<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cdni-delegation-acme-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="CDNI delegation using ACME">CDNI delegation using Automated Certificate Management Environment</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cdni-delegation-acme-03"/>
    <author initials="F." surname="Fieau" fullname="Frédéric Fieau" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>40-48, avenue de la Republique</street>
          <city>Chatillon</city>
          <code>92320</code>
          <country>France</country>
        </postal>
        <email>frederic.fieau@orange.com</email>
      </address>
    </author>
    <author initials="E." surname="Stephan" fullname="Emile Stephan">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>2, avenue Pierre Marzin</street>
          <city>Lannion</city>
          <code>22300</code>
          <country>France</country>
        </postal>
        <email>emile.stephan@orange.com</email>
      </address>
    </author>
    <author initials="S." surname="Mishra" fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <postal>
          <street>13100 Columbia Pike</street>
          <city>Silver Spring</city>
          <code>MD 20904</code>
          <country>United States of America</country>
        </postal>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="24"/>
    <area>Applications and Real-Time</area>
    <workgroup>Content Delivery Networks Interconnection</workgroup>
    <keyword>HTTPS</keyword>
    <keyword>delegation</keyword>
    <keyword>ACME</keyword>
    <keyword>STAR</keyword>
    <abstract>
      <?line 64?>

<t>This document defines metadata to support delegating the delivery of
HTTPS content between two or more interconnected CDNs.  Specifically, this
document defines a CDNI Metadata interface object to enable delegation of
X.509 certificates leveraging delegation schemes defined in
RFC9115. RFC9115 allows delegating entities to remain in full
control of the delegation and be able to revoke it any time and this avoids
the need to share private cryptographic key material between the involved entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cdni-delegation-acme/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Content Delivery Networks Interconnection Working Group mailing list (<eref target="mailto:cdni@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cdni/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cdni/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FredericFi/cdni-wg"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="introduction">
      <name> Introduction</name>
      <t>Content delivery over HTTPS using two or more cooperating Content Delivery Networks (CDNs) along the path requires
credential management, specifically when DNS-based redirection is used.  In such cases, an upstream CDN (uCDN) needs to delegate its credentials to a downstream (dCDN) for content delivery.</t>
      <t><xref target="RFC9115"/> defines delegation methods that allow a uCDN on behalf of the content provider, the holder of the domain, to generate on-demand an X.509
certificate that binds the designated domain name with a key-pair owned by the dCDN.  For further details, please refer
to <xref section="1" sectionFormat="of" target="RFC9115"/> and <xref section="5.1.2.1" sectionFormat="of" target="RFC9115"/>.</t>
      <t>This document defines CDNI Metadata to make use of HTTPS delegation between a
uCDN and a dCDN based on the mechanism specified in <xref target="RFC9115"/>.  Furthermore,
it adds a delegation method to the "CDNI Payload Types" IANA registry.</t>
      <t><xref target="terminology"/> defines terminology used in this document.  <xref target="fci-metadata"/>
presents delegation metadata for the FCI interface.  <xref target="mi-metadata"/> addresses
the metadata for handling HTTPS delegation with the Metadata Interface.
<xref target="iana"/> addresses IANA registry for delegation methods.  <xref target="sec"/> covers the
security considerations.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses terminology from CDNI framework documents such as: CDNI
framework document <xref target="RFC7336"/> and CDNI
interface specifications documents: CDNI Metadata interface <xref target="RFC8006"/> and
CDNI Footprint and Capabilities Advertisement interface <xref target="RFC8008"/>.  It also uses terminology from
<xref section="1.1" sectionFormat="of" target="RFC8739"/>.</t>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="fci-metadata">
      <name>Advertising Delegation Metadata for CDNI through FCI</name>
      <t>The Footprint and Capabilities Advertisement interface (FCI) defined in <xref target="RFC8008"/> allows a
dCDN to send a FCI capability type object to a uCDN.</t>
      <t>The FCI.Metadata object allows a dCDN to advertise the capabilities
regarding the supported delegation methods and their configuration.</t>
      <t>The following is an example of the supported delegated methods capability
object for a dCDN implementing the ACME delegation method.</t>
      <sourcecode type="json"><![CDATA[
{
  "capabilities": [
    {
      "capability-type": "FCI.Metadata",
      "capability-value": {
        "metadata": [
          "ACMEDelegationMethod",
          "... Other supported delegation methods ..."
