<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cdni-interfaces-https-delegation-13" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="CDNI extensions for HTTPS delegation">CDNI extensions for HTTPS delegation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cdni-interfaces-https-delegation-13"/>
    <author initials="F." surname="Fieau" fullname="Frédéric Fieau" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>40-48, avenue de la Republique</street>
          <city>Chatillon</city>
          <code>92320</code>
          <country>France</country>
        </postal>
        <email>frederic.fieau@orange.com</email>
      </address>
    </author>
    <author initials="E." surname="Stephan" fullname="Emile Stephan">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>2, avenue Pierre Marzin</street>
          <city>Lannion</city>
          <code>22300</code>
          <country>France</country>
        </postal>
        <email>emile.stephan@orange.com</email>
      </address>
    </author>
    <author initials="S." surname="Mishra" fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <postal>
          <street>13100 Columbia Pike</street>
          <city>Silver Spring</city>
          <code>MD 20904</code>
          <country>United States of America</country>
        </postal>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2022" month="December" day="14"/>
    <area>Applications and Real-Time</area>
    <workgroup>Content Delivery Networks Interconnection</workgroup>
    <keyword>HTTPS</keyword>
    <keyword>delegation</keyword>
    <keyword>ACME</keyword>
    <keyword>STAR</keyword>
    <abstract>
      <t>This document defines metadata objects to support delegating the delivery of
HTTPS content between two or more interconnected CDNs.  Specifically, this
document defines CDNI Metadata interface objects to enable delegation of
X.509 certificates leveraging delegation schemes defined in
RFC9115. RFC 9115 allows delegating entities to remain in full
control of the delegation and be able to revoke it any time and avoids
the need to share private cryptographic key material between the involved entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cdni-interfaces-https-delegation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Content Delivery Networks Interconnection Working Group mailing list (<eref target="mailto:cdni@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cdni/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cdni/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FredericFi/cdni-wg"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name> Introduction</name>
      <t>Content delivery over HTTPS using two or more cooperating Content Delivery Networks (CDNs) along the path requires
credential management, specifically when DNS-based redirection is used.  In such cases, an upstream CDN (uCDN) needs to delegate its credentials to a downstream (dCDN) for content delivery.</t>
      <t><xref target="RFC9115"/> defines delegation methods that allow a uCDN on behalf of the content provider, the holder of the domain, to generate on-demand an X.509
certificate that binds the designated domain name with a key-pair owned by the dCDN.  For further details, please refer
to <xref section="1" sectionFormat="of" target="RFC9115"/> and <xref section="5.1.2.1" sectionFormat="of" target="RFC9115"/>.</t>
      <t>This document defines CDNI Metadata to make use of HTTPS delegation between a
uCDN and a dCDN based on the mechanism specified in <xref target="RFC9115"/>.  Furthermore,
it adds a delegation method to the "CDNI Payload Types" IANA registry.</t>
      <t><xref target="terminology"/> defines terminology used in this document.  <xref target="fci-metadata"/>
presents delegation metadata for the FCI interface.  <xref target="mi-metadata"/> addresses
the metadata for handling HTTPS delegation with the Metadata Interface.
<xref target="iana"/> addresses IANA registry for delegation methods.  <xref target="sec"/> covers the
security considerations.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses terminology from CDNI framework documents such as: CDNI
framework document <xref target="RFC7336"/>, CDNI requirements <xref target="RFC7337"/> and CDNI
interface specifications documents: CDNI Metadata interface <xref target="RFC8006"/> and
CDNI Footprint and capabilities <xref target="RFC8008"/>.  It also uses terminology from
<xref section="1.1" sectionFormat="of" target="RFC8739"/>.</t>
      </section>
    </section>
    <section anchor="fci-metadata">
      <name>Advertising Delegation Metadata for CDNI through FCI</name>
      <t>The Footprint and Capabilities interface defined in <xref target="RFC8008"/> allows a
dCDN to send a FCI capability type object to a uCDN.</t>
      <t>The FCI.Metadata object allows a dCDN to advertise the capabilities
regarding the supported delegation methods and their configuration.</t>
      <t>The following is an example of the supported delegated methods capability
object for a dCDN implementing the ACME delegation method.</t>
      <sourcecode type="json"><![CDATA[
{
  "capabilities": [
    {
      "capability-type": "FCI.Metadata",
      "capability-value": {
        "metadata": [
          "ACMEDelegationMethod",
          "... Other supported delegation methods ..."
