<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-httpbis-unprompted-auth-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title>HTTP Unprompted Authentication</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-unprompted-auth-00"/>
    <author initials="D." surname="Schinazi" fullname="David Schinazi">
      <organization>Google LLC</organization>
      <address>
        <postal>
          <street>1600 Amphitheatre Parkway</street>
          <city>Mountain View</city>
          <region>CA</region>
          <code>94043</code>
          <country>United States of America</country>
        </postal>
        <email>dschinazi.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Oliver" fullname="David M. Oliver">
      <organization>Guardian Project</organization>
      <address>
        <email>david@guardianproject.info</email>
        <uri>https://guardianproject.info</uri>
      </address>
    </author>
    <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
      <organization>Cloudflare Inc.</organization>
      <address>
        <email>jonathan.hoyland@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="24"/>
    <area>Applications and Real-Time</area>
    <workgroup>HTTPBIS</workgroup>
    <keyword>secure</keyword>
    <keyword>tunnels</keyword>
    <keyword>masque</keyword>
    <keyword>http-ng</keyword>
    <abstract>
      <t>Existing HTTP authentication mechanisms are probeable in the sense that it is
possible for an unauthenticated client to probe whether an origin serves
resources that require authentication. It is possible for an origin to hide the
fact that it requires authentication by not generating Unauthorized status
codes, however that only works with non-cryptographic authentication schemes:
cryptographic schemes (such as signatures or message authentication codes)
require a fresh nonce to be signed, and there is no existing way for the origin
to share such a nonce without exposing the fact that it serves resources that
require authentication. This document proposes a new non-probeable cryptographic
authentication scheme.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-httpbis-unprompted-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
        Working Group information can be found at <eref target="https://httpwg.org/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/httpwg/http-extensions/labels/unprompted-auth"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Existing HTTP authentication mechanisms (see <xref section="11" sectionFormat="of" target="HTTP"/>)
are probeable in the sense that it is possible for an unauthenticated client to
probe whether an origin serves resources that require authentication. It is
possible for an origin to hide the fact that it requires authentication by not
generating Unauthorized status codes, however that only works with
non-cryptographic authentication schemes: cryptographic schemes (such as
signatures or message authentication codes) require a fresh nonce to be signed,
and there is no existing way for the origin to share such a nonce without
exposing the fact that it serves resources that require authentication. This
document proposes a new non-probeable cryptographic authentication scheme.</t>
      <t>There are scenarios where servers may want to expose the fact that
authentication is required for access to specific resources. This is left for
future work.</t>
      <section anchor="conventions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>This document uses the following terminology from <xref section="3" sectionFormat="of" target="STRUCTURED-FIELDS"/> to specify syntax and parsing: Integer and Byte
Sequence.</t>
      </section>
    </section>
    <section anchor="compute-proof">
      <name>Computing the Authentication Proof</name>
      <t>This document only defines the Signature and HMAC authentication schemes for
uses of HTTP with TLS <xref target="TLS"/>. This includes any use of HTTP over TLS
as typically used for HTTP/2 <xref target="H2"/>, or HTTP/3 <xref target="H3"/> where the transport
protocol uses TLS as its authentication and key exchange mechanism
<xref target="QUIC-TLS"/>.</t>
      <t>The user agent leverages a TLS keying material exporter <xref target="KEY-EXPORT"/>
to generate a nonce which can be signed using the user's key. The keying
material exporter uses a label that starts with the characters
"EXPORTER-HTTP-Unprompted-Authentication-" (see <xref target="schemes"/> for the labels and
contexts used by each scheme). The TLS keying material exporter is used to
generate a 32-byte key which is then used as a nonce.</t>
    </section>
    <section anchor="header-definition">
      <name>Header Field Definition</name>
      <t>The "Unprompted-Authentication" header field allows a user agent to authenticate
with an origin server. The authentication is scoped to the HTTP request
associated with this header field. The value of the Unprompted-Authentication
header field is a credentials object, as defined in <xref section="11.4" sectionFormat="of" target="HTTP"/>.
