artwork>
        <t>Relying parties MAY instead or additionally configure trust anchor identifiers via some application-specific out-of-band information.</t>
        <t>Relying parties MAY support trust anchors without associated trust anchor identifiers, but such trust anchors will not participate in this protocol. Those trust anchors MAY participate in other trust anchor negotiation protocols, such as the <tt>certificate_authorities</tt> extension.</t>
      </section>
      <section anchor="subscriber-configuration">
        <name>Subscriber Configuration</name>
        <t>Subscribers are configured with one or more candidate certification paths to present in TLS, in some preference order. This preference order is used when multiple candidate paths are usable for a connection. For example, the subscriber may prefer candidates that minimize message size or have more performant private keys.</t>
        <t>Each candidate path which participates in this protocol must be provisioned with the trust anchor identifier for its corresponding trust anchor.</t>
        <t>To carry this information, this document defines the <tt>trust_anchor_identifier</tt> property for a CertificatePropertyList <xref section="5" sectionFormat="of" target="I-D.davidben-tls-trust-expr"/>. This <tt>data</tt> field of the property contains the binary representation of the trust anchor identifier of the certification path’s trust anchor, as described in <xref target="trust-anchor-ids"/>.</t>
        <artwork><![CDATA[
enum {
    trust_anchor_identifier(TBD), (2^16-1)
} CertificatePropertyType;
]]></artwork>
        <t>Subscribers MAY have candidate certification paths without associated trust anchor identifiers, but such paths will not participate in this protocol. Those paths MAY participate in other trust anchor negotiation protocols, such as the <tt>certificate_authorities</tt> extension.</t>
        <t>[[TODO: Move the definition of CertificatePropertyList from the trust expressions draft to here, if this ends up being the canonical one. When doing so, also import media type definition.]]</t>
      </section>
    </section>
    <section anchor="tls-extension">
      <name>TLS Extension</name>
      <t>This section defines the <tt>trust_anchors</tt> extension, which is sent in the ClientHello, EncryptedExtensions, CertificateRequest, and Certificate messages in TLS 1.3 or later.</t>
      <section anchor="overview">
        <name>Overview</name>
        <t>The <tt>trust_anchors</tt> extension is sent in ClientHello, CertificateRequest, or Certificate messages, defined using the structures below:</t>
        <artwork><![CDATA[
enum { trust_anchors(TBD), (2^16-1) } ExtensionType;

opaque TrustAnchorIdentifier<1..2^8-1>;

TrustAnchorIdentifier TrustAnchorIdentifierList<0..2^16-1>;
]]></artwork>
        <t>When the extension is sent in the ClientHello or CertificateRequest messages, the <tt>extension_data</tt> is a TrustAnchorIdentifierList and indicates that the sender supports the specified trust anchors. The list is unordered, and MAY be empty.</t>
        <t>When the extension is sent in EncryptedExtensions, the <tt>extension_data</tt> is a TrustAnchorIdentifierList containing the list of trust anchors that server has available, in the server’s preference order, and MUST NOT be empty.</t>
        <t>When the extension is sent in Certificate, the <tt>extension_data</tt> MUST be empty and indicates that the sender sent the certificate because the certificate matched a trust anchor identifier sent by the peer. When used in this form, the extension may only be sent in the first CertificateEntry. It MUST NOT be sent in subsequent ones.</t>
      </section>
      <section anchor="certificate-selection">
        <name>Certificate Selection</name>
        <t>A <tt>trust_anchors</tt> extension in the ClientHello or CertificateRequest is processed similarly to the <tt>certificate_authorities</tt> extension. The relying party indicates some set of supported trust anchors in the ClientHello or CertificateRequest <tt>trust_anchors</tt> extension. The subscriber then selects a certificate from its candidate certification paths (see <xref target="subscriber-configuration"/>), as described in <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/> and <xref section="4.4.2.3" sectionFormat="of" target="RFC8446"/>. This process is extended as follows:</t>
        <t>If the ClientHello or CertificateRequest contains a <tt>trust_anchors</tt> extension, the subscriber SHOULD send a certification path whose trust anchor identifier appears in the relying party’s <tt>trust_anchors</tt> extension.</t>
        <t>If the ClientHello or CertificateRequest contains both <tt>trust_anchors</tt> and <tt>certificate_authorities</tt>, certification paths that satisfy either extension’s criteria may be used. This additionally applies to future extensions which play a similar role.</t>
