<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-egorbaty-httpbis-secondary-server-certs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="HTTP Server Secondary Cert Auth">Secondary Certificate Authentication of HTTP Servers</title>
    <seriesInfo name="Internet-Draft" value="draft-egorbaty-httpbis-secondary-server-certs-00"/>
    <author initials="E." surname="Gorbaty" fullname="Eric Gorbaty">
      <organization>Apple</organization>
      <address>
        <email>e_gorbaty@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Bishop" fullname="Mike Bishop">
      <organization>Akamai</organization>
      <address>
        <email>mbishop@evequefou.be</email>
      </address>
    </author>
    <date year="2023" month="June" day="30"/>
    <area>Applications and Real-Time</area>
    <workgroup>HTTP</workgroup>
    <abstract>
      <?line 34?>

<t>This document defines a way for HTTP/2 and HTTP/3 servers to send additional
certificate-based credentials after a TLS connection is established, based
on TLS Exported Authenticators.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://egorbaty.github.io/draft-httpbis-http3-secondary-certs/draft-egorbaty-httpbis-http3-secondary-certs.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-egorbaty-httpbis-secondary-server-certs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/egorbaty/draft-httpbis-http3-secondary-certs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP <xref target="HTTP"/> clients need to know that the content they receive on a
connection comes from the origin from which they intended to retrieve it. The
traditional form of server authentication in HTTP has been in the form of a
single X.509 certificate provided during the TLS <xref target="TLS13"/> handshake.</t>
      <t>TLS supports one server and one client certificate on a connection. These
certificates may contain multiple identities, but only one certificate may be
provided.</t>
      <t>Many HTTP servers host content from several origins. HTTP/2 <xref target="H2"/> and
HTTP/3 <xref target="H3"/> permit clients to reuse an existing HTTP connection to a
server provided that the secondary origin is also in the certificate provided
during the TLS handshake. In many cases, servers choose to maintain separate
certificates for different origins but still desire the benefits of a shared
HTTP connection. This document defines a capability for servers to use and
to authenticate with those seperate certificates over a shared connection.</t>
      <t>The ability to maintain seperate certificates for different origins can also
allow proxies that cache content from secondary origins to communicate to
clients that they can service some of those origins directly, allowing the
proxy to behave as a TLS-terminating reverse proxy for those origins instead of
establishing a TLS encrypted tunnel through the proxy.</t>
      <section anchor="server-certificate-authentication">
        <name>Server Certificate Authentication</name>
        <t><xref section="9.1.1" sectionFormat="of" target="H2"/> and <xref section="3.3" sectionFormat="of" target="H3"/> describe how connections may
be used to make requests from multiple origins as long as the server is
authoritative for both. A server is considered authoritative for an origin if
DNS resolves the origin to the IP address of the server and (for TLS) if the
certificate presented by the server contains the origin in the Subject
Alternative Names field.</t>
        <t><xref target="ALTSVC"/> enables a step of abstraction from the DNS resolution. If
both hosts have provided an Alternative Service at hostnames which resolve to
the IP address of the server, they are considered authoritative just as if DNS
resolved the origin itself to that address. However, the server's one TLS
certificate is still required to contain the name of each origin in question.</t>
        <t><xref target="ORIGIN"/> relaxes the requirement to perform the DNS lookup if already
connected to a server with an appropriate certificate which claims support for
a particular origin.</t>
        <t>Servers which host many origins often would prefer to have separate certificates
for some sets of origins. This may be for ease of certificate management
(the ability to separately revoke or renew them), due to different sources of
certificates (a CDN acting on behalf of multiple origins), or other factors
which might drive this administrative decision. Clients connecting to such
origins cannot currently reuse connections, even if both client and server
would prefer to do so.</t>
        <t>Because the TLS SNI extension is exchanged in the clear, clients might also
prefer to retrieve certificates inside the encrypted context. When this
information is sensitive, it might be advantageous to request a general-purpose
certificate or anonymous ciphersuite at the TLS layer, while acquiring the
"real" certificate in HTTP after the connection is established.</t>
      </section>
      <section anchor="tls-exported-authenticators">
        <name>TLS Exported Authenticators</name>
        <t>TLS Exported Authenticators <xref target="EXPORTED-AUTH"/> are structured messages
that can be exported by either party of a TLS connection and validated by the