Credentials contain an authentication scheme followed by optional authentication
parameters.</t>
    </section>
    <section anchor="authentication-parameters">
      <name>Authentication Parameters</name>
      <t>This specification defines the following authentication parameters, they can be
used by the authentication schemes defined in <xref target="schemes"/>.</t>
      <section anchor="parameter-u">
        <name>The u Parameter</name>
        <t>The <bcp14>OPTIONAL</bcp14> "u" (user ID) parameter is a byte sequence that specifies the user
ID that the user agent wishes to authenticate.</t>
      </section>
      <section anchor="parameter-p">
        <name>The p Parameter</name>
        <t>The <bcp14>OPTIONAL</bcp14> "p" (proof) parameter is a byte sequence that specifies the proof
that the user agent provides to attest to possessing the credential that matches
its user ID.</t>
      </section>
      <section anchor="parameter-s">
        <name>The s Parameter</name>
        <t>The <bcp14>OPTIONAL</bcp14> "s" (signature) parameter is an integer that specifies the
signature algorithm used to compute the proof transmitted in the "p" directive.
Its value is an integer between 0 and 255 inclusive from the IANA "TLS
SignatureAlgorithm" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/tls-parameters#tls-parameters-16"/>&gt;.</t>
      </section>
      <section anchor="parameter-h">
        <name>The h Parameter</name>
        <t>The <bcp14>OPTIONAL</bcp14> "h" (hash) parameter is an integer that specifies the hash
algorithm used to compute the proof transmitted in the "p" directive. Its value
is an integer between 0 and 255 inclusive from the IANA "TLS HashAlgorithm"
registry maintained at
&lt;<eref target="https://www.iana.org/assignments/tls-parameters#tls-parameters-18"/>&gt;.</t>
      </section>
    </section>
    <section anchor="schemes">
      <name>Authentication Schemes</name>
      <t>This document defines the "Signature" and "HMAC" HTTP authentication schemes.</t>
      <section anchor="signature">
        <name>Signature</name>
        <t>The "Signature" HTTP Authentication Scheme uses asymmetric cyptography.
User agents possess a user ID and a public/private key pair, and origin servers
maintain a mapping of authorized user IDs to their associated public keys. When
using this scheme, the "u", "p", and "s" parameters are <bcp14>REQUIRED</bcp14>. The TLS keying
material export label for this scheme is
"EXPORTER-HTTP-Unprompted-Authentication-Signature" and the associated context
is empty. The nonce is then signed using the selected asymmetric signature
algorithm and transmitted as the proof directive.</t>
        <t>For example, the user ID "john.doe" authenticating using Ed25519
<xref target="ED25519"/> could produce the following header field (lines are folded
to fit):</t>
        <artwork><![CDATA[
Unprompted-Authentication: Signature u=:am9obi5kb2U=:;s=7;
p=:SW5zZXJ0IHNpZ25hdHVyZSBvZiBub25jZSBoZXJlIHdo
aWNoIHRha2VzIDUxMiBiaXRzIGZvciBFZDI1NTE5IQ==:
]]></artwork>
      </section>
      <section anchor="hmac">
        <name>HMAC</name>
        <t>The "HMAC" HTTP Authentication Scheme uses symmetric cyptography. User
agents possess a user ID and a secret key, and origin servers maintain a mapping
of authorized user IDs to their associated secret key. When using this scheme,
the "u", "p", and "h" parameters are <bcp14>REQUIRED</bcp14>. The TLS keying material export
label for this scheme is "EXPORTER-HTTP-Unprompted-Authentication-HMAC" and the
associated context is empty. The nonce is then HMACed using the selected HMAC
algorithm and transmitted as the proof directive.</t>
        <t>For example, the user ID "john.doe" authenticating using HMAC-SHA-512
<xref target="SHA"/> could produce the following header field (lines are folded to
fit):</t>
        <artwork><![CDATA[
Unprompted-Authentication: HMAC u="am9obi5kb2U=";h=6;
p="SW5zZXJ0IEhNQUMgb2Ygbm9uY2UgaGVyZSB3aGljaCB0YWtl
cyA1MTIgYml0cyBmb3IgU0hBLTUxMiEhISEhIQ=="
]]></artwork>
      </section>
      <section anchor="other-http-authentication-schemes">
        <name>Other HTTP Authentication Schemes</name>
        <t>The HTTP Authentication Scheme registry maintained by IANA at
&lt;<eref target="https://www.iana.org/assignments/http-authschemes/http-authschemes.xhtml"/>&gt;
contains entries not defined in this document. Those entries <bcp14>MAY</bcp14> be used with
Unprompted Authentication.</t>
      </section>
    </section>
    <section anchor="intermediary">
      <name>Intermediary Considerations</name>
      <t>Since the Signature and HMAC HTTP Authentication Schemes leverage TLS keying
material exporters, their output
cannot be transparently forwarded by HTTP intermediaries. HTTP intermediaries
that support this specification will validate the authentication received from
the client themselves, then inform the upstream HTTP server of the presence of
valid authentication using some other mechanism.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>Unprompted Authentication allows a user-agent to authenticate to an origin
server while guaranteeing freshness and without the need for the server
to transmit a nonce to the user agent. This allows the server to accept
authenticated clients without revealing that it supports or expects
authentication for some resources. It also allows authentication without
the user agent leaking the presence of authentication to observers due to
clear-text TLS Client Hello extensions.</t>
      <t>The authentication proofs described in this document are not bound to individual
HTTP requests; if the same user sends an authentication proof on multiple
requests they will all be identical. This allows for better compression when
sending over the wire, but implies that client implementations that multiplex
different security contexts over a single HTTP connection need to ensure that
those contexts cannot read each other's header fields. Otherwise, one context
would be able to replay the unprompted authentication header field of another.