        ]
      },
      "footprints": [
        "Footprint objects"
      ]
    }
  ]
}
]]></sourcecode>
    </section>
    <section anchor="mi-metadata">
      <name> ACME Delegation Metadata for CDNI</name>
      <t>When a uCDN delegates to a dCDN to deliver HTTPS traffic using DNS Redirection
<xref target="RFC7975"/>, the dCDN must use a certificate bound to the origin's name to
successfully authenticate to the end-user (see also <xref section="5.1.2.1" sectionFormat="of" target="RFC9115"/>).</t>
      <t>To that end, this section defines the AcmeDelegationMethod object which
describes metadata for using the ACME delegation interface <xref target="RFC9115"/>.</t>
      <t>The ACMEDelegationMethod applies to both ACME STAR delegation, which provides a
delegation model based on short-term certificates with automatic renewal <xref section="2.3.2" sectionFormat="of" target="RFC9115"/>, and
non-STAR delegation, which allows delegation between CDNs using long-term
certificates <xref section="2.3.3" sectionFormat="of" target="RFC9115"/>.</t>
      <t><xref target="fig-call-flow"/> provides a high-level view of the combined CDNI and ACME
delegation message flows to obtain STAR certificate bound to the origin's name.</t>
      <figure anchor="fig-call-flow">
        <name>Example call-flow of STAR delegation in CDNI showing 2 levels of delegation</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="584" viewBox="0 0 584 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 24,64 L 24,640" fill="none" stroke="black"/>
              <path d="M 48,32 L 48,64" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,288" fill="none" stroke="black"/>
              <path d="M 64,352 L 64,368" fill="none" stroke="black"/>
              <path d="M 184,32 L 184,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,544" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,64" fill="none" stroke="black"/>
              <path d="M 352,32 L 352,64" fill="none" stroke="black"/>
              <path d="M 376,64 L 376,544" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,64" fill="none" stroke="black"/>
              <path d="M 560,64 L 560,640" fill="none" stroke="black"/>
              <path d="M 576,32 L 576,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 48,32" fill="none" stroke="black"/>
              <path d="M 184,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 352,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 536,32 L 576,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 48,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 536,64 L 576,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 144,96 L 192,96" fill="none" stroke="black"/>
              <path d="M 32,144 L 88,144" fill="none" stroke="black"/>
              <path d="M 144,144 L 200,144" fill="none" stroke="black"/>
              <path d="M 24,192 L 64,192" fill="none" stroke="black"/>
              <path d="M 160,192 L 192,192" fill="none" stroke="black"/>
              <path d="M 32,240 L 64,240" fill="none" stroke="black"/>
              <path d="M 160,240 L 200,240" fill="none" stroke="black"/>
              <path d="M 24,272 L 64,272" fill="none" stroke="black"/>
              <path d="M 32,368 L 64,368" fill="none" stroke="black"/>
              <path d="M 24,416 L 64,416" fill="none" stroke="black"/>
              <path d="M 160,416 L 192,416" fill="none" stroke="black"/>
              <path d="M 200,448 L 240,448" fill="none" stroke="black"/>
              <path d="M 336,448 L 368,448" fill="none" stroke="black"/>
              <path d="M 376,480 L 416,480" fill="none" stroke="black"/>
              <path d="M 512,480 L 552,480" fill="none" stroke="black"/>
              <path d="M 384,512 L 408,512" fill="none" stroke="black"/>
              <path d="M 528,512 L 552,512" fill="none" stroke="black"/>
              <path d="M 32,544 L 56,544" fill="none" stroke="black"/>
              <path d="M 168,544 L 192,544" fill="none" stroke="black"/>
              <path d="M 208,544 L 232,544" fill="none" stroke="black"/>
              <path d="M 344,544 L 368,544" fill="none" stroke="black"/>
              <path d="M 384,544 L 408,544" fill="none" stroke="black"/>
              <path d="M 520,544 L 552,544" fill="none" stroke="black"/>
              <path d="M 24,592 L 552,592" fill="none" stroke="black"/>
              <path d="M 32,624 L 560,624" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,592 548,586.4 548,597.6" fill="black" transform="rotate(0,552,592)"/>
              <polygon class="arrowhead" points="560,544 548,538.4 548,549.6" fill="black" transform="rotate(0,552,544)"/>
              <polygon class="arrowhead" points="560,512 548,506.4 548,517.6" fill="black" transform="rotate(0,552,512)"/>
              <polygon class="arrowhead" points="560,480 548,474.4 548,485.6" fill="black" transform="rotate(0,552,480)"/>