other party. Given an established TLS connection, an authenticator message can
be constructed proving possession of a certificate and a corresponding private
key. The mechanisms that this draft defines are primarily focused on the
server's ability to generate TLS Exported Authenticators.</t>
        <t>Each Authenticator is computed using a Handshake Context and Finished MAC Key
derived from the TLS session. The Handshake Context is identical for both
parties of the TLS connection, while the Finished MAC Key is dependent on
whether the Authenticator is created by the client or the server.</t>
        <t>Successfully verified Authenticators result in certificate chains, with verified
possession of the corresponding private key, which can be supplied into a
collection of available certificates. Likewise, descriptions of desired
certificates can also be supplied into these collections.</t>
      </section>
      <section anchor="http-layer-certificate-authentication">
        <name>HTTP-Layer Certificate Authentication</name>
        <t>This draft defines HTTP/2 and HTTP/3 <tt>CERTIFICATE</tt> frames (<xref target="certs-http"/>) to
carry the relevant certificate messages, enabling certificate-based
authentication of servers independent of TLS version. This mechanism can be
implemented at the HTTP layer without breaking the existing interface between
HTTP and applications above it.</t>
        <t>TLS Exported Authenticators <xref target="EXPORTED-AUTH"/> allow the opportunity for an
HTTP/2 and HTTP/3 servers to send certificate frames which can be used to prove
the servers authenticity for multiple origins.</t>
        <t>This draft additionally defines SETTINGS parameters for HTTP/2 and HTTP/3
(<xref target="settings"/>) that allow the client and server to indicate support for
HTTP-Layer certificate authentication.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="discovery">
      <name>Discovering Additional Certificates at the HTTP Layer</name>
      <t>A certificate chain with proof of possession of the private key corresponding to
the end-entity certificate is sent as a sequence of <tt>CERTIFICATE</tt> frames (see
<xref target="http2-cert"/>, <xref target="http3-cert"/>) to the client. Once the holder of a certificate
has sent the chain and proof, this certificate chain is cached by the recipient
and available for future use.</t>
      <section anchor="settings-usage">
        <name>Indicating Support for HTTP-Layer Certificate Authentication</name>
        <t>The <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> parameters for HTTP/2 and HTTP/3 are
defined in <xref target="settings"/> so that clients and servers can indicate support for
secondary certificate authentication of servers.</t>
        <t>HTTP/2 and HTTP/3 endpoints who wish to indicate support for HTTP-Layer
certificate authentication <bcp14>MUST</bcp14> send a <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>
parameter set to "1" in their SETTINGS frame. Endpoints <bcp14>MUST NOT</bcp14> use any of the
authentication functionality described in this draft unless the parameter has
been negotiated by both sides.</t>
        <t>Endpoints <bcp14>MUST NOT</bcp14> send a <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> parameter with a
value of 0 after previously sending a value of 1.</t>
        <t><tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> indicates that servers are able to offer
additional certificates to demonstrate control over other origin hostnames, and
that clients are able to make requests for hostnames received in a TLS Exported
Authenticator that the server sends.</t>
      </section>
      <section anchor="cert-available">
        <name>Making Certificates or Requests Available</name>
        <t>When both peers have advertised support for HTTP-layer certificates in a given
direction as in <xref target="settings-usage"/>, the indicated endpoint can supply
additional certificates into the connection at any time. That is, if both
endpoints have sent <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> and validated the value
received from the peer, the server may send certificates unprompted, at any
time.</t>
        <t>This does mean that if a server knows it supports secondary certificate
authentication, and it receives <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> from the
client, that it can enqueue certificates immediately following the received
SETTINGS frame.</t>
        <t>Certificates supplied by servers can be considered by clients without further
action by the server. A server <bcp14>SHOULD NOT</bcp14> send certificates which do not cover
origins which it is prepared to service on the current connection, and should
NOT send them if the client has not indicated support with
<tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>.</t>
        <t>A client <bcp14>MUST NOT</bcp14> send certificates to the server. The server <bcp14>SHOULD</bcp14> close the
connection upon receipt of a CERTIFICATE frame from a client.</t>
        <figure anchor="ex-http-server-unprompted-basic">
          <name>Simple unprompted server authentication</name>
          <sourcecode type="drawing"><![CDATA[
Client                                        Server
   <-- (stream 0 / control stream) CERTIFICATE --
   ...
