<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wing-settle-requirements-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Requirements for HTTPS for Local Domains">Requirements for HTTPS for Local Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wing-settle-requirements-00"/>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Citrix">Cloud Software Group, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Erik Nygren">
      <organization>Akamai Technologies</organization>
      <address>
        <email>erik+ietf@nygren.org</email>
        <uri>http://erik.nygren.org/</uri>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <keyword>https</keyword>
    <keyword>local domains</keyword>
    <keyword>pki</keyword>
    <keyword>pkix</keyword>
    <keyword>certificate authority</keyword>
    <keyword>tls</keyword>
    <keyword>identity</keyword>
    <keyword>authentication</keyword>
    <abstract>
      <?line 172?>

<t>When connecting to servers on their local network, users are
surprised to encounter user interfaces that display errors,
show insecure connections, and block some HTTP features
when missing a secure context.  However, obtaining PKIX
certificates for those servers is difficult for a variety
of reasons.</t>
      <t>This document explores requirements for authenticating local servers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/settle-requirements/draft-wing-settle-requirements.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wing-settle-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SETTLE  mailing list (<eref target="mailto:settle@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/settle/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/settle/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/settle-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <?line 183?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Servers on local networks have historically settled for
unencrypted communications -- printers, routers, network attached
storage (NAS).
However, with the advent of HTTPS everywhere <xref target="everywhere"/>, browsers disadvantage unencrypted
communications (e.g., <xref target="not-secure"/>, <xref target="sec-context"/>).
This increases importance of a secure context (HTTPS) to local domains.</t>
      <t>In addition, it is recognized that home networks are not (and perhaps have never been) the idyllic secure gardens that many think they are.
There are persistent threats in the home due to malware on devices within the home, as well as malware that might arrive on guest devices.
Most home networks have little protection against various kinds of (layer-2) spoofing attacks, which means that active on-path attacks (MITM) must be assumed.
Securing the administrative and regular connections within the home network would result in significant security gains for all devices in the home.</t>
      <t>Today, a secure context is obtained with a PKIX certificate (<xref target="RFC5280"/>)
signed by a Certification Authority (CA) that is trusted by the client.</t>
      <t>However, servers on a local network cannot easily get PKIX
certificates signed by a Certification Authority because: they are not directly reachable from the outside (due to firewall or NAPT), lack of domain name delegation, and need for ongoing certificate renewal.</t>
      <t>The problem has been well recognized since about 2017 and several
proposals have been suggested to solve this problem, each with their
own drawbacks.  This document is not intended to summarize these proposals
or their drawbacks; for that detail see the pointers to previous work
in <xref target="related"/>.  At a high level, the proposals have involved
solutions such as:</t>
      <ul spacing="normal">
        <li>
          <t>pre-shared secrets (scanned, printed, or displayed by the server)</t>
        </li>
        <li>
          <t>Public DNS pointing at local domain's IP address (e.g., <xref target="plex"/>)</t>
        </li>
        <li>
          <t>Local Certification Authority, where a CA is
added to client's certificate trust list and that CA signs
certificates for devices within the local network</t>
        </li>
        <li>
          <t>Trust On First Use (TOFU), where a user verifies the first
connection to a server and the client remembers that verification,
similar to common use of ssh</t>
        </li>
        <li>
          <t>WebRTC and WebTransport, where a PKI-signed server provides a
public key fingerprint of another server that it has previously
bootstrapped</t>
        </li>
        <li>
          <t>Encoding server's public key into the hostname <xref target="thomson-hld"/></t>
        </li>
      </ul>
      <t>This document explores IETF requirements for an alternative server
authentication system for local hosts.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="technical-requirements">
      <name>Technical Requirements</name>
      <t>The goal is to work out the engineering tradeoff around <xref target="zookotriangle"/>.
Specifically it says there are three aspects that must be traded off:</t>
      <ul spacing="normal">
        <li>
          <t>Human-meaningful</t>
        </li>
        <li>
          <t>Secure</t>
        </li>
        <li>
          <t>Decentralized</t>
        </li>
      </ul>
      <section anchor="naming">
        <name>Naming</name>
        <t>PKIX certificates are a centralized naming scheme derived from DNS.