        <t>If no certification paths satisfy either extension, the subscriber MAY return a <tt>handshake_failure</tt> alert, or choose among fallback certification paths without considering <tt>trust_anchors</tt> or  <tt>certification_authorities</tt>. See <xref target="retry-mechanism"/> for additional guidance on selecting a fallback when the ClientHello contains <tt>trust_anchors</tt>.</t>
        <t>Sending a fallback allows the subscriber to retain support for relying parties that do not implement any form of trust anchor negotiation. In this case, the subscriber must find a sufficiently ubiquitous trust anchor, if one exists. However, only those relying parties need to be considered in this ubiquity determination. Updated relying parties may continue to evolve without restricting fallback certificate selection.</t>
        <t>If the subscriber sends a certification path that matches the relying party’s<tt>trust_anchors</tt> extension, as described in <xref target="certificate-selection"/>, the subscriber MUST send an empty <tt>trust_anchors</tt> extension in the first CertificateEntry of the Certificate message. In this case, the <tt>certificate_list</tt> flexibility described in <xref section="4.4.2" sectionFormat="of" target="RFC8446"/> no longer applies. The <tt>certificate_list</tt> MUST contain a complete certification path, issued by the matching trust anchor, correctly ordered and with no extraneous certificates. That is, each certificate MUST certify the one immediately preceding it, and the trust anchor MUST certify the final certificate. The subscriber MUST NOT send the <tt>trust_anchors</tt> extension in the Certificate message in other situations.</t>
        <t>If a relying party receives this extension in the Certificate message, it MAY choose to disable path building <xref target="RFC4158"/> and validate the peer's certificate list as pre-built certification path. Doing so avoids the unpredictable behavior of path-building, and helps ensure CAs and subscribers do not inadvertently provision incorrect paths.</t>
      </section>
      <section anchor="retry-mechanism">
        <name>Retry Mechanism</name>
        <t>When the relying party is a client, it may choose not to send its full trust anchor identifier list due to fingerprinting risks (see <xref target="privacy-considerations"/>), or because the list is too large. The client MAY send a subset of supported trust anchors, or an empty list. This subset may be determined by, possibly outdated, prior knowledge about the server, such as <xref target="dns-service-parameter"/> or past connections.</t>
        <t>To accommodate this, when receiving a ClientHello with <tt>trust_anchors</tt>, the server collects all candidate certification paths which:</t>
        <ul spacing="normal">
          <li>
            <t>Have a trust anchor identifier, and</t>
          </li>
          <li>
            <t>Satisfy the conditions in <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>, with the exception of <tt>certification_authorities</tt>, and any future extensions that play a similar role</t>
          </li>
        </ul>
        <t>If this collection is non-empty, the server sends a <tt>trust_anchors</tt> extension in EncryptedExtensions, containing the corresponding trust anchor identifiers in preference order.</t>
        <t>When a client sends a subset or empty list in <tt>trust anchors</tt>, it SHOULD implement the following retry mechanism:</t>
        <t>If the client receives either a connection error or an untrusted certificate, the client looks in server’s EncryptedExtensions for a trust anchor identifier that it trusts. If there are multiple, it selects an option based on the server’s preference order and its local preferences. It then makes a new connection to the same endpoint, sending only the selected trust anchor identifier in the ClientHello <tt>trust_anchors</tt> extension. If the EncryptedExtensions had no <tt>trust_anchor</tt> extension, or no match was found, the client returns the error to the application.</t>
        <t>Clients SHOULD retry at most once per connection attempt.</t>
        <t>[[TODO: Retrying in a new connection is expensive and cannot be done from within the TLS stack in most implementations. Consider handshake modifications to instead retry within the same connection.]]</t>
        <t>This mechanism allows the connection to recover from a certificate selection failure, e.g. due to the client not revealing its full preference list, at additional latency cost. <xref target="dns-service-parameter"/> describes an optimization which can avoid this cost.</t>
        <t>This mechanism also allows servers to safely send fallback certificates that may not be as ubiquitously acceptable. Without some form of trust anchor negotiation, servers are limited to selecting certification paths that are ubiquitously trusted in all supported clients. This often means sending extra cross-certificates to target the lowest common denominator at a bandwidth cost. If the ClientHello contains <tt>trust_anchors</tt>, the server MAY opportunistically send a less ubiquitous, more bandwidth-efficient path based on local heuristics, with the expectation that the client will retry when the heuristics fail.</t>