   -- (stream N) GET /from-new-origin ---------->
   <----------------------- (stream N) 200 OK ---
]]></sourcecode>
        </figure>
        <t>A server <bcp14>MAY</bcp14> send a <tt>CERTIFICATE</tt> immediately after sending its <tt>SETTINGS</tt>.
However, it <bcp14>MAY</bcp14> also send certificates at any time later. For example, a proxy
might discover that a client is interested in an origin that it can reverse
proxy at the time that a client sends a <tt>CONNECT</tt> request. It can then send
certificates for those origins to allow for TLS-terminated reverse proxying to
those origins for the remainder of the connection lifetime.
<xref target="ex-http-server-unprompted-reverse"/> illustrates this behavior.</t>
        <figure anchor="ex-http-server-unprompted-reverse">
          <name>Reverse proxy server authentication</name>
          <sourcecode type="drawing"><![CDATA[
Client                                        Server
   -- (stream N) CONNECT /to-new-origin -------->
   <-- (stream 0 / control stream) CERTIFICATE --
   ...
   -- (stream M) GET /to-new-origin ------------>
   <--- (stream M, direct from server) 200 OK ---
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="settings">
      <name>SETTINGS_HTTP_SERVER_CERT_AUTH</name>
      <t>SETTINGS parameters for HTTP/2 and HTTP/3 seperately are defined below.</t>
      <section anchor="the-settingshttpservercertauth-http2-settings-parameterhttp2-setting">
        <name>The SETTINGS_HTTP_SERVER_CERT_AUTH HTTP/2 SETTINGS Parameter{#http2-setting}</name>
        <t>This document adds a new HTTP/2 SETTINGS(0xTBD) parameter to those defined by
<xref section="6.5.2" sectionFormat="of" target="H2"/>.</t>
        <t>The new parameter name is <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>. The value of the
parameter <bcp14>MUST</bcp14> be 0 or 1.</t>
        <t>The usage of this parameter is described in <xref target="settings-usage"/>.</t>
      </section>
      <section anchor="the-settingshttpservercertauth-http3-settings-parameterhttp3-setting">
        <name>The SETTINGS_HTTP_SERVER_CERT_AUTH HTTP/3 SETTINGS Parameter{#http3-setting}</name>
        <t>This document adds a new HTTP/3 SETTINGS(0xTBD) parameter to those defined by
<xref section="7.2.4.1" sectionFormat="of" target="H3"/>.</t>
        <t>The new parameter name is <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>. The value of the
parameter <bcp14>MUST</bcp14> be 0 or 1.</t>
        <t>The usage of this parameter is described in <xref target="settings-usage"/>.</t>
      </section>
    </section>
    <section anchor="certs-http">
      <name>CERTIFICATE frame</name>
      <t>The CERTIFICATE frame contains an exported authenticator message from the TLS
layer that provides a chain of certificates and associated extensions, proving
possession of the private key corresponding to the end-entity certificate.</t>
      <t>A server sends a CERTIFICATE frame on stream 0 for HTTP/2 and on the control
stream for HTTP/3. The client is permitted to make subsequent requests for
resources upon receipt of a CERTIFICATE frame without further action from the
server.</t>
      <t>Upon receiving a complete series of CERTIFICATE frames, the receiver may
validate the Exported Authenticator value by using the exported authenticator
API. This returns either an error indicating that the message was invalid or
the certificate chain and extensions used to create the message.</t>
      <section anchor="http2-cert">
        <name>HTTP/2 CERTIFICATE frame</name>
        <t>A CERTIFICATE frame in HTTP/2 (type=0xTBD) carrries a TLS Exported authenticator
that clients can use to authenticate secondary origins from a sending server.</t>
        <t>The CERTIFICATE frame <bcp14>MUST</bcp14> be sent on stream 0. A CERTIFICATE frame received on
any other stream <bcp14>MUST</bcp14> not be used for server authentication.</t>
        <figure>
          <name>HTTP/2 CERTIFICATE Frame</name>
          <artwork type="ascii-art"><![CDATA[
CERTIFICATE Frame {
