<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.16 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-homerouter-provisioning-02" category="bcp" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="homertr-provision">Provisioning Initial Device Identifiers into Home Routers</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-homerouter-provisioning-02"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2021" month="November" day="14"/>
    <area>Internet</area>
    <workgroup>IOTOPS? Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a method to provisioning an 802.1AR-style certificate into a router intended for use in the home.</t>
      <t>The proceedure results in a certificate which can be validated with a public trust anchor ("WebPKI"), using a name rather than an IP address.
This method is focused on home routers, but can in some cases be used by other classes of IoT devices.</t>
      <t>(RFCEDITOR please remove: this document can be found at https://github.com/mcr/homerouter-provisioning)</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The increasing push to move all web interactions to HTTPS is a good thing.
<xref target="RFC6797" format="default"/> section 2.3.1 explains some of the attacks that this defeats.</t>
      <t>Residential use devices, particularly home routers, have some very unfortunate challenges.
The router provides access control for the entire home network: controlling access to the router is critical.
Malware has been, so far, content to attack the outside of home routers, exploiting poor authorization controls, and the fact that so few devices have their password changed (see <xref target="sixtypercent" format="default"/>).</t>
      <t>Malware continues to arrive by email and by trojan download, and one must assume that at least some devices within the home may be infected.</t>
      <t>An obvious next step for malware is to attack home routers and IoT devices from within the home.
An unencrypted administrative interface to these devices presents two problems:</t>
      <ol spacing="normal" type="1"><li>for devices that continue to use passwords as authorization, the passwords can easily be seen by active eavesdropping of the network, including use of IP address spoofing attacks.
In residential configurations, the most common Layer Two (ethernet) wifi encryption does nothing to prevent address spoofing attacks at Layer Three (IP, ARP).</li>
        <li>the lack of a useable TLS/HTTPS mechanism makes it difficult to use any kind of other non-password authorization mechanisms, such TLS Client Certificates, or OAUTH2 (Bearer) Tokens.</li>
      </ol>
      <t>In addition to the above arguments relating to the control interface to these devices, there are some significant advantages in management if every device has a cryptographic identity.
They include: ability to do remote attestation, ease of use of "Enterprise" versions of WPA, such as EAP-TLS for WiFi connectivity, detection of counterfeit devices, and better security for interactions with a cloud.</t>
      <t><xref target="I-D.richardson-t2trg-idevid-considerations" format="default"/> describes a number of different scenarios and considersation for manufacturer installation of keying material into devices.
This document is much more specific, as it focuses on:</t>
      <ol spacing="normal" type="1"><li>primarily Home Routers (as described in <xref target="RFC7084" format="default"/>)</li>
        <li>provisioning of certificates with public trust anchors (those that follow <xref target="CABFORUM" format="default"/>)</li>
        <li>manufacturers or ISPs that provision many devices, and who can control the firmware</li>
        <li>users who use web browsers to do routine and management tasks</li>
      </ol>
      <t>The next four sections expand the explanation of the above applicability, explaining why the boundaries have been set up as such.</t>
      <section anchor="primarily-home-routers" numbered="true" toc="default">
        <name>Primarily Home Routers</name>
        <t>As will be explained below, in order for the user's browser to be directed to the right system by name, it is easiest if the DNS names can be mapped to local IP addresses correctly.
The Home Router is usually in a position to answer DNS queries from other devices in the home,
so it can easily map names that should lead to the home router, to one of the home router's IP addresses.</t>
        <t>As an extension to the mechanism described here, a new mechanism is described in <xref target="manyplex" format="default"/> that provides for compatible naming of devices when control over DNS queries is not possible.</t>
      </section>
      <section anchor="provisioning-of-certificates-with-public-trust-anchors" numbered="true" toc="default">
        <name>Provisioning of certificates with public trust anchors</name>
        <t>The <xref target="CABFORUM" format="default"/> provides a set of guidelines agreed to by Browser authors and Certification Authorities (CA).
A well funded CA that follows the guidelines is likely to be able to negotiate to have their trust anchor included by default into the trusted set distributed by browsers and operating systems.</t>
        <t>Few of the details of the guidelines concern this document: but the key point is that an  arbitrary manufacturer is unlikely to be able to negotiate directly, and will need to arrange to obtain certificates from one of the existing certification authorities, or it's suborbinate customers.</t>
        <t>There are two details that do matter:</t>
        <ol spacing="normal" type="1"><li>CAs will not sign private names or reserved IP addresses.  Names used must be public and listed in the https://publicsuffix.org/ list.</li>
          <li>CAs are not to create certificates longer than a CABForum defined limit, which is currently set to approximately 1 year (in debate from approximately 2 years).  However, some CAs, such as https://letsencrypt.org/, use a lifetime of 90 days, and many CAs are moving in this direction as well.</li>
        </ol>
      </section>
      <section anchor="manufacturers-or-isps-do-provisioning" numbered="true" toc="default">
        <name>Manufacturers or ISPs do provisioning</name>
        <t>The mechanism described in this document assumes that the entity doing the provisioning has control over the firmware.
