<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-vanbrouwershaven-acme-client-discovery-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="ACME Client Discovery">Auto-discovery mechanism for ACME authorized clients</title>
    <seriesInfo name="Internet-Draft" value="draft-vanbrouwershaven-acme-client-discovery-00"/>
    <author initials="P." surname="van Brouwershaven" fullname="Paul van Brouwershaven">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>paul.vanbrouwershaven@entrust.com</email>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert">DigiCert, Inc</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <region>PA</region>
          <country>United States of America</country>
        </postal>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="I." surname="Barreira" fullname="Iñigo Barreira">
      <organization abbrev="Sectigo">Sectigo (Europe) SL</organization>
      <address>
        <postal>
          <street>Rambla Catalunya 86, 3 1. 08008 Barcelona.</street>
          <city>Barcelona</city>
          <code>08008</code>
          <country>Spain</country>
        </postal>
        <email>inigo.barreira@sectigo.com</email>
      </address>
    </author>
    <author initials="Q." surname="Misell" fullname="Q Misell">
      <organization abbrev="AS207960">AS207960 Cyfyngedig</organization>
      <address>
        <postal>
          <street>13 Pen-y-lan Terrace</street>
          <city>Caerdydd</city>
          <code>CF23 9EU</code>
          <country>Cymru</country>
        </postal>
        <email>q@as207960.net</email>
      </address>
    </author>
    <date year="2024" month="February" day="15"/>
    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <keyword>ACME</keyword>
    <keyword>Auto-discovery</keyword>
    <abstract>
      <?line 78?>

<t>A significant challenge in the widespread adoption of the Automated Certificate Management Environment (ACME) <xref target="RFC8555"/> is the trust establishment between ACME servers and clients. While ACME clients can automatically discover the URL of the ACME server through ACME Auto Discovery <xref target="I-D.vanbrouwershaven-acme-auto-discovery"/>, they face difficulty in identifying authorized clients. This draft proposes a solution to this problem by allowing Certification Authority (CA) customers to specify which ACME keys are authorized to request certificates on their behalf by simply providing the domain name of the service provider.</t>
      <t>Specifically, this document registers the URI "/.well-known/acme-keys" at which all compliant service providers can publish their ACME client public keys. This mechanism allows the ACME server to identify the specific service provider, enhancing the trust relationship. Furthermore, it provides flexibility to service providers as they can use multiple keys and rotate them as often as they like, thereby improving security and control over their ACME client configurations while giving CA customers the ability to specifically authorize which service providers can request certificates on their behalf.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://vanbroup.github.io/acme-client-discovery/draft-vanbrouwershaven-acme-client-discovery.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vanbrouwershaven-acme-client-discovery/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Automated Certificate Management Environment Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/acme/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vanbroup/acme-client-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sec-intro">
      <name>Introduction</name>
      <t>The Automated Certificate Management Environment (ACME) <xref target="RFC8555"/> has been instrumental in streamlining the process of certificate issuance and validation. However, a significant challenge that hinders its widespread adoption is the establishment of trust between ACME servers and clients. While ACME clients can automatically discover the URL of the ACME server through ACME Auto Discovery <xref target="I-D.vanbrouwershaven-acme-auto-discovery"/>, identifying authorized clients remains a complex task.</t>
      <t>This document proposes a solution to this problem by introducing a mechanism that allows Certification Authority (CA) customers to specify which ACME keys are authorized to request certificates on their behalf. This is achieved by simply providing the domain name of the service provider.</t>
      <t>Specifically, this document registers the URI "/.well-known/acme-keys" where all compliant service providers can publish their ACME client public keys. This mechanism not only enhances the trust relationship by allowing the ACME server to identify the specific service provider but also provides flexibility to service providers. They can use multiple keys and rotate them as often as they like, thereby improving security and control over their ACME client configurations.</t>
      <t>Moreover, this mechanism empowers CA customers by giving them the ability to specifically authorize which service providers can request certificates on their behalf.</t>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <ol spacing="normal" type="1"><li>
          <t>A user creates an account at <tt>server.example</tt>.</t>
        </li>
        <li>