        ]
      },
      "footprints": [
        "Footprint objects"
      ]
    }
  ]
}
]]></sourcecode>
    </section>
    <section anchor="mi-metadata">
      <name> ACME Delegation Metadata for CDNI</name>
      <t>When a uCDN delegates the delivery of HTTPS traffic to a dCDN using DNS Redirection
<xref target="RFC7336"/>, the dCDN must use a certificate bound to the origin's name to
successfully authenticate to the end-user (see also <xref section="5.1.2.1" sectionFormat="of" target="RFC9115"/>).</t>
      <t>To that end, this section defines the AcmeDelegationMethod object which
describes metadata for using the ACME delegation interface <xref target="RFC9115"/>.</t>
      <t>The ACMEDelegationMethod applies to both ACME STAR delegation, which provides a
delegation model based on short-term certificates with automatic renewal (<xref section="2.3.2" sectionFormat="of" target="RFC9115"/>), and
non-STAR delegation, which allows delegation between CDNs using long-term
certificates <xref section="2.3.3" sectionFormat="of" target="RFC9115"/>.</t>
      <t><xref target="fig-call-flow"/> provides a high-level view of the combined CDNI and ACME
delegation message flows to obtain STAR certificate bound to the origin's name.</t>
      <figure anchor="fig-call-flow">
        <name>Example call-flow of STAR delegation in CDNI showing 2 levels of delegation</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="584" viewBox="0 0 584 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 24,64 L 24,640" fill="none" stroke="black"/>
              <path d="M 48,32 L 48,64" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,288" fill="none" stroke="black"/>
              <path d="M 64,352 L 64,368" fill="none" stroke="black"/>
              <path d="M 184,32 L 184,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,544" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,64" fill="none" stroke="black"/>
              <path d="M 352,32 L 352,64" fill="none" stroke="black"/>
              <path d="M 376,64 L 376,544" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,64" fill="none" stroke="black"/>
              <path d="M 560,64 L 560,640" fill="none" stroke="black"/>
              <path d="M 576,32 L 576,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 48,32" fill="none" stroke="black"/>
              <path d="M 184,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 352,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 536,32 L 576,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 48,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 536,64 L 576,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 144,96 L 192,96" fill="none" stroke="black"/>
              <path d="M 32,144 L 88,144" fill="none" stroke="black"/>
              <path d="M 144,144 L 200,144" fill="none" stroke="black"/>
              <path d="M 24,192 L 64,192" fill="none" stroke="black"/>
              <path d="M 160,192 L 192,192" fill="none" stroke="black"/>
              <path d="M 32,240 L 64,240" fill="none" stroke="black"/>
              <path d="M 160,240 L 200,240" fill="none" stroke="black"/>
              <path d="M 24,272 L 64,272" fill="none" stroke="black"/>
              <path d="M 32,368 L 64,368" fill="none" stroke="black"/>
              <path d="M 24,416 L 64,416" fill="none" stroke="black"/>
              <path d="M 160,416 L 192,416" fill="none" stroke="black"/>
              <path d="M 200,448 L 240,448" fill="none" stroke="black"/>
              <path d="M 336,448 L 368,448" fill="none" stroke="black"/>
              <path d="M 376,480 L 416,480" fill="none" stroke="black"/>
              <path d="M 512,480 L 552,480" fill="none" stroke="black"/>
              <path d="M 384,512 L 408,512" fill="none" stroke="black"/>
              <path d="M 528,512 L 552,512" fill="none" stroke="black"/>
              <path d="M 32,544 L 56,544" fill="none" stroke="black"/>
              <path d="M 168,544 L 192,544" fill="none" stroke="black"/>
              <path d="M 208,544 L 232,544" fill="none" stroke="black"/>
              <path d="M 344,544 L 368,544" fill="none" stroke="black"/>
              <path d="M 384,544 L 408,544" fill="none" stroke="black"/>
              <path d="M 520,544 L 552,544" fill="none" stroke="black"/>
              <path d="M 24,592 L 552,592" fill="none" stroke="black"/>
              <path d="M 32,624 L 560,624" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,592 548,586.4 548,597.6" fill="black" transform="rotate(0,552,592)"/>
              <polygon class="arrowhead" points="560,544 548,538.4 548,549.6" fill="black" transform="rotate(0,552,544)"/>
              <polygon class="arrowhead" points="560,512 548,506.4 548,517.6" fill="black" transform="rotate(0,552,512)"/>
              <polygon class="arrowhead" points="560,480 548,474.4 548,485.6" fill="black" transform="rotate(0,552,480)"/>