These names have (the possibility of) having human-readable names.
But the most significant property is uniqueness -- each name has its own
identity and that identity can be proven.</t>
        <t>A system that does not rely on centralized naming lacks this inherient
uniqueness property.</t>
        <t>Without a centralized naming scheme, name collisions are possible and
likely.  For example, it is likely that many networks will have a
printer named, simply, "printer", much like many people might share a
common name such as "John".  Humans prefer simple, human-readable
names, but a strong identity cannot be created with such names.</t>
        <t>Two networks both have a printer named "printer", they are indistinguishable.
This would not be as much of a problem were personal devices not mobile.
A person's smartphone could easily visit my networks on which there is a device named "printer", and the user might well wish to actually use those printers.
At the time time, if those names are not secured, then a simple attack against the user is possible, leading to them printing to a malicious device.
Worse, if there are symmetric credentials (such as passwords) involved, then the user might well disclose their password to the attacker.
This would be unacceptable.</t>
        <ul empty="true">
          <li>
            <t>R-UNIQUE-NAME: The system <bcp14>MUST</bcp14> have a way to uniquely identify
  servers.</t>
          </li>
        </ul>
      </section>
      <section anchor="cryptographic-binding">
        <name>Cryptographic Binding</name>
        <t>A server's name has to be mapped to its cryptographic identity.</t>
        <ul empty="true">
          <li>
            <t>R-BINDING: The Web Origin <bcp14>MUST</bcp14> be cryptographically bound to one or
  more key pairs, where the private keying material is on the service
  endpoint and where an attacker without the private key(s) is unable
  to access any state associated with the Web Origin.</t>
          </li>
        </ul>
        <t>A client has to be able to validate the name maps to the cryptographic
identity.</t>
        <ul empty="true">
          <li>
            <t>R-VALIDATE: Clients <bcp14>MUST</bcp14> be able to cryptographically validate that
  the authenticating server matches the identity in the URI / Web
  Origin.</t>
          </li>
        </ul>
        <t>Web browsers and modern users both expect a URI.</t>
        <ul empty="true">
          <li>
            <t>R-URI: It <bcp14>MUST</bcp14> be possible to construct a URI that encapsulates a
  Web Origin and its cryptographically-bound identity information.</t>
          </li>
        </ul>
      </section>
      <section anchor="abstract-naming">
        <name>Abstract Naming</name>
        <t>Using IP addresses in names is problematic if the server's IP address
changes due to ISP renumbering or internal network DHCP server
reconfiguration.</t>
        <t>Given common NAT44 (NAPT), many many networks will share the same IPv4 addresses.</t>
        <ul empty="true">
          <li>
            <t>R-ABSTRACT: The solution <bcp14>SHOULD</bcp14> abstract names from IP addresses.</t>
          </li>
        </ul>
        <t>Any given name should be resolvable to a mixture of IPv4, IPv6
Link-Local (on an Interface), IPv6 ULA, and IPv6 Globally-Routable
addresses. Operating a local DNS is beyond the scope of many
administrators, so being able to advertise the server using
<xref target="DNS-SD"/> is necessary.</t>
        <ul empty="true">
          <li>
            <t>R-DNS-SD: The name <bcp14>MUST</bcp14> be advertisable using <xref target="DNS-SD"/></t>
          </li>
        </ul>
      </section>
      <section anchor="avoid-central-authority">
        <name>Avoid Central Authority</name>
        <t>A solution needs to be self-contained and not use the central
authority of PKIX.</t>
        <ul empty="true">
          <li>
            <t>R-AVOID-CENTRAL: A solution <bcp14>SHOULD NOT</bcp14> (<bcp14>MUST NOT</bcp14>?) rely on central
  trust hierarchy.</t>
          </li>
        </ul>
        <t>Vendors go out of business or lose interest in continuing to service
old products. The products may still be operational.</t>
        <ul empty="true">
          <li>
            <t>R-AVOID-VENDOR: A solution <bcp14>SHOULD NOT</bcp14> (<bcp14>MUST NOT</bcp14>?) have continued
  reliance on a service operated by a vendor, including if the device
  is reset to factory defaults (e.g., reset for troubleshotting or
  because sold).</t>
          </li>
        </ul>
      </section>
      <section anchor="multiple-application-protocols">
        <name>Multiple Application Protocols</name>
        <ul empty="true">
          <li>