      </section>
    </section>
    <section anchor="dns-service-parameter">
      <name>DNS Service Parameter</name>
      <t>This section defines the <tt>tls-trust-anchors</tt> SvcParamKey <xref target="RFC9460"/>. TLS servers can use this to advertise their available trust anchors in DNS, and aid the client in formulating its <tt>trust_anchors</tt> extension (see <xref target="retry-mechanism"/>). This allows TLS deployments to support clients with many trust anchors without incurring the overhead of a reconnect.</t>
      <section anchor="syntax">
        <name>Syntax</name>
        <t>The <tt>tls-trust-anchors</tt> parameter contains an ordered list of one or more trust anchor identifiers, in server preference order.</t>
        <t>The presentation <tt>value</tt> of the SvcParamValue is a non-empty comma-separated list (<xref section="A.1" sectionFormat="of" target="RFC9460"/>). Each element of the list is a trust anchor identifier in the text representation defined in <xref target="trust-anchor-ids"/>. Any other <tt>value</tt> is a syntax error. To enable simpler parsing, this SvcParam MUST NOT contain escape sequences.</t>
        <t>The wire format of the SvcParamValue is determined by prefixing each trust anchor identifier with its length as a single octet, then concatenating each of these length-value pairs to form the SvcParamValue. These pairs MUST exactly fill the SvcParamValue; otherwise, the SvcParamValue is malformed.</t>
        <t>For example, if a TLS server has three available certification paths issued by <tt>32473.1</tt>, <tt>32473.2.1</tt>, and <tt>32473.2.2</tt>, respectively, the DNS record in presentation syntax may be:</t>
        <sourcecode type="dns"><![CDATA[
example.net.  7200  IN SVCB 3 server.example.net. (
    tls-trust-anchors=32473.1,32473.2.1,32473.2.2 )
]]></sourcecode>
        <t>The wire format of the SvcParamValue would be the 17 octets below. In the example, the octets comprising each trust anchor identifier are placed on separate lines for clarity</t>
        <artwork><![CDATA[
0x04, 0x81, 0xfd, 0x59, 0x01,
0x05, 0x81, 0xfd, 0x59, 0x02, 0x01,
0x05, 0x81, 0xfd, 0x59, 0x02, 0x02,
]]></artwork>
        <t>## Configuring Services</t>
        <t>Services SHOULD include the trust anchor identifier for each of their available certification paths, in preference order, in the <tt>tls-trust-anchors</tt> of their HTTPS or SVCB endpoints. As TLS configuration is updated, services SHOULD update the DNS record to match. The mechanism for this is out of scope for this document, but services are RECOMMENDED to automate this process.</t>
        <t>Services MAY have certification paths without trust anchor identifiers, but those paths will not participate in this mechanism.</t>
      </section>
      <section anchor="client-behavior">
        <name>Client Behavior</name>
        <t>When connecting to a service endpoint whose HTTPS or SVCB record contains the <tt>tls-trust-anchors</tt> parameter, the client first computes the intersection between its configured trust anchors and the server’s provided list. If this intersection is non-empty, the client MAY use it to determine the <tt>trust_anchors</tt> extension in the ClientHello (see <xref target="retry-mechanism"/>).</t>
        <t>If doing so, the client MAY send a subset of this intersection to meet size constraints, but SHOULD offer multiple options. This reduces the chance of a reconnection if, for example, the first option in the intersection uses a signature algorithm that the client doesn’t support, or if the TLS server and DNS configuration are out of sync.</t>
        <t>Although this service parameter is intended to reduce trust anchor mismatches, mismatches may still occur in some scenarios. Clients and servers MUST continue to implement the provisions described in <xref target="tls-extension"/>, even when using this service parameter.</t>
      </section>
    </section>
    <section anchor="acme-extension">
      <name>ACME Extension</name>
      <t>We reuse the ACME extension defined in <xref section="7" sectionFormat="of" target="I-D.davidben-tls-trust-expr"/>, except that each CertificatePropertyList will contain a <tt>trust_anchor_identifier</tt> property.</t>
      <t>[[TODO: Move this over from the trust expressions draft, if this ends up being the canonical one.]]</t>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>See <xref section="9" sectionFormat="of" target="I-D.davidben-tls-trust-expr"/>.</t>
      <t>[[TODO: Move the text here if this document ends up being the canonical one.]]</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="relying-parties">
        <name>Relying Parties</name>
        <t>The negotiation mechanism described in this document is analogous to the <tt>certificate_authorities</tt> extension (<xref section="4.2.4" sectionFormat="of" target="RFC8446"/>), but more size-efficient. Like that extension, it presumes the requested trust anchor list is not sensitive.</t>