              <polygon class="arrowhead" points="392,544 380,538.4 380,549.6" fill="black" transform="rotate(180,384,544)"/>
              <polygon class="arrowhead" points="392,512 380,506.4 380,517.6" fill="black" transform="rotate(180,384,512)"/>
              <polygon class="arrowhead" points="376,544 364,538.4 364,549.6" fill="black" transform="rotate(0,368,544)"/>
              <polygon class="arrowhead" points="376,448 364,442.4 364,453.6" fill="black" transform="rotate(0,368,448)"/>
              <polygon class="arrowhead" points="216,544 204,538.4 204,549.6" fill="black" transform="rotate(180,208,544)"/>
              <polygon class="arrowhead" points="200,544 188,538.4 188,549.6" fill="black" transform="rotate(0,192,544)"/>
              <polygon class="arrowhead" points="200,416 188,410.4 188,421.6" fill="black" transform="rotate(0,192,416)"/>
              <polygon class="arrowhead" points="200,192 188,186.4 188,197.6" fill="black" transform="rotate(0,192,192)"/>
              <polygon class="arrowhead" points="200,96 188,90.4 188,101.6" fill="black" transform="rotate(0,192,96)"/>
              <polygon class="arrowhead" points="40,624 28,618.4 28,629.6" fill="black" transform="rotate(180,32,624)"/>
              <polygon class="arrowhead" points="40,544 28,538.4 28,549.6" fill="black" transform="rotate(180,32,544)"/>
              <polygon class="arrowhead" points="40,368 28,362.4 28,373.6" fill="black" transform="rotate(180,32,368)"/>
              <polygon class="arrowhead" points="40,240 28,234.4 28,245.6" fill="black" transform="rotate(180,32,240)"/>
              <polygon class="arrowhead" points="40,144 28,138.4 28,149.6" fill="black" transform="rotate(180,32,144)"/>
              <g class="text">
                <text x="28" y="52">dCDN</text>
                <text x="204" y="52">uCDN</text>
                <text x="372" y="52">CP</text>
                <text x="556" y="52">CA</text>
                <text x="80" y="84">GET</text>
                <text x="132" y="84">metadata</text>
                <text x="116" y="100">[CDNI]</text>
                <text x="64" y="116">200</text>
                <text x="96" y="116">OK,</text>
                <text x="148" y="116">metadata</text>
                <text x="64" y="132">(inc.</text>
                <text x="108" y="132">dele</text>
                <text x="160" y="132">config)</text>
                <text x="116" y="148">[CDNI]</text>
                <text x="72" y="180">GET</text>
                <text x="132" y="180">delegation</text>
                <text x="88" y="196">[ACME</text>
                <text x="136" y="196">dele]</text>
                <text x="48" y="212">200</text>
                <text x="80" y="212">OK,</text>
                <text x="140" y="212">delegation</text>
                <text x="56" y="228">(inc.</text>
                <text x="96" y="228">CSR</text>
                <text x="152" y="228">template)</text>
                <text x="88" y="244">[ACME</text>
                <text x="136" y="244">dele]</text>
                <text x="68" y="308">create</text>
                <text x="112" y="308">key</text>
                <text x="148" y="308">pair</text>
                <text x="184" y="308">and</text>
                <text x="56" y="324">CSR</text>
                <text x="84" y="324">w/</text>
                <text x="136" y="324">delegated</text>
                <text x="60" y="340">name</text>
                <text x="84" y="404">POST</text>
                <text x="132" y="404">Order1</text>
                <text x="88" y="420">[ACME</text>
                <text x="136" y="420">dele]</text>
                <text x="256" y="436">forward</text>
                <text x="316" y="436">Order1</text>
                <text x="264" y="452">[ACME</text>
                <text x="312" y="452">dele]</text>
                <text x="436" y="468">POST</text>
                <text x="484" y="468">Order2</text>
                <text x="440" y="484">[ACME</text>
                <text x="488" y="484">STAR]</text>
                <text x="468" y="516">authorizations</text>
                <text x="76" y="548">wait</text>
                <text x="132" y="548">issuance</text>
                <text x="252" y="548">wait</text>
                <text x="308" y="548">issuance</text>
                <text x="428" y="548">wait</text>
                <text x="484" y="548">issuance</text>
                <text x="208" y="580">(unauthenticated)</text>
                <text x="296" y="580">GET</text>
                <text x="380" y="580">star-certificate</text>
                <text x="280" y="612">certificate</text>
                <text x="340" y="612">#1</text>
                <text x="280" y="644">...</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
.----.                .----.               .----.                 .----.