            <t>R-HTTPS: A solution <bcp14>MUST</bcp14> support HTTPS.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>R-MULT-APP: A solution <bcp14>SHOULD</bcp14> support other application-level
  protocols such as IPPS <xref target="RFC7472"/>, DoT <xref target="RFC7858"/>, SMB over
  QUIC <xref target="smb-quic"/>, IMAP <xref target="RFC8314"/>, and SIP <xref target="RFC3261"/>, as
  those protocols are routinely served with a local domain.</t>
          </li>
        </ul>
      </section>
      <section anchor="cryptographic-agility">
        <name>Cryptographic Agility</name>
        <ul empty="true">
          <li>
            <t>R-AGILITY: A solution <bcp14>SHOULD</bcp14> support crypto agility (such as
  supporting more than one active key type).</t>
          </li>
        </ul>
      </section>
      <section anchor="tls-server-name-indication">
        <name>TLS Server Name Indication</name>
        <ul empty="true">
          <li>
            <t>R-TLS-SNI: A solution <bcp14>SHOULD</bcp14> support TLS SNI so a server knows which
key pair/cert is expected.</t>
          </li>
        </ul>
      </section>
      <section anchor="localhost">
        <name>Localhost</name>
        <ul empty="true">
          <li>
            <t>R-LOCALHOST: A solution <bcp14>SHOULD</bcp14> support "localhost" (e.g.,
for sending a user to connect to a local service)</t>
          </li>
        </ul>
      </section>
      <section anchor="w3c-private-network-access">
        <name>W3C Private Network Access</name>
        <ul empty="true">
          <li>
            <t>R-PNA: A solution <bcp14>SHOULD</bcp14> integrate well with an evolution of
<xref target="w3c-pna"/> and both allow for an improved model there but should also
provide more robust solutions to vulnerabilities that it tries to
address</t>
          </li>
        </ul>
      </section>
      <section anchor="constrain-to-local-resources">
        <name>Constrain to Local Resources</name>
        <ul empty="true">
          <li>
            <t>R-LOCAL: A solution <bcp14>SHOULD</bcp14> be constrained to .local and .internal.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discuss: <bcp14>MAY</bcp14> constrain to the DHCP domain-search value??  Should we
also allow any arbitrary name if the IP address is local (RFC1918
address), too?</t>
          </li>
        </ul>
      </section>
      <section anchor="operate-standalone">
        <name>Operate Standalone</name>
        <t>After configuration, the system needs to operate without a
connection to the Internet.  This is necessary because Internet
connectivity is sometimes flaky or unavailable (e.g., cabin in the
woods).</t>
        <ul empty="true">
          <li>
            <t>R-STANDALONE: <bcp14>MUST</bcp14> operate securely while Internet connectivity is
  unavailable.</t>
          </li>
        </ul>
      </section>
      <section anchor="miscellaneous">
        <name>Miscellaneous</name>
        <ol spacing="normal" type="1"><li>
            <t>It <bcp14>SHOULD</bcp14> be possible to have a way to represent a URI that
includes a single specific IP address and the cryptographic identity
of the service endpoint.</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t><bcp14>SHOULD</bcp14> support key rotation (even if via 301 redirect)</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Q: is it acceptable to state to be lost here?  Note: likely cannot
do 301 if doing TLS (HTTPS).  Is this suggestion to start HTTP and
upgrade to HTTPS?  Could be useful for HTTPS but redirect unavailable
for IPP, SMB, DoH.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t><bcp14>SHOULD</bcp14> support building trust relationships within devices in the
local environment</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Could this help with HTTPS access to Wi-Fi login portals
(<xref target="RFC8952"/>, <xref target="RFC8910"/>)?</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="human-factors-requirements">
      <name>Human Factors Requirements</name>
      <section anchor="discoverable">
        <name>Discoverable</name>
        <ul empty="true">
          <li>
            <t>R-DISCOVER: A solution <bcp14>SHOULD</bcp14> have a way to do discovery of
endpoints and their identities (for example, via <xref target="DNS-SD"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="easy-to-use">
        <name>Easy to Use</name>
        <ul empty="true">
          <li>
            <t>R-EASY: A solution <bcp14>SHOULD</bcp14> have human factors and adversarial testing
on proposed solutions to make sure that this solution provides a
reasonable experience to average and novice end-users and does not
introduce new security exploitation vectors</t>
          </li>
        </ul>
      </section>
      <section anchor="bookmarkable">
        <name>Bookmarkable</name>
        <ul empty="true">