This constraint is met by modern Web browsers. If an attacker were to compromise
the browser such that it could access another context's memory, the attacker
might also be able to access the corresponding key, so binding authentication to
requests would not provide much benefit in practice.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="iana-header">
        <name>Unprompted-Authentication Header Field</name>
        <t>This document will request IANA to register the following entry in the "HTTP
Field Name" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/http-fields"/>&gt;:</t>
        <dl spacing="compact">
          <dt>Field Name:</dt>
          <dd>
            <t>Unprompted-Authentication</t>
          </dd>
          <dt>Template:</dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>Status:</dt>
          <dd>
            <t>provisional (permanent if this document is approved)</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
          <dt>Comments:</dt>
          <dd>
            <t>None</t>
          </dd>
        </dl>
      </section>
      <section anchor="iana-schemes">
        <name>HTTP Authentication Schemes Registry</name>
        <t>This document, if approved, requests IANA to add two new entries to the
"HTTP Authentication Schemes" Registry maintained at
&lt;<eref target="https://www.iana.org/assignments/http-authschemes"/>&gt;.
Both entries have the Reference set to this document, and the Notes empty.
The Authentication Scheme Name of the entries are:</t>
        <ul spacing="normal">
          <li>Signature</li>
          <li>HMAC</li>
        </ul>
      </section>
      <section anchor="iana-exporter-label">
        <name>TLS Keying Material Exporter Labels</name>
        <t>This document, if approved, requests IANA to register the following entries in
the "TLS Exporter Labels" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/tls-parameters#exporter-labels"/>&gt;:</t>
        <ul spacing="normal">
          <li>EXPORTER-HTTP-Unprompted-Authentication-Signature</li>
          <li>EXPORTER-HTTP-Unprompted-Authentication-HMAC</li>
        </ul>
        <t>Both of these entries are listed with the following qualifiers:</t>
        <dl spacing="compact">
          <dt>DTLS-OK:</dt>
          <dd>
            <t>N</t>
          </dd>
          <dt>Recommended:</dt>
          <dd>
            <t>Y</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="H2" to="HTTP/2"/>
    <displayreference target="H3" to="HTTP/3"/>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="STRUCTURED-FIELDS">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P-H. Kamp" initials="P-H." surname="Kamp">
              <organization/>
            </author>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields that wish to use a common syntax that is more restrictive than traditional HTTP field values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8941"/>
          <seriesInfo name="DOI" value="10.17487/RFC8941"/>
        </reference>
        <reference anchor="TLS">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="KEY-EXPORT">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="H2">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="H3">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment.  This document describes a mapping of HTTP semantics over QUIC.  This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="QUIC-TLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="ED25519">
          <front>
            <title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves.  The signature algorithms covered are Ed25519 and Ed448.  The key agreement algorithms covered are X25519 and X448. The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8410"/>
          <seriesInfo name="DOI" value="10.17487/RFC8410"/>
        </reference>
        <reference anchor="SHA">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank many members of the IETF community, as this
document is the fruit of many hallway conversations. Ben Schwartz contributed
ideas to this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