  Length (24),
  Type (8) = 0xTBD,

  Unused Flags (8),

  Reserved (1),
  Stream Identifier (31) = 0,

  Authenticator (..),
}
]]></artwork>
        </figure>
        <t>The Length, Type, Unused Flag(s), Reserved, and Stream Identifier fields are
described in <xref section="4" sectionFormat="of" target="H2"/>.</t>
        <t>The CERTIFICATE frame does not define any flags.</t>
        <t>The authenticator field is a portion of the opaque data returned from the TLS
connection exported authenticator authenticate API. See <xref target="exp-auth"/> for more
details on the input to this API.</t>
        <t>The CERTIFICATE frame applies to the connection, not a specific stream. An
endpoint <bcp14>MUST</bcp14> treat a CERTIFICATE frame with a stream identifier other than
0x00 as a connection error.</t>
      </section>
      <section anchor="http3-cert">
        <name>HTTP/3 CERTIFICATE frame</name>
        <t>A CERTIFICATE frame in HTTP/3 (type=0xTBD) carrries a TLS Exported authenticator
that clients can use to authenticate secondary origins from a sending server.</t>
        <t>The CERTIFICATE frame <bcp14>MUST</bcp14> be sent on the control stream. A CERTIFICATE frame
received on any other stream <bcp14>MUST</bcp14> not be used for server authentication.</t>
        <figure>
          <name>HTTP/3 CERTIFICATE Frame</name>
          <artwork type="ascii-art"><![CDATA[
CERTIFICATE Frame {
  Type (i) = 0xTBD,
  Length (i),
  Authenticator (...),
}
]]></artwork>
        </figure>
        <t>The Type and Length fields are described in <xref section="7.1" sectionFormat="of" target="H3"/>.</t>
        <t>The authenticator field is a portion of the opaque data returned from the TLS
connection exported authenticator authenticate API. See <xref target="exp-auth"/> for more
details on the input to this API.</t>
        <t>The CERTIFICATE frame applies to the connection, not a specific stream. An
endpoint <bcp14>MUST</bcp14> treat a CERTIFICATE frame received on any stream other than the
control stream as a connection error.</t>
      </section>
      <section anchor="exp-auth">
        <name>Exported Authenticator Characteristics</name>
        <t>The Exported Authenticator API defined in <xref target="EXPORTED-AUTH"/> takes as input a
request, a set of certificates, and supporting information about the
certificate (OCSP, SCT, etc.). The result is an opaque token which is used
when generating the <tt>CERTIFICATE</tt> frame.</t>
        <t>Upon receipt of a <tt>CERTIFICATE</tt> frame, an endpoint which has negotiated support
for secondary certfiicates <bcp14>MUST</bcp14> perform the following steps to validate the
token it contains:</t>
        <ul spacing="normal">
          <li>Using the <tt>get context</tt> API, retrieve the <tt>certificate_request_context</tt> used
to generate the authenticator, if any.</li>
          <li>Use the <tt>validate</tt> API to confirm the validity of the authenticator with
regard to the generated request, if any.</li>
        </ul>
        <t>If the authenticator cannot be validated, this <bcp14>SHOULD</bcp14> be treated as a connection
error.</t>
        <t>Once the authenticator is accepted, the endpoint can perform any other checks
for the acceptability of the certificate itself.</t>
      </section>
    </section>
    <section anchor="errors">
      <name>Indicating Failures During HTTP-Layer Certificate Authentication</name>
      <t>Because this draft permits certificates to be exchanged at the HTTP framing
layer instead of the TLS layer, several certificate-related errors which are
defined at the TLS layer might now occur at the HTTP framing layer.</t>
      <t>There are two classes of errors which might be encountered, and they are handled
differently.</t>
      <section anchor="misbehavior">
        <name>Misbehavior</name>
        <t>This category of errors could indicate a peer failing to follow requirements in
this document or might indicate that the connection is not fully secure. These