          <li>
            <t>R-BOOKMARK: A solution <bcp14>SHOULD</bcp14> have a URI that users can Bookmark to create an association
to a friendly name.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discussion: Can URL bar of the browser honor mDNS/DNSSD advertised
names, or give a pull-down of them similar to how the "add printer"
dialog does for printers?  This would help ease the use of long FQDN
so it's almost as easy as router.local.  Especially if it could show a
nickname that is configured by the printer.</t>
          </li>
        </ul>
      </section>
      <section anchor="human-friendly-name">
        <name>Human-friendly Name</name>
        <ul empty="true">
          <li>
            <t>R-CONSISTENT: A solution <bcp14>SHOULD</bcp14> represent these URIs to humans in a
consistent, readable, and non-confusing fashion.  (In a browser,
users shouldn't see the key fingerprint by default but rather a
representation of its presence)</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="big-open-questions">
      <name>Big Open Questions</name>
      <section anchor="key-rotation">
        <name>Key Rotation</name>
        <ol spacing="normal" type="1"><li>
            <t>Is it acceptable for the Web Origin to change as part of key
rotations?  A: no, this does not happen today and changing the web
origin would violate the principle of least surprise.</t>
          </li>
        </ol>
      </section>
      <section anchor="trust-on-first-use-tofu">
        <name>Trust on First Use (TOFU)</name>
        <t>Is TOFU acceptable?</t>
        <ul empty="true">
          <li>
            <t>Note: TOFU is arguably what we have today with self-signed certificates
     which can be trusted (after the user accepts the warning message and
     adds the certificate to their client's trust store).</t>
          </li>
        </ul>
      </section>
      <section anchor="user-experience">
        <name>User Experience</name>
        <t>For a solution, what is the User Experience for any trust relationship / web-of-trust?</t>
      </section>
      <section anchor="trust-relationship">
        <name>Trust Relationship</name>
        <t>For a solution, what is the nature of the trust relationship?</t>
        <ul spacing="normal">
          <li>
            <t>Peer trust web?</t>
          </li>
          <li>
            <t>Central CA within the local environment / trust clearing house?</t>
          </li>
          <li>
            <t>Client establishes its own trust to the server</t>
          </li>
        </ul>
      </section>
      <section anchor="interaction-with-matterthread">
        <name>Interaction with Matter/Thread</name>
        <t>How does a solution tie into systems like Matter/Thread that have their own trust establishment frameworks?</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>For the below, "Secure communications" means being able to make a TLS
connection to a service such that the service is able to authenticate
itself in a way to prevent MitM attacks.  The security model must be
TOFU at a minimum, but when the identity of a service is none it
should be possible to send it as a URI in such as a way to present a
secure association rooted in the connection that sent it:</t>
      <ul spacing="normal">
        <li>
          <t>Secure communications via HTTPS to admin interfaces on CPEs for
both initial and ongoing configuration tasks of various servers
(router, printer, NAS, etc.).</t>
        </li>
        <li>
          <t>Secure communications to DoH/DoT servers on CPEs</t>
        </li>
        <li>
          <t>Secure communications to printers (IPPS <xref target="RFC7472"/> printing)</t>
        </li>
        <li>
          <t>Secure communications to other local services (SMB over QUIC to
another workstation or a NAS) and IoT devices</t>
        </li>
        <li>
          <t>Secure communications to localhost processes from a browser (e.g.,
admin tools)</t>
        </li>
      </ul>
    </section>
    <section anchor="related">
      <name>Related</name>
      <t>Martin Thomson wrote a document on HTTPS for Local Domains which covers requirements,
discusses several solutions and their tradeoffs, and suggests a solution with hostnames
encoding the server's public key <xref target="thomson-hld"/> in November 2017.</t>
      <t>W3C worked on this problem from 2017 through 2021 <xref target="w3c-httpslocal"/>. More recently,
W3C had a workshop on the problem in September 2024 <xref target="tpac"/>.</t>
      <t>The boundaries of a limited domain -- such as the local domain described in this
document -- are explored in <xref section="6" sectionFormat="of" target="RFC8799"/>.</t>
      <t>The IOTOPS working group and the associated IOT Security Foundation
