<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosomakho-tls-wimse-cert-hint-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Workload Identifier Scope Hint for TLS ClientHello">Workload Identifier Scope Hint for TLS ClientHello</title>
    <seriesInfo name="Internet-Draft" value="draft-rosomakho-tls-wimse-cert-hint-00"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
      <organization>Cloudflare</organization>
      <address>
        <email>jonathan.hoyland@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>tls</keyword>
    <keyword>wimse</keyword>
    <keyword>identifier</keyword>
    <keyword>workload</keyword>
    <keyword>hint</keyword>
    <abstract>
      <?line 45?>

<t>This document defines a TLS extension that allows clients to indicate one or more workload identifier scopes in the ClientHello message. Each scope consists of a URI scheme and trust domain component, representing the administrative domain and identifier namespace in which the client operates. These identifier scopes serve as hints to enable the server to determine whether client authentication is required and which policies or trust anchors should apply. This mechanism improves efficiency in mutual TLS deployments while minimising the exposure of sensitive identifier information. To protect confidentiality, this extension can be used in conjunction with Encrypted Client Hello (ECH).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaroslavros.github.io/tls-wimse-cert-hint/draft-rosomakho-tls-wimse-cert-hint.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rosomakho-tls-wimse-cert-hint/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security  mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaroslavros/tls-wimse-cert-hint"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Mutual TLS (mTLS) is commonly used to authenticate both endpoints of a <xref target="TLS"/> connection, especially in service-to-service communication within distributed systems. In many deployments, client authentication is conditional: only certain clients are required to present a certificate, and the decision is based on the nature of the client.</t>
      <t>This document defines a TLS extension that allows clients to indicate one or more workload identifier scopes in the <tt>ClientHello</tt> message (<xref section="4.1.2" sectionFormat="of" target="TLS"/>). Each identifier scope is a subset of Workload Identifier [Reference TBD] and consists of a URI scheme and trust domain (e.g., <tt>spiffe://example.org</tt> or <tt>https://botfarm.example.com</tt>) and indicates a namespace under which the client may present an authenticated identifier. Workload identifier scopes act as hints that inform the server of the client intended identifier before the TLS handshake is completed. Based on this information, the server can determine whether client certificate authentication is desirable and, if so, what policy or certificate validation rules should apply.</t>
      <t>This approach enables more flexible and efficient authentication strategies in environments where different clients may be subject to different requirements. For example:</t>
      <ul spacing="normal">
        <li>
          <t>A server may enforce mTLS only for clients of specific workload identifier scope and allow others to connect without client certificate authentication on TLS layer.</t>
        </li>
        <li>
          <t>A server may use the provided workload identifier scopes to generate an appropriate list of Certificate Authorities extension (<xref section="4.2.4" sectionFormat="of" target="TLS"/>) in <tt>CertificateRequest</tt> message (<xref section="4.3.2" sectionFormat="of" target="TLS"/>).</t>
        </li>
        <li>
          <t>The server may reject the connection early if none of the advertised workload identifier scopes are authorized.</t>
        </li>
      </ul>
      <t>By only sending scheme and trust domain (omitting the path), this extension limits exposure of cleartext information. Where further confidentiality is desired, clients are encouraged to include this extension only in <tt>ClientHelloInner</tt> of Encrypted Client Hello (<xref target="ECH"/>) to ensure confidentiality of the workload identifier scopes.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="tls-extension-format">
      <name>TLS Extension Format</name>
      <t>This document defines a new TLS extension named <tt>workload_identifier_scope_hint</tt>, which is carried in the <tt>ClientHello</tt> message. The extension provides the server with one or more workload identifier scopes that the client associates with itself. This allows the server to evaluate authentication requirements prior to sending a <tt>CertificateRequest</tt> message.</t>
      <t>The <tt>workload_identifier_scope_hint</tt> extension is structured as follows:</t>
      <artwork><![CDATA[
   opaque WorkloadIdentifierScope<1..2^16-1>;

   struct {
       WorkloadIdentifierScope identifierscopes<3..2^16-1>;
   } WorkloadIdentifierScopeHintExtension;
]]></artwork>
      <dl>
        <dt><tt>identifierscopes</tt>:</dt>
        <dd>
          <t>A list of UTF-8 encoded absolute URI absolute URI strings as defined in <xref target="URI"/> containing only the scheme and trust domain components of Workload Identifiers defined in TBD.</t>
        </dd>
      </dl>
      <t>The path, query, and fragment components <bcp14>MUST NOT</bcp14> be included. Clients <bcp14>MAY</bcp14> include multiple identity scopes if they operate within more than one trust domain or namespace.</t>
      <t>The extension <bcp14>MUST</bcp14> appear only in the ClientHello. Servers <bcp14>MUST</bcp14> abort TLS handshake with an <tt>illegal_parameter</tt> alert if this extension appears in any other handshake message. Similarly, clients <bcp14>MUST</bcp14> abort TLS handshake if this extension appears in any message from the server.</t>