          <t>The user specifies at <tt>server.example</tt> that <tt>client.example</tt> is authorized to request certificats on their behalf for the domain <tt>customer.example</tt>.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>The ACME server <tt>server.example</tt> downloads the known public keys from <tt>https://client.example/.well-known/acme-keys</tt> and will regularly check for changes.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>The ACME client <tt>client.example</tt> registers its key at <tt>server.example</tt>, which will only succeed if any of the customers have authorized <tt>client.example</tt>.</t>
        </li>
        <li>
          <t>The ACME client <tt>client.example</tt> makes an ACME request to the ACME server from <tt>server.example</tt> for domain <tt>customer.example</tt>.</t>
        </li>
        <li>
          <t>Based on the domain <tt>customer.example</tt> the ACME server <tt>server.example</tt> authenticates the ACME client against the known public keys of the service providers that the customer has authorized.</t>
        </li>
        <li>
          <t>The ACME client continues normal operation according to <xref target="RFC8555"/>.</t>
        </li>
      </ol>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="520" viewBox="0 0 520 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
            <path d="M 64,120 L 64,416" fill="none" stroke="black"/>
            <path d="M 144,32 L 144,112" fill="none" stroke="black"/>
            <path d="M 192,32 L 192,112" fill="none" stroke="black"/>
            <path d="M 248,120 L 248,416" fill="none" stroke="black"/>
            <path d="M 328,32 L 328,112" fill="none" stroke="black"/>
            <path d="M 376,32 L 376,112" fill="none" stroke="black"/>
            <path d="M 432,120 L 432,416" fill="none" stroke="black"/>
            <path d="M 512,32 L 512,112" fill="none" stroke="black"/>
            <path d="M 8,32 L 144,32" fill="none" stroke="black"/>
            <path d="M 192,32 L 328,32" fill="none" stroke="black"/>
            <path d="M 376,32 L 512,32" fill="none" stroke="black"/>
            <path d="M 8,112 L 144,112" fill="none" stroke="black"/>
            <path d="M 192,112 L 328,112" fill="none" stroke="black"/>
            <path d="M 376,112 L 512,112" fill="none" stroke="black"/>
            <path d="M 64,160 L 240,160" fill="none" stroke="black"/>
            <path d="M 64,208 L 240,208" fill="none" stroke="black"/>
            <path d="M 256,240 L 424,240" fill="none" stroke="black"/>
            <path d="M 248,304 L 424,304" fill="none" stroke="black"/>
            <path d="M 256,352 L 432,352" fill="none" stroke="black"/>
            <path d="M 256,400 L 424,400" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="432,400 420,394.4 420,405.6" fill="black" transform="rotate(0,424,400)"/>
            <polygon class="arrowhead" points="432,304 420,298.4 420,309.6" fill="black" transform="rotate(0,424,304)"/>
            <polygon class="arrowhead" points="264,400 252,394.4 252,405.6" fill="black" transform="rotate(180,256,400)"/>
            <polygon class="arrowhead" points="264,352 252,346.4 252,357.6" fill="black" transform="rotate(180,256,352)"/>
            <polygon class="arrowhead" points="264,240 252,234.4 252,245.6" fill="black" transform="rotate(180,256,240)"/>
            <polygon class="arrowhead" points="248,208 236,202.4 236,213.6" fill="black" transform="rotate(0,240,208)"/>
            <polygon class="arrowhead" points="248,160 236,154.4 236,165.6" fill="black" transform="rotate(0,240,160)"/>
            <g class="text">
              <text x="228" y="68">ACME</text>
              <text x="276" y="68">Server</text>
              <text x="412" y="68">ACME</text>
              <text x="460" y="68">Client</text>
              <text x="496" y="68">/</text>
              <text x="60" y="84">User</text>
              <text x="240" y="84">/</text>
              <text x="260" y="84">CA</text>
              <text x="424" y="84">Service</text>
              <text x="480" y="84">Prov.</text>
              <text x="84" y="148">1.</text>
              <text x="124" y="148">Create</text>
              <text x="184" y="148">account</text>
              <text x="84" y="196">2.</text>
              <text x="136" y="196">Authorize</text>
              <text x="204" y="196">client</text>
              <text x="268" y="228">3.</text>
              <text x="316" y="228">Register</text>
              <text x="368" y="228">key</text>
              <text x="268" y="276">4.</text>
              <text x="308" y="276">Verify</text>
              <text x="352" y="276">key</text>
              <text x="388" y="276">with</text>
              <text x="276" y="292">info</text>
              <text x="316" y="292">from</text>
              <text x="380" y="292">well-known</text>
              <text x="268" y="340">5.</text>
              <text x="312" y="340">Request</text>
              <text x="364" y="340">cert</text>
              <text x="268" y="388">6.</text>
              <text x="308" y="388">Normal</text>
              <text x="376" y="388">operation</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
+----------------+     +----------------+     +----------------+
|                |     |                |     |                |
|                |     |  ACME Server   |     |  ACME Client / |
|    User        |     |     / CA       |     |  Service Prov. |