        <t>The privacy implications of this are determined by how a relying party uses this extension. Trust anchors supported by a relying party may be divided into three categories:</t>
        <ol spacing="normal" type="1"><li>
            <t>Trust anchors whose identifiers the relying party sends unconditionally, i.e. not in response to the server’s HTTPS/SVCB record, trust anchor list in EncryptedExtensions, etc.</t>
          </li>
          <li>
            <t>Trust anchors whose identifiers the relying party sends if the server offers them. For example, the relying party may indicate support for a trust anchor if its identifier is listed in the server’s HTTPS/SVCB record or trust anchor list in EncryptedExtensions.</t>
          </li>
          <li>
            <t>Trust anchors that the relying party accepts but will never send a corresponding trust anchor identifier  in <tt>trust_anchors</tt>. These are trust anchors which do not participate in this mechanism.</t>
          </li>
        </ol>
        <t>Each of these categories carries a different fingerprinting exposure:</t>
        <t>Trust anchor identifiers sent unconditionally can be observed passively. Thus, relying parties SHOULD NOT unconditionally advertise trust anchor lists which are unique to an individual user. Rather, such lists  SHOULD be either empty or computed only from the trust anchors common to the relying party's anonymity set (<xref section="3.3" sectionFormat="of" target="RFC6973"/>).</t>
        <t>Trust anchor identifiers sent in response to the subscriber can only be observed actively. That is, the subscriber could vary its list and observe how the client responds, in order to probe for the client’s trust anchor list.</t>
        <t>This is similar to the baseline exposure for trust anchors that do not participate in negotiation. A subscriber in possession of a certificate can send it and determine if the relying party accepts or rejects it. Unlike this baseline exposure, trust anchors that participate in this protocol can be probed by only knowing the trust anchor identifier.</t>
        <t>Relying parties SHOULD determine which trust anchors participate in this mechanism, and whether to advertise them unconditionally or conditionally, based on their privacy goals. PKIs that reliably use the DNS service parameter (<xref target="dns-service-parameter"/>) can rely on conditional advertisement for stronger privacy properties without a round-trip penalty.</t>
        <t>Additionally, a relying party that computes the <tt>trust_anchors</tt> extension based on prior state may allow observers to correlate across connections. Relying parties SHOULD NOT maintain such state across connections that are intended to be uncorrelated. As above, implementing the DNS service parameter can avoid a round-trip penalty without such state.</t>
      </section>
      <section anchor="subscribers">
        <name>Subscribers</name>
        <t>If the subscriber is a server, the mechanisms in <xref target="dns-service-parameter"/> and <xref target="retry-mechanism"/> enumerate the trust anchors for the server’s available certification paths. This mechanism assumes they are not sensitive. Servers SHOULD NOT use this mechanism to negotiate sensitive trust anchors.</t>
        <t>This does not apply if the subscriber is a client.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="relying-party-policies-and-agility">
        <name>Relying Party Policies and Agility</name>
        <t>The negotiation mechanism described in this document facilitates which certification path is served to relying parties, but has no impact on the relying party's trust preferences themselves.</t>
        <t>As a result, this enables a more flexible and agile PKI, which can better mitigate security risks to users. <xref target="use-cases"/> discusses some scenarios which benefit from the multi-certificate deployment this document enables. In general, robust trust anchor negotiation helps subscribers navigate differences in relying party requirements. This means security improvements for one set of relying parties can be deployed without needing to risk incompatibility or breakage for others.</t>
        <t>For example, agility reduces pressures on relying parties to sacrifice user security for compatibility. Suppose a subscriber currently uses some CA, but a relying party deems trusting that CA to pose an unacceptable security risk to its users. In a single-certificate deployment, those subscribers may be unwilling to adopt a CA trusted by the relying party, as switching CAs risks compatibility problems elsewhere. The relying party then faces compatibility pressure and adds this CA, sacrificing user security. However, in a multi-certificate deployment, the subscriber can use its existing CA <em>in addition to</em> another CA trusted by relying party B. This allows the ecosystem to improve interoperability, while still meeting relying party B's user-security goals.</t>
      </section>