              <polygon class="arrowhead" points="392,544 380,538.4 380,549.6" fill="black" transform="rotate(180,384,544)"/>
              <polygon class="arrowhead" points="392,512 380,506.4 380,517.6" fill="black" transform="rotate(180,384,512)"/>
              <polygon class="arrowhead" points="376,544 364,538.4 364,549.6" fill="black" transform="rotate(0,368,544)"/>
              <polygon class="arrowhead" points="376,448 364,442.4 364,453.6" fill="black" transform="rotate(0,368,448)"/>
              <polygon class="arrowhead" points="216,544 204,538.4 204,549.6" fill="black" transform="rotate(180,208,544)"/>
              <polygon class="arrowhead" points="200,544 188,538.4 188,549.6" fill="black" transform="rotate(0,192,544)"/>
              <polygon class="arrowhead" points="200,416 188,410.4 188,421.6" fill="black" transform="rotate(0,192,416)"/>
              <polygon class="arrowhead" points="200,192 188,186.4 188,197.6" fill="black" transform="rotate(0,192,192)"/>
              <polygon class="arrowhead" points="200,96 188,90.4 188,101.6" fill="black" transform="rotate(0,192,96)"/>
              <polygon class="arrowhead" points="40,624 28,618.4 28,629.6" fill="black" transform="rotate(180,32,624)"/>
              <polygon class="arrowhead" points="40,544 28,538.4 28,549.6" fill="black" transform="rotate(180,32,544)"/>
              <polygon class="arrowhead" points="40,368 28,362.4 28,373.6" fill="black" transform="rotate(180,32,368)"/>
              <polygon class="arrowhead" points="40,240 28,234.4 28,245.6" fill="black" transform="rotate(180,32,240)"/>
              <polygon class="arrowhead" points="40,144 28,138.4 28,149.6" fill="black" transform="rotate(180,32,144)"/>
              <g class="text">
                <text x="28" y="52">dCDN</text>
                <text x="204" y="52">uCDN</text>
                <text x="372" y="52">CP</text>
                <text x="556" y="52">CA</text>
                <text x="80" y="84">GET</text>
                <text x="132" y="84">metadata</text>
                <text x="116" y="100">[CDNI]</text>
                <text x="64" y="116">200</text>
                <text x="96" y="116">OK,</text>
                <text x="148" y="116">metadata</text>
                <text x="64" y="132">(inc.</text>
                <text x="108" y="132">dele</text>
                <text x="160" y="132">config)</text>
                <text x="116" y="148">[CDNI]</text>
                <text x="72" y="180">GET</text>
                <text x="132" y="180">delegation</text>
                <text x="88" y="196">[ACME</text>
                <text x="136" y="196">dele]</text>
                <text x="48" y="212">200</text>
                <text x="80" y="212">OK,</text>
                <text x="140" y="212">delegation</text>
                <text x="56" y="228">(inc.</text>
                <text x="96" y="228">CSR</text>
                <text x="152" y="228">template)</text>
                <text x="88" y="244">[ACME</text>
                <text x="136" y="244">dele]</text>
                <text x="68" y="308">create</text>
                <text x="112" y="308">key</text>
                <text x="148" y="308">pair</text>
                <text x="184" y="308">and</text>
                <text x="56" y="324">CSR</text>
                <text x="84" y="324">w/</text>
                <text x="136" y="324">delegated</text>
                <text x="60" y="340">name</text>
                <text x="84" y="404">POST</text>
                <text x="132" y="404">Order1</text>
                <text x="88" y="420">[ACME</text>
                <text x="136" y="420">dele]</text>
                <text x="256" y="436">forward</text>
                <text x="316" y="436">Order1</text>
                <text x="264" y="452">[ACME</text>
                <text x="312" y="452">dele]</text>
                <text x="436" y="468">POST</text>
                <text x="484" y="468">Order2</text>
                <text x="440" y="484">[ACME</text>
                <text x="488" y="484">STAR]</text>
                <text x="468" y="516">authorizations</text>
                <text x="76" y="548">wait</text>
                <text x="132" y="548">issuance</text>
                <text x="252" y="548">wait</text>
                <text x="308" y="548">issuance</text>
                <text x="428" y="548">wait</text>
                <text x="484" y="548">issuance</text>
                <text x="208" y="580">(unauthenticated)</text>
                <text x="296" y="580">GET</text>
                <text x="380" y="580">star-certificate</text>
                <text x="280" y="612">certificate</text>
                <text x="340" y="612">#1</text>
                <text x="280" y="644">...</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
.----.                .----.               .----.                 .----.