|                |     |                |     |                |
+----------------+     +----------------+     +----------------+
       |                      |                      |
       | 1. Create account    |                      |
       +--------------------->|                      |
       |                      |                      |
       | 2. Authorize client  |                      |
       +--------------------->|                      |
       |                      | 3. Register key      |
       |                      |<---------------------|
       |                      |                      |
       |                      | 4. Verify key with   |
       |                      | info from well-known |
       |                      +--------------------->|
       |                      |                      |
       |                      | 5. Request cert      |
       |                      |<---------------------+
       |                      |                      |
       |                      | 6. Normal operation  |
       |                      |<-------------------->|
       |                      |                      |

]]></artwork>
      </artset>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <section anchor="well-known-uri-for-the-acme-directory">
        <name>Well-Known URI for the ACME Directory</name>
        <t>The following value has been registered in the "Well-Known URIs" registry (using the template from <xref target="RFC5785"/>):</t>
        <artwork><![CDATA[
URI suffix: acme-keys
Change controller: IETF
Specification document(s): RFC XXXX, Section Y.Z
Related information: N/A
]]></artwork>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong> Please replace XXXX above with the RFC number assigned to this document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="attacker-control-over-well-known-directory">
        <name>Attacker Control Over Well-Known Directory</name>
        <t>This document introduces a mechanism where ACME client keys are published in a well-known directory of a service provider. This introduces a potential risk if an attacker gains control over this well-known directory. In such a scenario, the attacker could add their own ACME client keys, posing as the service provider. This could potentially allow the attacker to request certificates on behalf of the service provider.</t>
        <t>However, it's important to note that even if an attacker manages to publish their own keys in the well-known directory, they would still need to prove control over the domain name to obtain a certificate, as per the ACME protocol <xref target="RFC8555"/>. This provides an additional layer of security and significantly reduces the risk of unauthorized certificate issuance.</t>
        <t>Service providers should ensure the security of their well-known directories to prevent unauthorized access.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5785">
          <front>
            <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
            <date month="April" year="2010"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5785"/>
          <seriesInfo name="DOI" value="10.17487/RFC5785"/>
        </reference>
        <reference anchor="I-D.vanbrouwershaven-acme-auto-discovery">
          <front>
            <title>Auto-discovery mechanism for ACME servers</title>
            <author fullname="Paul van Brouwershaven" initials="P." surname="van Brouwershaven">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert, Inc</organization>
            </author>
            <author fullname="Iñigo Barreira" initials="I." surname="Barreira">
              <organization>Sectigo (Europe) SL</organization>
            </author>
            <author fullname="Q Misell" initials="Q." surname="Misell">
              <organization>AS207960 Cyfyngedig</organization>
            </author>
            <date day="15" month="February" year="2024"/>
            <abstract>
              <t>   A significant impediment to the widespread adoption of the Automated
   Certificate Management Environment (ACME) [RFC8555] is that ACME
   clients need to be pre-configured with the URL of the ACME server to
   be used.  This often leaves domain owners at the mercy of their
   hosting provider as to which Certification Authorities (CAs) can be
   used.  This specification provides a mechanism to bootstrap ACME
   client configuration from a domain's DNS CAA Resource Record
   [RFC8659], thus giving control of which CA(s) to use back to the
   domain owner.

   Specifically, this document specifies two new extensions to the DNS
   CAA Resource Record: the "discovery" and "priority" parameters.
   Additionally, it registers the URI "/.well-known/acme" at which all
   compliant ACME servers will host their ACME directory object.  By
   retrieving instructions for the ACME client from the authorized
   CA(s), this mechanism allows for the domain owner to configure
   multiple CAs in either load-balanced or fallback prioritizations
   which improves user preferences and increases diversity in
   certificate issuers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vanbrouwershaven-acme-auto-discovery-03"/>
        </reference>
      </references>
    </references>
    <?line 185?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