This is most easy for an hardware manufacturer who is building the devices and who performs the provisioning step in the factory.
This provisioning step could also occur some time later in a Quality Assurance step where blank devices are first loaded with firmware.
This is common for OEMs that have outsourced the actual manufacturing elsewhere, but bring the various components together in another place.</t>
        <t>An ISP who purchased a large quanity of home routers, and then upgrades the firmware could also easily adapt this mechanism.
The upgraded devices are then put back into their boxes, and into a warehouse or logistics center before shipping them to customers.
It is not uncommon for ISPs, particularly those that use PPPoE, to need to provision a PPP username/login to be used for initial provisioning into every device.
Upon first being connected, the device uses this default username to login to the ISP (to some captive network), at which point customer-specific username and login are configured, often using TR-069.</t>
      </section>
      <section anchor="users-who-use-web-browsers" numbered="true" toc="default">
        <name>Users who use web browsers</name>
        <t>The process in this document benefits users with browsers (whether desktops or mobile browsers) who need to access a management interface of a home router or similiar device (such as a NAS or home automation system).</t>
        <t>Devices which are exclusively configured using smartphone apps, and which have no other interfaces will find some of the mechanism superfluous.
Smartphone apps can be provided with a private-CA trust anchor, and could easily be programmed to validate different parts of the certificate.</t>
        <t>The lifetime and DNS name issues are of significantly less of an issues as a result.</t>
        <t>However, the level of sophistication required to do the above coding is difficult to find in cross-platform mobile developers, and smartphone OS vendors are increasingly discouraging the use of private trust anchors.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="protocol-overview" numbered="true" toc="default">
      <name>Protocol Overview</name>
      <t>Upon booting the device checks to see if it has been provisioned with a certificate already.
(Note that an expired certificate is still considered to be been provisioned, see below)</t>
      <t>Assuming that it has not, then it generates private key if necessary.
Some classes of devices may have a private key provisioned by a firmware or physical TPM module during the manufacuring process.</t>
      <t>The home router generates a Unique Local IPv6 Address (ULA, see <xref target="RFC4193" format="default"/> and <xref target="RFC7084" format="default"/> section 4.3), if it hasn't generated one already.
It must store this generated prefix in the same place as the private key and certificate.
If any of the ULA, or private key changes, then the certificate will need to be changed as well.</t>
      <t>The home router uses all or a portion of the ULA to form a DNS name that is unique with the manufacturer's realm.
For instance, given the ULA fd96:8d23:4fea::/48, one could drop the initial 7 bits which are always the same, skip a bit, and truncate to 6 bytes, giving: 8d234f.
A name is formed, for instance: n8d234f.r.example.net.</t>
      <t>With this name, a Certificate Signing Request is formed, binding the name n8d234f.r.example.net to the public key derived above.</t>
      <t>The router then looks and waits for a network attachment on any of it's (physical) ethernet interfaces.
This mechanism does not work for devices with only WiFi interfaces, but typical home routers have at least one physical interface used to connect to the Internet.
Even integrated VDSL or LTE modems with a primarily WiFi orientation usually have at least one physical LAN port.</t>
      <t>Some devices distinguishes a "WAN" interface, and other devices either only one network interface, or do not initally distinguish a specific one.
A recommendation is to listen on any interface, as this makes provisioning the systems require less skilled labour: any connector that fits is acceptable.</t>
      <t>Upon finding a network connection, the home router uses the <xref target="I-D.ietf-anima-grasp" format="default"/> protocol to do an M_DISCOVER for a service called "PROVISIONING".
This is done using Link-Layer IPv6 addresses.
The result will be a Link-Layer IPv6 address and port number on which the home router should connect.</t>
      <t>A TLS/HTTPS connection is made to that address, using a virtual Host: that has been provisioning into the firmware by the manufacturer.
(The same FQDN should go into the SNI for the TLS connection).
The home router uses a trust anchor provisioned by the manufacturer, and <xref target="RFC6125" format="default"/> DNS-ID policy, to validate that the home router has been connected to an appropriate factory provisioning system.</t>
      <t>The CSR along with some particulars about the device (the chosen ULA, some serial number information), is transmitted in an HTTPS POST.
The provisioning system treats this as a secure connection because it originates on an IPv6-Link-Local address.
(It is reasonable that the provisioning system is elsewhere, but that there is a local provisioning device which will relay traffic to the provisioning system)</t>
      <t>The provisioning system obtains a certificate using ACME, and an <xref target="RFC8555" format="default"/> DNS-01 challenge.