|dCDN|                |uCDN|               | CP |                 | CA |
'-+--'                '-+--'               '--+-'                 '--+-'
  |     GET metadata    |                     |                      |
  +--------[CDNI]------>|                     |                      |
  |   200 OK, metadata  |                     |                      |
  |  (inc. dele config) |                     |                      |
  |<-------[CDNI]-------+                     |                      |
  |                     |                     |                      |
  |    GET delegation   |                     |                      |
  +-----[ACME dele]---->|                     |                      |
  | 200 OK, delegation  |                     |                      |
  | (inc. CSR template) |                     |                      |
  |<----[ACME dele]-----+                     |                      |
  |                     |                     |                      |
  +----.                |                     |                      |
  |    |                |                     |                      |
  |  create key pair and|                     |                      |
  |  CSR w/ delegated   |                     |                      |
  |  name               |                     |                      |
  |    |                |                     |                      |
  |<---'                |                     |                      |
  |                     |                     |                      |
  |     POST Order1     |                     |                      |
  +-----[ACME dele]---->|                     |                      |
  |                     |   forward Order1    |                      |
  |                     +-----[ACME dele]---->|                      |
  |                     |                     |     POST Order2      |
  |                     |                     +-----[ACME STAR]----->|
  |                     |                     |                      |
  |                     |                     |<---authorizations--->|
  |                     |                     |                      |
  |<---wait issuance--->|<---wait issuance--->|<---wait issuance---->|
  |                                                                  |
  |              (unauthenticated) GET star-certificate              |
  +----------------------------------------------------------------->|
  |                          certificate #1                          |
  |<-----------------------------------------------------------------+
  |                              ...                                 |
]]></artwork>
        </artset>
      </figure>
      <t><xref target="acmedeleobj"/> defines the objects used for bootstrapping the ACME delegation
method between a uCDN and a delegate dCDN.</t>
      <section anchor="acmedeleobj">
        <name>ACMEDelegationMethod Object</name>
        <t>The ACMEDelegationMethod object allows a uCDN to define both STAR and non-STAR delegation. The dCDN, the consumer of the delegation, can determine the type of delegation by the presence (or absence) of the "star-lifetime" property. That is, the presence of the "star-lifetime" property explicitly means a short-term delegation with lifetime of the certificate based on that property (and the optional "star-lifetime-adjust" attribute). A non-STAR delegation will not have the "star-lifetime" property in the delegation.  See also the examples in <xref target="examples"/>.</t>
        <t>The ACMEDelegationMethod object is defined with the properties shown below.</t>
        <ul spacing="normal">
          <li>
            <t>Property: acme-delegation  </t>
            <ul spacing="normal">
              <li>Description: a URL pointing at an ACME delegation object, either STAR or non-STAR, associated with the dCDN account on the uCDN ACME server (see <xref section="2.3.1.3" sectionFormat="of" target="RFC9115"/> for the details).</li>
              <li>Type: String</li>
              <li>Mandatory-to-Specify: Yes</li>
            </ul>
          </li>
          <li>
            <t>Property: time-window  </t>
            <ul spacing="normal">