<xref target="iotsf"/> discussed the problem and some requirements in their white
paper <xref target="iotops-suib"/> and presentation to IOTOPS working group at
IETF112 <xref target="iotops-suib-prezo"/>.</t>
      <t>A threshold key system is described and implemented at <xref target="phb-mesh"/> with the following
description:</t>
      <ul empty="true">
        <li>
          <t>The Mesh is designed to provide users with the highest level of
  security that is possible without asking them to do anything at
  all. For this to become possible, the Mesh will have to be shipped
  to users as part of the machine Operating System.</t>
        </li>
      </ul>
      <t>A summary of the problem and analysis of several solutions
(Locally-installed CAs, Plex, WebRTC and WebTransport, TOFU, shared
secrets) and some drawbacks of those solutions is at <xref target="stark"/>.</t>
      <t>A method using PAKE and a shared secret (displayed on the server) is
explained at <xref target="shared"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="thomson-hld" target="https://docs.google.com/document/u/0/d/170rFC91jqvpFrKIqG4K8Vox8AL4LeQXzfikBQXYPmzU/edit">
          <front>
            <title>HTTPS for Local Domains</title>
            <author initials="M." surname="Thomson" fullname="Martin Thomson">
              <organization/>
            </author>
            <date year="2017" month="September"/>
          </front>
        </reference>
        <reference anchor="tpac" target="https://github.com/w3c/tpac2024-breakouts/issues/78">
          <front>
            <title>HTTPS for Local Networks</title>
            <author initials="C." surname="IL" fullname="Carlos IL">
              <organization>W3C</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="phb-mesh" target="https://github.com/hallambaker/Mathematical-Mesh">
          <front>
            <title>Mathematical Mesh</title>
            <author initials="P." surname="Hallam-Baker" fullname="Phillip Hallam-Baker">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="zookotriangle" target="https://en.wikipedia.org/wiki/Zooko%27s_triangle">
          <front>
            <title>Zooko's triangle</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="iotops-suib-prezo" target="https://datatracker.ietf.org/meeting/112/materials/slides-112-iotops-suib-browsing-local-web-resources-in-a-secure-usable-manner-iot-device-configuration-as-a-special-case-00.pdf">
          <front>
            <title>SUIB: Browsing local web resources in a secure usable manner</title>
            <author initials="J." surname="Geertsma" fullname="Jan Geertsma">
              <organization/>
            </author>
            <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
              <organization/>
            </author>
            <author initials="M." surname="Richardson" fullname="Micheal Richardson">
              <organization/>
            </author>
            <author initials="N." surname="Allott" fullname="Nick Allott">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
          <annotation>Presentation of IOT Security Foundation SUIB to IETF112 IOTOPS working group</annotation>
        </reference>
        <reference anchor="iotops-suib" target="https://iotsecurityfoundation.org/wp-content/uploads/2021/08/ManySecured-SUIB-White-Paper.pdf">
          <front>
            <title>SUIB: Router and IoT Vulnerabilities: Insecure by Design</title>
            <author>
              <organization>IOT Security Foundation</organization>
            </author>
            <date year="2021" month="August"/>
          </front>
        </reference>
        <reference anchor="iotsf" target="https://iotsecurityfoundation.org">
          <front>
            <title>IOT Security Foundation</title>
            <author>
              <organization/>
            </author>
            <date year="2015" month="September"/>
          </front>
        </reference>
        <reference anchor="stark" target="https://emilymstark.com/2021/12/24/when-a-web-pki-certificate-wont-cut-it.html">
          <front>
            <title>When a web PKI certificate won't cut it</title>
            <author initials="E. M." surname="Stark" fullname="Emily M. Stark">
              <organization/>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="shared" target="https://httpslocal.github.io/proposals/#approach-2">
          <front>
            <title>APPROACH-2: Using Shared Secret</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="plex" target="https://words.filippo.io/how-plex-is-doing-https-for-all-its-users/">
          <front>
            <title>How Plex Is Doing Https for All Its Users</title>
            <author initials="F." surname="Valsorda" fullname="Filippo Valsorda">
              <organization/>
            </author>