|dCDN|                |uCDN|               | CP |                 | CA |
'-+--'                '-+--'               '--+-'                 '--+-'
  |     GET metadata    |                     |                      |
  +--------[CDNI]------>|                     |                      |
  |   200 OK, metadata  |                     |                      |
  |  (inc. dele config) |                     |                      |
  |<-------[CDNI]-------+                     |                      |
  |                     |                     |                      |
  |    GET delegation   |                     |                      |
  +-----[ACME dele]---->|                     |                      |
  | 200 OK, delegation  |                     |                      |
  | (inc. CSR template) |                     |                      |
  |<----[ACME dele]-----+                     |                      |
  |                     |                     |                      |
  +----.                |                     |                      |
  |    |                |                     |                      |
  |  create key pair and|                     |                      |
  |  CSR w/ delegated   |                     |                      |
  |  name               |                     |                      |
  |    |                |                     |                      |
  |<---'                |                     |                      |
  |                     |                     |                      |
  |     POST Order1     |                     |                      |
  +-----[ACME dele]---->|                     |                      |
  |                     |   forward Order1    |                      |
  |                     +-----[ACME dele]---->|                      |
  |                     |                     |     POST Order2      |
  |                     |                     +-----[ACME STAR]----->|
  |                     |                     |                      |
  |                     |                     |<---authorizations--->|
  |                     |                     |                      |
  |<---wait issuance--->|<---wait issuance--->|<---wait issuance---->|
  |                                                                  |
  |              (unauthenticated) GET star-certificate              |
  +----------------------------------------------------------------->|
  |                          certificate #1                          |
  |<-----------------------------------------------------------------+
  |                              ...                                 |
]]></artwork>
        </artset>
      </figure>
      <t><xref target="acmedeleobj"/> defines the objects used for bootstrapping the ACME delegation
method between a uCDN and a delegate dCDN.</t>
      <section anchor="acmedeleobj">
        <name>ACMEDelegationMethod Object</name>
        <t>The ACMEDelegationMethod object allows a uCDN to both define STAR and non-STAR delegation depending on the delegation certificate validity.
The ACMEDelegationMethod object is defined with several properties shown below.</t>
        <ul spacing="normal">
          <li>
            <t>Property: acme-delegation  </t>
            <ul spacing="normal">
              <li>Description: a URL pointing at an ACME delegation object, either STAR or non-STAR, associated with the dCDN account on the uCDN ACME server (see <xref section="2.3.1" sectionFormat="of" target="RFC9115"/> for the details).</li>
              <li>Type: Link object, according to <xref section="4.3.1" sectionFormat="of" target="RFC8006"/></li>
              <li>Mandatory-to-Specify: Yes</li>
            </ul>
          </li>
          <li>
            <t>Property: time-window  </t>
            <ul spacing="normal">
              <li>Description: Validity period of the certificate. According to <xref section="4.3.4" sectionFormat="of" target="RFC8006"/>, a TimeWindow object is defined by a window "start" time, and a window "end" time of the window. In case of STAR method, the "start" and "end" properties of the window must be understood respectively as the start-date and end-date of the certificate validity in Epoch time format. In the case of the non-STAR method, the "start" and "end" properties of the window must be understood respectively as the notBefore and notAfter fields of the certificate.</li>
              <li>Type: TimeWindow</li>
              <li>Mandatory-to-Specify: Yes</li>
            </ul>
          </li>
          <li>
            <t>Property: lifetime  </t>
            <ul spacing="normal">
              <li>Description: See <xref section="3.1.1" sectionFormat="of" target="RFC8739"/></li>
              <li>Type: Time, see <xref section="4.3.4" sectionFormat="of" target="RFC8006"/></li>
              <li>Mandatory-to-Specify: Yes, only if a STAR delegation method is specified</li>
            </ul>
          </li>
          <li>
            <t>Property: lifetime-adjust  </t>
            <ul spacing="normal">
              <li>Description: See <xref section="3.1.1" sectionFormat="of" target="RFC8739"/></li>
              <li>Type: Time</li>
              <li>Mandatory-to-Specify: Yes, only if a STAR delegation method is specified</li>
            </ul>
          </li>
        </ul>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example shows an <tt>ACMEDelegationMethod</tt> object for a STAR-based
ACME delegation.</t>
          <sourcecode type="json"><![CDATA[
