<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.9 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-suchan-acme-onion-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ACME-ONION">Automated Certificate Management Environment (ACME) Onion Identifier Validation Extension</title>

    <author initials="S." surname="Seo" fullname="Seo Suchan">
      <organization></organization>
      <address>
        <email>tjtncks@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="May" day="10"/>

    <area>General</area>
    <workgroup>ACME Working Group</workgroup>
    

    <abstract>


<t>This document specifies identifiers and challenges required to enable the Automated Certificate Management Environment (ACME) to issue certificates for Tor Project&#39;s onion V3 addresses.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>While onion addresses <xref target="RFC7686"/> are in form of DNS address, they aren&#39;t in part of ICANN hierarchy, and onion name&#39;s self-verifying construction warrants different verification, duce different identifier type for them is worth consider.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="onion-identifier"><name>Onion Identifier</name>

<t><xref target="RFC8555"/> only defines the identifier type &quot;dns&quot;, that assumes it&#39;s on public CA/B hierarchy, so to make clear Onion addresses are not using normal DNS verification methods, we assign a new identifier type for onion v3 addresses, &quot;onion-v3&quot;.</t>

<t>This document only handles V3 version of onion address as defined in <xref target="Toraddr"/>, identified by 56 letters base domain name ends with d.</t>

<t>This document doesn&#39;t handle about verification of version 2 of onion addresses, as they are retired already</t>

<t>An identifier for the onion address aeceulkebl5...4zcuv5hk7fqwad.onion would be formatted like:</t>

<figure><artwork><![CDATA[
{"type": "onion-v3", "value": "aeceulkebl5...4zcuv5hk7fqwad.onion"}
]]></artwork></figure>

<t>Keep mind in CSR this address still treated as DNS.</t>

</section>
<section anchor="validation-challenges-for-onion-address"><name>Validation Challenges for Onion address</name>

<t>Onion-v3 identifiers MAY be used with the existing &quot;http-01&quot; and &quot;tls-alpn-01&quot; challenges from <xref target="RFC8555"/> Section 8.3 and <xref target="RFC8737"/> Section 3 respectively. To use Onion identifiers with these challenges their initial DNS resolution step MUST be skipped and the appropriate Tor daemon that in control of CA MUST used to proxy such request.</t>

<t>The existing &quot;dns-01&quot; challenge MUST NOT be used to validate onion addresses.</t>

<t>In addition to challenges earlier RFC defined, This document create an additional challenge called &quot;onion-v3-csr&quot;. This challenge can be used for wildcard subdomain of Onion address.</t>

<section anchor="identify-key-possession-challenge"><name>Identify Key Possession Challenge</name>

<t>With onion-csr-01 validation, the client in an ACME transaction proves its control of an Onion address or subdomain of it by proving the possession of Onion hidden service&#39;s identity key. The ACME server challenges the client to sign CSR that includes the nonce it gave as challenge.</t>

<t>The onion-csr-01 ACME challenge object has the following format:</t>

<dl>
  <dt>type (required, string):</dt>
  <dd>
    <t>The string &quot;onion-v3-csr&quot;</t>
  </dd>
  <dt>token (required, string):</dt>
  <dd>
    <t>A random value that uniquely identifies the challenge. This value MUST have at least 128 bits of entropy. It MUST NOT contain any characters outside the base64url alphabet as described in <xref target="RFC4648"/> Section 5. Trailing &#39;=&#39; padding characters MUST be stripped. See <xref target="RFC4086"/> for additional information on randomness requirements.</t>
  </dd>
</dl>

<t>The client prepares for validation by constructing a self-signed CSR that MUST contain an cabf caSigningNonce Attribute and a subjectAlternativeName extension <xref target="RFC5280"/>. The subjectAlternativeName extension MUST contain a single dNSName entry where the value is the domain name being validated. The cabf caSigningNonce Attribute MUST contain the token string as ascii encoded for the challenge.</t>

<t>The cabf caSigningNonce Attribute is identified by the cabf-caSigningNonce object identifier (OID) in the cabf arc <xref target="RFC5280"/>. consult <xref target="cabr"/> appendix B for how to construct CSR itself in detail.</t>

<figure><artwork><![CDATA[
cabf OBJECT IDENTIFIER ::= 2.23.140 
{
  joint-iso-itu-t(2)
    internationalorganizations(23)
      a-browser-forum(140)
}

caSigningNonce ATTRIBUTE ::= {
WITH SYNTAX OCTET STRING
EQUALITY MATCHING RULE octetStringMatch
SINGLE VALUE TRUE
ID { cabf-caSigningNonce }
}
cabf-caSigningNonce OBJECT IDENTIFIER ::= { cabf 41 }

applicantSigningNonce ATTRIBUTE ::= {
WITH SYNTAX OCTET STRING
EQUALITY MATCHING RULE octetStringMatch
SINGLE VALUE TRUE
ID { cabf-applicantSigningNonce }
}
cabf-applicantSigningNonce OBJECT IDENTIFIER ::= { cabf 42 }

]]></artwork></figure>

<t>A client fulfills this challenge by construct the challenge CSR from the &quot;token&quot; value provided in the challenge, then POST on challenge URL with crafted CSR as payload to request validated by the server.</t>

<figure><artwork><![CDATA[
POST /acme/authz/1234/1
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/1",
    "nonce": "XaYcb5XoTUgRWbTWw_NwkcP",
    "url": "https://example.com/acme/authz/1234/1"
  }),
  "payload": base64url({
       "csr": "MIIBBzCBugIBADAAMCo...gRYTMAhRP8nIH",
     }),
  "signature": "0wSzBJBgNVHREEQ...gYJKoZIhvcNAQkOM"
}
]]></artwork></figure>