errors are fatal to stream or connection, as appropriate.</t>
        <dl>
          <dt>CERTIFICATE_UNREADABLE (0xERROR-TBD):</dt>
          <dd>
            <t>An exported authenticator could not be validated.</t>
          </dd>
        </dl>
      </section>
      <section anchor="invalid-certificates">
        <name>Invalid Certificates</name>
        <t>Unacceptable certificates (expired, revoked, or insufficient to satisfy the
request) are not treated as stream or connection errors. This is typically not
an indication of a protocol failure. Servers <bcp14>SHOULD</bcp14> process requests with the
indicated certificate, likely resulting in a "4XX"-series status code in the
response. Clients <bcp14>SHOULD</bcp14> establish a new connection in an attempt to reach an
authoritative server.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This mechanism defines an alternate way to obtain server and client certificates
other than in the initial TLS handshake. While the signature of exported
authenticator values is expected to be equally secure, it is important to
recognize that a vulnerability in this code path is at least equal to a
vulnerability in the TLS handshake.</t>
      <section anchor="impersonation">
        <name>Impersonation</name>
        <t>This mechanism could increase the impact of a key compromise. Rather than
needing to subvert DNS or IP routing in order to use a compromised certificate,
a malicious server now only needs a client to connect to <em>some</em> HTTPS site
under its control in order to present the compromised certificate. Clients
<bcp14>SHOULD</bcp14> consult DNS for hostnames presented in secondary certificates if they
would have done so for the same hostname if it were present in the primary
certificate.</t>
        <t>As recommended in <xref target="ORIGIN"/>, clients opting not to consult DNS ought to employ
some alternative means to increase confidence that the certificate is
legitimate.</t>
        <t>As noted in the Security Considerations of <xref target="EXPORTED-AUTH"/>, it is difficult to
formally prove that an endpoint is jointly authoritative over multiple
certificates, rather than individually authoritative on each certificate. As a
result, clients <bcp14>MUST NOT</bcp14> assume that because one origin was previously
colocated with another, those origins will be reachable via the same endpoints
in the future. Clients <bcp14>MUST NOT</bcp14> consider previous secondary certificates to be
validated after TLS session resumption. However, clients <bcp14>MAY</bcp14> proactively query
for previously-presented secondary certificates.</t>
      </section>
      <section anchor="fingerprinting">
        <name>Fingerprinting</name>
        <t>This draft defines a mechanism which could be used to probe servers for origins
they support, but it opens no new attack that was not already possible by
making repeat TLS connections with different SNI values.</t>
        <t>Servers can also learn information about clients using this mechanism. The
hostnames a user agent finds interesting and retrieves certificates for might
indicate origins the user has previously accessed.</t>
      </section>
      <section anchor="persistence-of-service">
        <name>Persistence of Service</name>
        <t>CNAME records in the DNS are frequently used to delegate authority for an origin
to a third-party provider. This delegation can be changed without notice, even
to the third-party provider, simply by modifying the CNAME record in question.</t>
        <t>After the owner of the domain has redirected traffic elsewhere by changing the
CNAME, new connections will not arrive for that origin, but connections which
are properly directed to this provider for other origins would continue to
claim control of this origin (via Secondary Certificates). This is proper
behavior based on the third-party provider's configuration, but would likely
not be what is intended by the owner of the origin.</t>
        <t>This is not an issue which can be mitigated by the protocol, but something about