              <li>Description: Validity period of the certificate. According to <xref section="4.3.4" sectionFormat="of" target="RFC8006"/>, a TimeWindow object is defined by a window "start" time, and a window "end" time. In case of STAR method, the "start" and "end" properties of the window MUST be understood respectively as the start-date and end-date of the certificate validity. In the case of the non-STAR method, the "start" and "end" properties of the window MUST be understood respectively as the notBefore and notAfter fields of the certificate.</li>
              <li>Type: TimeWindow</li>
              <li>Mandatory-to-Specify: Yes</li>
            </ul>
          </li>
          <li>
            <t>Property: star-lifetime  </t>
            <ul spacing="normal">
              <li>Description: See <xref section="3.1.1" sectionFormat="of" target="RFC8739"/></li>
              <li>Type: Integer</li>
              <li>Mandatory-to-Specify: Yes, only if a STAR delegation method is specified</li>
            </ul>
          </li>
          <li>
            <t>Property: star-lifetime-adjust  </t>
            <ul spacing="normal">
              <li>Description: See <xref section="3.1.1" sectionFormat="of" target="RFC8739"/></li>
              <li>Type: Integer</li>
              <li>Mandatory-to-Specify: No</li>
            </ul>
          </li>
        </ul>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example shows an <tt>ACMEDelegationMethod</tt> object for a STAR-based
ACME delegation.</t>
          <sourcecode type="json"><![CDATA[
{
  "generic-metadata-type": "MI.ACMEDelegationMethod",
  "generic-metadata-value": {
    "acme-delegation": "https://acme.ucdn.example/delegation/ogfr",
    "time-window": {
      "start": 1665417434,
      "end": 1665676634
    },
    "star-lifetime": 345600,
    "star-lifetime-adjust": 259200
  }
}
]]></sourcecode>
          <t>The example below shows an <tt>ACMEDelegationMethod</tt> object for a non-STAR ACME
delegation. The delegation object is defined as per <xref section="4.3" sectionFormat="of" target="RFC8006"/>.</t>
          <sourcecode type="json"><![CDATA[
{
  "generic-metadata-type": "MI.ACMEDelegationMethod",
  "generic-metadata-value": {
    "acme-delegation": "https://acme.ucdn.example/delegation/wSi5",
    "time-window": {
      "start": 1570982234,
      "end": 1665417434
    }
  }
}
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="iana">
      <name> IANA Considerations</name>
      <t>This document requests the registration of the following entry under the
"CDNI Payload Types" registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Type</th>
            <th align="left">Specification</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">MI.ACMEDelegationMethod</td>
            <td align="left">RFCthis</td>
          </tr>
        </tbody>
      </table>
      <t><cref anchor="to-be-removed">RFC Editor: please replace RFCthis with the RFC number of this RFC and remove this note.</cref></t>
      <section anchor="cdni-mi-acmedelegationmethod-payload-type">
        <name>CDNI MI ACMEDelegationMethod Payload Type</name>
        <dl>
          <dt>Purpose:</dt>
          <dd>
            <t>The purpose of this Payload Type is to distinguish AcmeDelegationMethod
MI objects (and any associated capability advertisement)</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>MI/FCI</t>
          </dd>
          <dt>Encoding:</dt>
          <dd>
            <t>See <xref target="acmedeleobj"/></t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec">
      <name>Security Considerations</name>
      <t>The metadata object defined in this document does not introduce any new
security or privacy concerns over those already discussed in <xref target="RFC9115"/>,
<xref target="RFC8006"/> and <xref target="RFC8008"/>.</t>
      <t>The reader is expected to understand the ACME delegation trust model (<xref section="7.1" sectionFormat="of" target="RFC9115"/>) and security goal (<xref section="7.2" sectionFormat="of" target="RFC9115"/>), in particular
the criticality around the protection of the user account associated with the
delegation, which authorizes all the security relevant operations between dCDN
and uCDN over the ACME channel.