<t>On receiving this request from client, the server verifies client&#39;s control over the onion address by verify that CSR is crafted with expected properties:</t>

<t><list style="numbers">
  <t>CSR is signed with private part of identity key the requested onion address made from.</t>
  <t>A caSigningNonce attribute that contains token Value that challenge object provided.</t>
  <t>existence of applicantSigningNonce attribute. This value SHOULD include random value from client side with at least 64bits of entropy, and CA MUST recommend to client do so, but servers are not expected verify such claim, as by nature it&#39;s impossible to verify such claim of randomness.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="identifier-types"><name>Identifier Types</name>

<t>Adds a new type to the Identifier list in ACME Identifier Types with the label &quot;onion-v3&quot; and reference I-D.THISDOC.</t>

</section>
<section anchor="challenge-types"><name>Challenge Types</name>

<t>in the ACME Validation Methods list:</t>

<t>Adds the raw &quot;onion-v3-csr&quot; to the Validation Methods.</t>

<t>Adds the value &quot;onion-v3&quot; to the Identifier Type column  for the &quot;http-01&quot;, &quot;onion-challenge-csr&quot;, and &quot;tls-alpn-01&quot; challenges. , and reference I-D.THISDOC each of them.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As onion addresses are able to generated in massive quantity without financial cost, it bypasses the normal ratelimit CAs imposes. CAs SHOULD adapt some measure to prevent DoS of CA by create hugh amount of request for onion address. For example, imposing limit per ACME account or require order to have at least one non-onion domain.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC4086' target='https://www.rfc-editor.org/info/rfc4086'>
<front>
<title>Randomness Requirements for Security</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<author fullname='J. Schiller' initials='J.' surname='Schiller'><organization/></author>
<author fullname='S. Crocker' initials='S.' surname='Crocker'><organization/></author>
<date month='June' year='2005'/>
<abstract><t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t><t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='106'/>
<seriesInfo name='RFC' value='4086'/>
<seriesInfo name='DOI' value='10.17487/RFC4086'/>
</reference>



<reference anchor='RFC4648' target='https://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<date month='October' year='2006'/>
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>



<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC7686' target='https://www.rfc-editor.org/info/rfc7686'>
<front>
<title>The &quot;.onion&quot; Special-Use Domain Name</title>
<author fullname='J. Appelbaum' initials='J.' surname='Appelbaum'><organization/></author>
<author fullname='A. Muffett' initials='A.' surname='Muffett'><organization/></author>
<date month='October' year='2015'/>
<abstract><t>This document registers the &quot;.onion&quot; Special-Use Domain Name.</t></abstract>
</front>
<seriesInfo name='RFC' value='7686'/>
<seriesInfo name='DOI' value='10.17487/RFC7686'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8555' target='https://www.rfc-editor.org/info/rfc8555'>
<front>
<title>Automatic Certificate Management Environment (ACME)</title>
<author fullname='R. Barnes' initials='R.' surname='Barnes'><organization/></author>
<author fullname='J. Hoffman-Andrews' initials='J.' surname='Hoffman-Andrews'><organization/></author>
<author fullname='D. McCarney' initials='D.' surname='McCarney'><organization/></author>
<author fullname='J. Kasten' initials='J.' surname='Kasten'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t></abstract>
</front>
<seriesInfo name='RFC' value='8555'/>
<seriesInfo name='DOI' value='10.17487/RFC8555'/>
</reference>



<reference anchor='RFC8737' target='https://www.rfc-editor.org/info/rfc8737'>
<front>
<title>Automated Certificate Management Environment (ACME) TLS Application-Layer Protocol Negotiation (ALPN) Challenge Extension</title>
<author fullname='R.B. Shoemaker' initials='R.B.' surname='Shoemaker'><organization/></author>
<date month='February' year='2020'/>
<abstract><t>This document specifies a new challenge for the Automated Certificate Management Environment (ACME) protocol that allows for domain control validation using TLS.</t></abstract>
</front>
<seriesInfo name='RFC' value='8737'/>
<seriesInfo name='DOI' value='10.17487/RFC8737'/>
</reference>


<reference anchor="cabr" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/B forum baseline requirement</title>
    <author initials="C." surname="Forum" fullname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2022" month="April" day="26"/>
  </front>
</reference>
<reference anchor="Toraddr" target="https://github.com/torproject/torspec/blob/main/address-spec.txt">
  <front>
    <title>Tor address spec</title>
    <author initials="N." surname="Mathewson" fullname="Nick Mathewson">
      <organization></organization>
    </author>
    <date year="2021" month="August" day="24"/>
  </front>
</reference>


    </references>



<section anchor="notes-and-questions-to-reviews"><name>Notes and Questions to reviews</name>

<t>should this be about onion address, or all kind of alternative DNS systems?
should identifier type and challenge type include or strip -v3 tag from its name? if we include that how about this doc name itself? http-01 and tls-alpn-01 over tor will work as well for like onion address V2 or V12, but csr challenge may not. but it&#39;s reasonable to ask same identifier type should give same set of challenges.
should the as rigid as complying this will make comply CA/B Baseline requirement?
while type onion domain name just full onion v3 name itself with example subdomain will exceed rfc line limit. but using ... doesn&#39;t right in context of domain name. any alternative to express truncated FQDN? would &quot;example.onion&quot; work while it wouldn&#39;t be valid onion name?</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