This may require up to a minute in order to do the DNS update, wait for propogation, and then receive the resulting certificate.</t>
      <t>The device has provided its DNS name to the provisioning system, so the provisioning system installs that name into the DNS with a AAAA record giving the ULA address that the device has provided.
(As part of the DNS-01 challenge, some challenge records are installed as proof of control of the name)</t>
      <t>The provisioning system then returns the certificate to the device.
The provisioning system SHOULD keep a copy of the certificate in a database; should the provisioning process fail before the device writes all its state to non-volatile memory, then the provisioning system need not repeat the certificate process.</t>
      <t>The device now has a certificate for a name that it knows is its own.
The device now creates a local DNS mapping (aka "/etc/hosts") from the name it has chosen to the ULA address it has chosen.
The device, even when not connected to the Internet, will answer DNS queries for that name from client systems, mapping the name to the address, and then responding on port 443 to  HTTPS queries for that name.</t>
    </section>
    <section anchor="protocol-details" numbered="true" toc="default">
      <name>Protocol Details</name>
      <t>Many small details to fill in.</t>
    </section>
    <section anchor="certificate-expiryrenewal-protocol" numbered="true" toc="default">
      <name>Certificate Expiry/Renewal Protocol</name>
      <t>Via store-and-forward with some javascript on port 80 and/or an App.</t>
    </section>
    <section anchor="manyplex" numbered="true" toc="default">
      <name>Using wildcard certificates with private network addresses</name>
      <t>To be further described.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>Many to be discussed.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog" numbered="true" toc="default">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC7084" target="https://www.rfc-editor.org/info/rfc7084">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author fullname="H. Singh" initials="H." surname="Singh">
              <organization/>
            </author>
            <author fullname="W. Beebee" initials="W." surname="Beebee">
              <organization/>
            </author>
            <author fullname="C. Donley" initials="C." surname="Donley">
              <organization/>
            </author>
            <author fullname="B. Stark" initials="B." surname="Stark">
              <organization/>
            </author>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies requirements for an IPv6 Customer Edge (CE) router.  Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it.  The document also covers IP transition technologies.  Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document.  The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC6797" target="https://www.rfc-editor.org/info/rfc6797">
          <front>
            <title>HTTP Strict Transport Security (HSTS)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <author fullname="C. Jackson" initials="C." surname="Jackson">
              <organization/>
            </author>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="November" year="2012"/>
            <abstract>
              <t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections.  This overall policy is referred to as HTTP Strict Transport Security (HSTS).  The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6797"/>
          <seriesInfo name="DOI" value="10.17487/RFC6797"/>
        </reference>
        <reference anchor="RFC4193" target="https://www.rfc-editor.org/info/rfc4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <author fullname="B. Haberman" initials="B." surname="Haberman">
              <organization/>
            </author>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews">
              <organization/>
            </author>
            <author fullname="D. McCarney" initials="D." surname="McCarney">
              <organization/>
            </author>
            <author fullname="J. Kasten" initials="J." surname="Kasten">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.ietf-anima-grasp" target="https://www.ietf.org/archive/id/draft-ietf-anima-grasp-15.txt">
          <front>
            <title>GeneRic Autonomic Signaling Protocol (GRASP)</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Brian Carpenter">
	 </author>
            <author fullname="Bing Liu">
              <organization>Huawei Technologies Co., Ltd</organization>
            </author>
            <date day="13" month="July" year="2017"/>
            <abstract>
              <t>This document specifies the GeneRic Autonomic Signaling Protocol (GRASP), which enables autonomic nodes and Autonomic Service Agents to dynamically discover peers, to synchronize state with each other, and to negotiate parameter settings with each other.  GRASP depends on an external security environment that is described elsewhere.  The technical objectives and parameters for specific application scenarios are to be described in separate documents.  Appendices briefly discuss requirements for the protocol and existing protocols with comparable features.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-grasp-15"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.richardson-t2trg-idevid-considerations" target="https://www.ietf.org/archive/id/draft-richardson-t2trg-idevid-considerations-05.txt">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="21" month="June" year="2021"/>
            <abstract>
              <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

   RFCEDITOR: please remove this paragraph.  This work is occurring in
   https://github.com/mcr/idevid-security-considerations

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-t2trg-idevid-considerations-05"/>
        </reference>
        <reference anchor="sixtypercent" target=" https://www.internetsociety.org/resources/doc/2019/the-economics-of-the-security-of-consumer-grade-iot-products-and-services/">
          <front>
            <title>The economics of the security of consumer-grade IoT products and services</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="April" day="24"/>
          </front>
        </reference>
        <reference anchor="CABFORUM" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.7.3.pdf">
          <front>
            <title>CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.7.3</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