{
  "generic-metadata-type": "MI.ACMEDelegationMethod",
  "generic-metadata-value": {
    "acme-delegation": "https://acme.ucdn.example/delegation/ogfr",
    "time-window": {
      "start": 1665417434,
      "end": 1665676634
    },
    "lifetime": 345600,
    "lifetime-adjust": 259200
  }
}
]]></sourcecode>
          <t>The example below shows an <tt>ACMEDelegationMethod</tt> object for a non-STAR ACME
delegation. The delegation object is defined as per <xref section="4.3" sectionFormat="of" target="RFC8006"/>.</t>
          <sourcecode type="json"><![CDATA[
{
  "generic-metadata-type": "MI.ACMEDelegationMethod",
  "generic-metadata-value": {
    "acme-delegation": "https://acme.ucdn.example/delegation/wSi5",
    "time-window": {
      "start": 1570982234,
      "end": 1665417434
    }
  }
}
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="iana">
      <name> IANA Considerations</name>
      <t>This document requests the registration of the following entry under the
"CDNI Payload Types" registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Type</th>
            <th align="left">Specification</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">MI.ACMEDelegationMethod</td>
            <td align="left">RFCthis</td>
          </tr>
        </tbody>
      </table>
      <t><cref anchor="to-be-removed">RFC Editor: please replace RFCthis with the RFC number of this RFC and remove this note.</cref></t>
      <section anchor="cdni-mi-acmedelegationmethod-payload-type">
        <name>CDNI MI ACMEDelegationMethod Payload Type</name>
        <dl>
          <dt>Purpose:</dt>
          <dd>
            <t>The purpose of this Payload Type is to distinguish AcmeDelegationMethod
MI objects (and any associated capability advertisement)</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>MI/FCI</t>
          </dd>
          <dt>Encoding:</dt>
          <dd>
            <t>See <xref target="mi-metadata"/></t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec">
      <name>Security considerations</name>
      <t>The metadata object defined in this document does not introduce any new
security or privacy concerns over those already discussed in <xref target="RFC9115"/>,
<xref target="RFC8006"/> and <xref target="RFC8008"/>.</t>
      <t>The reader is expected to understand the ACME delegation trust model (<xref section="7.1" sectionFormat="of" target="RFC9115"/>) and security goal (<xref section="7.3" sectionFormat="of" target="RFC9115"/>), in particular
the criticality around the protection of the user account associated with the
delegation.</t>
      <t>In addition, the requirements defined by CDNI Metadata and CDNI Footprint and
Capabilities regarding the integrity, (mutual) authentication and
confidentiality of the communication channel used to transport the metadata
object apply.</t>
      <t>When TLS is used to achieve the above security objectives, the general TLS
usage guidance in <xref target="RFC9325"/> MUST be followed.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8006">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Metadata</title>
            <author fullname="B. Niven-Jenkins" initials="B." surname="Niven-Jenkins">
              <organization/>
            </author>
            <author fullname="R. Murray" initials="R." surname="Murray">
              <organization/>
            </author>
            <author fullname="M. Caulfield" initials="M." surname="Caulfield">
              <organization/>
            </author>
            <author fullname="K. Ma" initials="K." surname="Ma">
              <organization/>
            </author>
            <date month="December" year="2016"/>
            <abstract>
              <t>The Content Delivery Network Interconnection (CDNI) Metadata interface enables interconnected Content Delivery Networks (CDNs) to exchange content distribution metadata in order to enable content acquisition and delivery.  The CDNI Metadata associated with a piece of content provides a downstream CDN with sufficient information for the downstream CDN to service content requests on behalf of an upstream CDN.  This document describes both a base set of CDNI Metadata and the protocol for exchanging that metadata.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8006"/>
          <seriesInfo name="DOI" value="10.17487/RFC8006"/>
        </reference>
        <reference anchor="RFC8008">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics</title>
            <author fullname="J. Seedorf" initials="J." surname="Seedorf">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." surname="Previdi">
              <organization/>
            </author>
            <author fullname="R. van Brandenburg" initials="R." surname="van Brandenburg">
              <organization/>
            </author>
            <author fullname="K. Ma" initials="K." surname="Ma">
              <organization/>
            </author>
            <date month="December" year="2016"/>
            <abstract>
              <t>This document captures the semantics of the "Footprint and                          Capabilities Advertisement" part of the Content Delivery Network Interconnection (CDNI) Request Routing interface, i.e., the desired meaning of "Footprint" and "Capabilities" in the CDNI context and what the "Footprint &amp; Capabilities Advertisement interface (FCI)" offers within CDNI.  The document also provides guidelines for the CDNI FCI protocol.  It further defines a Base Advertisement Object, the necessary registries for capabilities and footprints, and guidelines on how these registries can be extended in the future.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8008"/>