The dCDN's ACME account is also relevant to the privacy of the entire scheme;
for example, the <tt>acme-delegation</tt> resource in the Metadata object is only
accessible to the holder of the account key, who is allowed to fetch its
content exclusively via POST-as-GET (<xref section="2.3.1.2" sectionFormat="of" target="RFC9115"/>).</t>
      <t>In addition, the Metadata interface authentication and confidentiality
requirements defined in <xref section="8" sectionFormat="of" target="RFC8006"/> MUST be followed.</t>
      <t>Implementers MUST adhere to the security considerations defined in the CDNI Request Routing: Footprint and Capabilities Semantics, <xref section="7" sectionFormat="of" target="RFC8008"/>.</t>
      <t>When TLS is used to achieve the above security objectives, the general TLS
usage guidance in <xref target="RFC9325"/> MUST be followed.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8006">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Metadata</title>
            <author fullname="B. Niven-Jenkins" initials="B." surname="Niven-Jenkins"/>
            <author fullname="R. Murray" initials="R." surname="Murray"/>
            <author fullname="M. Caulfield" initials="M." surname="Caulfield"/>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2016"/>
            <abstract>
              <t>The Content Delivery Network Interconnection (CDNI) Metadata interface enables interconnected Content Delivery Networks (CDNs) to exchange content distribution metadata in order to enable content acquisition and delivery. The CDNI Metadata associated with a piece of content provides a downstream CDN with sufficient information for the downstream CDN to service content requests on behalf of an upstream CDN. This document describes both a base set of CDNI Metadata and the protocol for exchanging that metadata.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8006"/>
          <seriesInfo name="DOI" value="10.17487/RFC8006"/>
        </reference>
        <reference anchor="RFC8008">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics</title>
            <author fullname="J. Seedorf" initials="J." surname="Seedorf"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="R. van Brandenburg" initials="R." surname="van Brandenburg"/>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2016"/>
            <abstract>
              <t>&lt;p&gt;This document captures the semantics of the "Footprint and Capabilities Advertisement" part of the Content Delivery Network Interconnection (CDNI) Request Routing interface, i.e., the desired meaning of "Footprint" and "Capabilities" in the CDNI context and what the "Footprint &amp; Capabilities Advertisement interface (FCI)" offers within CDNI. The document also provides guidelines for the CDNI FCI protocol. It further defines a Base Advertisement Object, the necessary registries for capabilities and footprints, and guidelines on how these registries can be extended in the future.&lt;/p&gt;</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8008"/>
          <seriesInfo name="DOI" value="10.17487/RFC8008"/>
        </reference>
        <reference anchor="RFC8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity. However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise. This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7336">
          <front>
            <title>Framework for Content Distribution Network Interconnection (CDNI)</title>
            <author fullname="L. Peterson" initials="L." surname="Peterson"/>
            <author fullname="B. Davie" initials="B." surname="Davie"/>
            <author fullname="R. van Brandenburg" initials="R." role="editor" surname="van Brandenburg"/>
            <date month="August" year="2014"/>
            <abstract>
              <t>This document presents a framework for Content Distribution Network Interconnection (CDNI). The purpose of the framework is to provide an overall picture of the problem space of CDNI and to describe the relationships among the various components necessary to interconnect CDNs. CDNI requires the specification of interfaces and mechanisms to address issues such as request routing, distribution metadata exchange, and logging information exchange across CDNs. The intent of this document is to outline what each interface needs to accomplish and to describe how these interfaces and mechanisms fit together, while leaving their detailed specification to other documents. This document, in combination with RFC 6707, obsoletes RFC 3466.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7336"/>
          <seriesInfo name="DOI" value="10.17487/RFC7336"/>
        </reference>
      </references>
    </references>
    <?line 321?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank authors of the <xref target="RFC9115"/>, Antonio Augustin Pastor Perales, Diego Lopez, Thomas Fossati and Yaron Sheffer. Additionally, our gratitude to Thomas Fossati who participated in the drafting, reviewing and giving his feedback in finalizing this document. We also thank CDNI co-chair Kevin Ma for his continual review and feedback during the development of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