      <section anchor="server-processing-rules">
        <name>Server Processing Rules</name>
        <t>Upon receiving the extension, the server:</t>
        <ul spacing="normal">
          <li>
            <t><bcp14>MAY</bcp14> use the identifier scopes to determine whether to send a <tt>CertificateRequest</tt> message.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> use the identifier scopes to construct Certificate Authorities extension in the <tt>CertificateRequest</tt> message.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> use the identifier scopes to select a trust anchor or policy.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> reject the handshake early with <tt>handshake_failure</tt> alert if none of the identifier scopes are acceptable.</t>
          </li>
          <li>
            <t><bcp14>MUST NOT</bcp14> treat inclusion of the extension as proof of identity. The identifier scopes are advisory and unauthenticated until verified during client authentication.</t>
          </li>
        </ul>
        <t>If the extension is absent, the server proceeds with the default client authentication behavior.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This extension is intended to improve the flexibility of client authentication policies in TLS. However, because it introduces unauthenticated identity hints early in the handshake, several security considerations apply.</t>
      <section anchor="confidentiality-of-workload-identifier-scopes">
        <name>Confidentiality of Workload Identifier Scopes</name>
        <t>Workload identifier scopes may contain sensitive information, such as deployment structure or tenant-specific data. Since this extension is sent in the clear as part of the ClientHello, exposure of these identifier scopes may allow passive observers to infer client roles, access patterns, or security posture.</t>
        <t>To mitigate this risk, clients <bcp14>SHOULD</bcp14> include this extension only in ClinetHelloInner if <xref target="ECH"/> is available. ECH encrypts the ClinetHelloInner and its extensions under the server's public key, preventing visibility of the identifier scopes to on-path observers.</t>
        <t>If ECH is not in use, clients <bcp14>SHOULD</bcp14> avoid including sensitive or detailed identifier scopes in this extension unless required by policy.</t>
      </section>
      <section anchor="unauthenticated-hints">
        <name>Unauthenticated Hints</name>
        <t>The workload identifier scopes conveyed in this extension are not authenticated. They are advisory in nature and <bcp14>MUST NOT</bcp14> be treated by the server as a proof of identity. Servers <bcp14>MUST</bcp14> perform full cryptographic verification of the client certificate before relying on any identity claim.</t>
        <t>Servers <bcp14>MAY</bcp14> enforce policies based on the presence or absence of expected identifier scopes in the <tt>ClientHello</tt>. However, this enforcement must be restricted to access control decisions prior to authentication, such astriggering client authentication or rejecting the handshake.</t>
      </section>
      <section anchor="identifier-scopes-enumeration">
        <name>Identifier Scopes Enumeration</name>
        <t>If ECH is not deployed, an attacker with network visibility may collect workload identifier scopes by observing repeated TLS handshakes. This could aid in reconnaissance or allow inference of infrastructure details. To reduce this risk, clients may:</t>
        <ul spacing="normal">
          <li>
            <t>Use generic or opaque identifier scopes when full disclosure is not required.</t>
          </li>
          <li>
            <t>Limit use of the extension to trusted networks or peers.</t>
          </li>
          <li>
            <t>Use ECH to encrypt the extension contents.</t>
          </li>
        </ul>
      </section>
      <section anchor="server-response-behaviour">
        <name>Server Response Behaviour</name>
        <t>Servers receiving unknown or malformed identifier scopes <bcp14>SHOULD</bcp14> ignore them and proceed with the default authentication policy. Servers <bcp14>SHOULD NOT</bcp14> terminate connections solely due to unrecognised identifier scopes unless explicitly configured to do so.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value from the TLS ExtensionType Values registry:</t>
      <ul spacing="normal">
        <li>
          <t>The Extension Name should be workload_identifier_scope_hint</t>
        </li>
        <li>
          <t>The TLS 1.3 value should be CH</t>
        </li>
        <li>
          <t>The DTLS-Only value should be N</t>
        </li>
        <li>
          <t>The Recommended value should be Y</t>
        </li>
        <li>
          <t>The Reference should be this document</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="TLS">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cryptography Consulting LLC</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="14" month="June" year="2025"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="URI">
        <front>
          <title>Uniform Resource Identifier (URI): Generic Syntax</title>
          <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
          <author fullname="R. Fielding" initials="R." surname="Fielding"/>
          <author fullname="L. Masinter" initials="L." surname="Masinter"/>
          <date month="January" year="2005"/>
          <abstract>
            <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="66"/>
        <seriesInfo name="RFC" value="3986"/>
        <seriesInfo name="DOI" value="10.17487/RFC3986"/>
      </reference>
    </references>
    <?line 163?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