      <section anchor="incorrect-selection-metadata">
        <name>Incorrect Selection Metadata</name>
        <t>If the subscriber has incorrect information about trust anchor identifiers, it may send an untrusted certification path. This will not result in that path being trusted, but does present the possibility of a degradation of service. However, this information is provisioned by the CA, which is already expected to provide accurate information.</t>
      </section>
      <section anchor="serving-multiple-certificates">
        <name>Serving Multiple Certificates</name>
        <t>In a multi-certificate deployment, subscribers have a collection of certificates available to satisfy relying parties with potentially different security policies. It is possible that some of these policies will only be satisfied by certificates from CAs that have been distrusted by other relying parties, such as if the relying party is out of date but still important for the subscriber to support. If a certificate asserts the correct information about the subscriber (TLS key, DNS names, etc.), the subscriber can safely present it, even if the CA is otherwise untrustworthy. In particular, doing so does not allow the CA to decrypt or intercept the connection.</t>
        <t>However, the subscriber presenting a certificate is not an endorsement of the CA. The subscriber's role is to present a certificate which will convince the relying party of the correct subscriber information. Subscribers do not vet CAs for trustworthiness, only the correctness of their specific, configured certificates and the CA's ability to meet the subscriber's requirements, such as availability, compatibility, and performance. It is the responsibility of the relying party, and its corresponding root program, to determine the set of trusted CAs. Trusting a CA means trusting <em>all</em> certificates issued by that CA, so it is not enough to observe subscribers serving correct certificates. An untrustworthy CA may sign one correct certificate, but also sign incorrect certificates, possibly in the future, that can attack the relying party. Root program management is a complex, security-critical process, the full considerations of which are outside the scope of this document.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="tls-extensiontype-updates">
        <name>TLS ExtensionType Updates</name>
        <t>IANA is requested to create the following entry in the TLS ExtensionType Values registry, defined by <xref target="RFC8446"/>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Extension Name</th>
              <th align="left">TLS 1.3</th>
              <th align="left">DTLS-Only</th>
              <th align="left">Recommended</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">trust_anchors</td>
              <td align="left">CH, EE, CR, CT</td>
              <td align="left">N</td>
              <td align="left">Y</td>
              <td align="left">[this-RFC]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="certificatepropertytype-registry">
        <name>CertificatePropertyType Registry</name>
        <t>[[TODO: Establish / add to the CertificatePropertyType registry]]</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="X680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9371">
          <front>
            <title>Registration Procedures for Private Enterprise Numbers (PENs)</title>
            <author fullname="A. Baber" initials="A." surname="Baber"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes how Private Enterprise Numbers (PENs) are registered by IANA. It shows how to request a new PEN and how to modify a current PEN. It also gives a brief overview of PEN uses.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9371"/>
          <seriesInfo name="DOI" value="10.17487/RFC9371"/>
        </reference>
        <reference anchor="I-D.davidben-tls-trust-expr">
          <front>
            <title>TLS Trust Expressions</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Devon O'Brien" initials="D." surname="O'Brien">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Bob Beck" initials="B." surname="Beck">
              <organization>Google LLC</organization>
            </author>
            <date day="24" month="May" year="2024"/>
            <abstract>
              <t>   This document defines TLS trust expressions, a mechanism for relying
   parties to succinctly convey trusted certification authorities to
   subscribers by referencing named and versioned trust stores.  It also
   defines supporting mechanisms for subscribers to evaluate these trust
   expressions, and select one of several available certification paths
   to present.  This enables a multi-certificate deployment model, for a
   more agile and flexible PKI that can better meet security
   requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-davidben-tls-trust-expr-03"/>
        </reference>
        <reference anchor="RFC4158">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Certification Path Building</title>