            <date year="2015" month="June"/>
          </front>
        </reference>
        <reference anchor="w3c-httpslocal" target="https://github.com/httpslocal">
          <front>
            <title>HTTPS in Local Network Community Group</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="w3c-pna" target="https://wicg.github.io/private-network-access/">
          <front>
            <title>Private Network Access</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="sec-context" target="https://w3c.github.io/webappsec-secure-contexts/">
          <front>
            <title>Secure Contexts</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="not-secure" target="https://blog.chromium.org/2018/02/a-secure-web-is-here-to-stay.html">
          <front>
            <title>A secure web is here to stay</title>
            <author>
              <organization>Google</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="smb-quic" target="https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-over-quic">
          <front>
            <title>SMB over QUIC</title>
            <author>
              <organization>Microsoft</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="everywhere" target="https://www.eff.org/https-everywhere">
          <front>
            <title>HTTPS Everywhere</title>
            <author>
              <organization>EFF</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="DNS-SD">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC7472">
          <front>
            <title>Internet Printing Protocol (IPP) over HTTPS Transport Binding and the 'ipps' URI Scheme</title>
            <author fullname="I. McDonald" initials="I." surname="McDonald"/>
            <author fullname="M. Sweet" initials="M." surname="Sweet"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document defines the Internet Printing Protocol (IPP) over HTTPS transport binding and the corresponding 'ipps' URI scheme, which is used to designate the access to the network location of a secure IPP print service or a network resource managed by such a service.</t>
              <t>This document defines an alternate IPP transport binding to that defined in the original IPP URL Scheme (RFC 3510), but this document does not update or obsolete RFC 3510.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7472"/>
          <seriesInfo name="DOI" value="10.17487/RFC7472"/>
        </reference>
        <reference anchor="RFC7858" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8314">
          <front>
            <title>Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access</title>
            <author fullname="K. Moore" initials="K." surname="Moore"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This specification outlines current recommendations for the use of Transport Layer Security (TLS) to provide confidentiality of email traffic between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server. This document updates RFCs 1939, 2595, 3501, 5068, 6186, and 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8314"/>
          <seriesInfo name="DOI" value="10.17487/RFC8314"/>
        </reference>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC8910">
          <front>
            <title>Captive-Portal Identification in DHCP and Router Advertisements (RAs)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>In many environments offering short-term or temporary Internet access (such as coffee shops), it is common to start new connections in a captive portal mode. This highly restricts what the user can do until the user has satisfied the captive portal conditions.</t>
              <t>This document describes a DHCPv4 and DHCPv6 option and a Router Advertisement (RA) option to inform clients that they are behind some sort of captive portal enforcement device, and that they will need to satisfy the Captive Portal conditions to get Internet access. It is not a full solution to address all of the issues that clients may have with captive portals; it is designed to be one component of a standardized approach for hosts to interact with such portals. While this document defines how the network operator may convey the captive portal API endpoint to hosts, the specific methods of satisfying and interacting with the captive portal are out of scope of this document.</t>
              <t>This document replaces RFC 7710, which used DHCP code point 160. Due to a conflict, this document specifies 114. Consequently, this document also updates RFC 3679.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8910"/>
          <seriesInfo name="DOI" value="10.17487/RFC8910"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
      </references>
    </references>
    <?line 570?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