          <seriesInfo name="DOI" value="10.17487/RFC8008"/>
        </reference>
        <reference anchor="RFC8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Lopez" initials="D." surname="Lopez">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity.  However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise.  This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. López" initials="D." surname="López">
              <organization/>
            </author>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name).  The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time.  Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols.  Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation.  This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7336">
          <front>
            <title>Framework for Content Distribution Network Interconnection (CDNI)</title>
            <author fullname="L. Peterson" initials="L." surname="Peterson">
              <organization/>
            </author>
            <author fullname="B. Davie" initials="B." surname="Davie">
              <organization/>
            </author>
            <author fullname="R. van Brandenburg" initials="R." role="editor" surname="van Brandenburg">
              <organization/>
            </author>
            <date month="August" year="2014"/>
            <abstract>
              <t>This document presents a framework for Content Distribution Network Interconnection (CDNI).  The purpose of the framework is to provide an overall picture of the problem space of CDNI and to describe the relationships among the various components necessary to interconnect CDNs.  CDNI requires the specification of interfaces and mechanisms to address issues such as request routing, distribution metadata exchange, and logging information exchange across CDNs.  The intent of this document is to outline what each interface needs to accomplish and to describe how these interfaces and mechanisms fit together, while leaving their detailed specification to other documents.  This document, in combination with RFC 6707, obsoletes RFC 3466.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7336"/>
          <seriesInfo name="DOI" value="10.17487/RFC7336"/>
        </reference>
        <reference anchor="RFC7337">
          <front>
            <title>Content Distribution Network Interconnection (CDNI) Requirements</title>
            <author fullname="K. Leung" initials="K." role="editor" surname="Leung">
              <organization/>
            </author>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee">
              <organization/>
            </author>
            <date month="August" year="2014"/>
            <abstract>
              <t>Content delivery is frequently provided by specifically architected and provisioned Content Delivery Networks (CDNs).  As a result of significant growth in content delivered over IP networks, existing CDN providers are scaling up their infrastructure.  Many Network Service Providers (NSPs) and Enterprise Service Providers (ESPs) are also deploying their own CDNs.  To deliver contents from the Content Service Provider (CSP) to end users, the contents may traverse across multiple CDNs.  This creates a need for interconnecting (previously) standalone CDNs so that they can collectively act as a single delivery platform from the CSP to the end users.</t>
              <t>The goal of the present document is to outline the requirements for the solution and interfaces to be specified by the CDNI working group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7337"/>
          <seriesInfo name="DOI" value="10.17487/RFC7337"/>
        </reference>
        <reference anchor="RFC7975">
          <front>
            <title>Request Routing Redirection Interface for Content Delivery Network (CDN) Interconnection</title>
            <author fullname="B. Niven-Jenkins" initials="B." role="editor" surname="Niven-Jenkins">
              <organization/>
            </author>
            <author fullname="R. van Brandenburg" initials="R." role="editor" surname="van Brandenburg">
              <organization/>
            </author>
            <date month="October" year="2016"/>
            <abstract>
              <t>The Request Routing interface comprises (1) the asynchronous advertisement of footprint and capabilities by a downstream Content Delivery Network (CDN) that allows an upstream CDN to decide whether to redirect particular user requests to that downstream CDN; and (2) the synchronous operation of an upstream CDN requesting whether a downstream CDN is prepared to accept a user request and of a downstream CDN responding with how to actually redirect the user request.  This document describes an interface for the latter part, i.e., the CDNI Request Routing Redirection interface.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7975"/>
          <seriesInfo name="DOI" value="10.17487/RFC7975"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank authors of the <xref target="RFC9115"/>, Antonio Augustin Pastor Perales, Diego Lopez, Thomas Fossati and Yaron Sheffer. Additionally, our gratitude to Thomas Fossati who participated in the drafting, reviewing and giving his feedback in finalizing this document. We also thank CDNI co-chair Kevin Ma for his continual review and feedback during the development of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