            <author fullname="M. Cooper" initials="M." surname="Cooper"/>
            <author fullname="Y. Dzambasow" initials="Y." surname="Dzambasow"/>
            <author fullname="P. Hesse" initials="P." surname="Hesse"/>
            <author fullname="S. Joseph" initials="S." surname="Joseph"/>
            <author fullname="R. Nicholas" initials="R." surname="Nicholas"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document provides guidance and recommendations to developers building X.509 public-key certification paths within their applications. By following the guidance and recommendations defined in this document, an application developer is more likely to develop a robust X.509 certificate-enabled application that can build valid certification paths across a wide range of PKI environments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4158"/>
          <seriesInfo name="DOI" value="10.17487/RFC4158"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MOZILLA-ROOTS" target="https://wiki.mozilla.org/CA/Included_Certificates">
          <front>
            <title>Mozilla Included CA Certificate List</title>
            <author>
              <organization>Mozilla</organization>
            </author>
            <date year="2023" month="August" day="30"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-wkech">
          <front>
            <title>A well-known URI for publishing ECHConfigList values.</title>
            <author fullname="Stephen Farrell" initials="S." surname="Farrell">
              <organization>Trinity College Dublin</organization>
            </author>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="22" month="October" year="2023"/>
            <abstract>
              <t>   We define a well-known URI at which an HTTP origin can inform an
   authoritative DNS server, or other interested parties, about this
   origin's Service Bindings, i.e. its "HTTPS" DNS records.  These
   instructions can include Encrypted ClientHello (ECH) configurations,
   allowing the origin, in collaboration with DNS infrastructure
   elements, to publish and rotate its own ECH keys.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-wkech-04"/>
        </reference>
      </references>
    </references>
    <?line 354?>

<section anchor="comparison-to-tls-trust-expressions">
      <name>Comparison to TLS Trust Expressions</name>
      <t><xref target="I-D.davidben-tls-trust-expr"/> describes Trust Expressions, another trust anchor negotiation mechanism that aims to solve similar problems. The mechanisms differ in the following ways:</t>
      <ul spacing="normal">
        <li>
          <t><tt>trust_anchors</tt> is usable by more kinds of PKIs. Trust Expressions express trust anchor lists relative to named “trust stores”, maintained by root programs. Arbitrary lists may not be easily expressible. <tt>trust_anchors</tt> does not have this restriction.</t>
        </li>
        <li>
          <t>When used with large trust stores, the retry mechanism in <tt>trust_anchors</tt> requires a new connection. In most applications, this must be implemented outside the TLS stack, so more components must be changed and redeployed. In deployments that are limited by client changes, this may be a more difficult transition. [[TODO: See <xref target="retry-mechanism"/> for an alternate retry scheme that avoids this.]]</t>
        </li>
        <li>
          <t>Trust Expressions works with static server configuration. An ideal <tt>trust_anchors</tt> deployment requires automation to synchronize a server’s DNS and TLS configuration. <xref target="I-D.ietf-tls-wkech"/> could be a starting point for this automation. In deployments that are limited by server changes, this may be a more difficult transition.</t>
        </li>
        <li>
          <t>Trust Expressions require that CAs continually fetch information from manifests that are published by root programs, while <tt>trust_anchors</tt> relies only on static pre-assigned trust anchor identifiers.</t>
        </li>
        <li>
          <t><tt>trust_anchors</tt>, when trust anchors are conditionally sent, has different fingerprinting properties. See <xref target="privacy-considerations"/>.</t>
        </li>
        <li>
          <t><tt>trust_anchors</tt> can only express large client trust stores (for server certificates), not large server trust stores. Large trust stores rely on the retry mechanism described in <xref target="retry-mechanism"/>, which is not available to client certificates.</t>
        </li>
      </ul>
      <t>The two mechanisms can be deployed together. A subscriber can have metadata for both mechanisms available, and a relying party can advertise both.</t>
      <t>[[TODO: remove this or move to supporting documentation if this becomes the canonical thing]]</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors thank Nick Harper, and Emily Stark for many valuable discussions and insights which led to this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