which third-party providers <bcp14>SHOULD</bcp14> educate their customers before using the
features described in this document.</t>
      </section>
      <section anchor="confusion-about-state">
        <name>Confusion About State</name>
        <t>Implementations need to be aware of the potential for confusion about the state
of a connection. The presence or absence of a validated certificate can change
during the processing of a request, potentially multiple times, as
<tt>CERTIFICATE</tt> frames are received. A client that uses certificate
authentication needs to be prepared to reevaluate the authorization state of a
request as the set of certificates changes.</t>
        <t>Behavior for TLS-Terminated reverse proxies is also worth considering. If a
server which situationally reverse-proxies wishes for the client to view a
request made prior to receipt of certificates as TLS-Terminated, or wishes for
the client to start a new tunnel alternatively, this draft does not currently
define formal mechanisms to facilitate that intention.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the <tt>CERTIFICATE</tt> frame type and
<tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> setting for both <xref target="H2"/> and <xref target="H3"/>.</t>
      <section anchor="frame-types">
        <name>Frame Types</name>
        <t>This specification registers the following entry in the "HTTP/2 Frame Type"
registry defined in <xref target="H2"/>:</t>
        <t>Code: : TBD</t>
        <t>Frame Type: : CERTIFICATE</t>
        <t>Reference: : This document</t>
        <t>This specification registers the following entry in the "HTTP/3 Frame Types"
registry established by <xref target="H3"/>:</t>
        <t>Value: : TBD</t>
        <t>Frame Type: : CERTIFICATE</t>
        <t>Status: : permanent</t>
        <t>Reference: : This document</t>
        <t>Change Controller: : IETF</t>
        <t>Contact: : ietf-http-wg@w3.org</t>
      </section>
      <section anchor="settings-parameters">
        <name>Settings Parameters</name>
        <t>This specification registers the following entry in the "HTTP/2 Settings"
registry defined in <xref target="H2"/>:</t>
        <t>Code: : TBD</t>
        <t>Name: : SETTINGS_HTTP_SERVER_CERT_AUTH</t>
        <t>Initial Value: : 0</t>
        <t>Reference: : This document</t>
        <t>This specification registers the following entry in the "HTTP/3 Settings"
registry defined in <xref target="H3"/>:</t>
        <t>Code: : TBD</t>
        <t>Name: : SETTINGS_HTTP_SERVER_CERT_AUTH</t>
        <t>Default: : 0</t>
        <t>Reference: : This document</t>
        <t>Change Controller: : IETF</t>
        <t>Contact: : ietf-http-wg@w3.org</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="H2">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="H3">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment.  This document describes a mapping of HTTP semantics over QUIC.  This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="EXPORTED-AUTH">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate.  This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="ALTSVC">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="ORIGIN">
          <front>
            <title>The ORIGIN HTTP/2 Frame</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies the ORIGIN frame for HTTP/2, to indicate what origins are available on a given connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8336"/>
          <seriesInfo name="DOI" value="10.17487/RFC8336"/>
        </reference>
      </references>
    </references>
    <?line 514?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Mike Bishop, Nick Sullivan, Martin Thomson and other
contributors for their work on the draft that this is based on.</t>
      <t>And thanks to Eric Kinnear and Tommy Pauly for their guidance and
editorial contributions to this draft.</t>
      <t>TODO: Other acknowledgements</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
