<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dance-architecture-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="DNS-Bound Identities Architecture">An Architecture for DNS-Bound Client and Sender Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dance-architecture-01"/>
    <author initials="A." surname="Wilson" fullname="Ash Wilson">
      <organization>Valimail</organization>
      <address>
        <email>ash.d.wilson@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Huque" fullname="Shumon Huque">
      <organization>Salesforce</organization>
      <address>
        <email>shuque@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Johansson" fullname="Olle Johansson">
      <organization>Edvina.net</organization>
      <address>
        <email>oej@edvina.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2023" month="January" day="23"/>
    <area>Internet</area>
    <workgroup>DANCE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This architecture document defines terminology, interaction, and authentication patterns,
related to the use of DANE DNS records for TLS client and messaging peer identity,
within the context of existing object security and TLS-based protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    DANE Authentication for Network Clients Everywhere Working Group mailing list (dance@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dance/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ashdwilson/draft-dance-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A digital identity, in an abstract sense, possesses at least two features: an identifier (or name),
and a means of proving ownership of the identifier.
One of the most resilient mechanisms for tying an identifier to a method for proving ownership of
the identifier is the digital certificate, issued by a well-run Certification Authority (CA).
The CA acts as a mutually trusted third party, a root of trust.</t>
      <t>Certificate-based identities are limited in scope by the issuing CA, or by the namespace of the
application responsible for issuing or validating the identity.</t>
      <t>An example of this limitation is well-illustrated by organizational Public Key Infrastructure (PKI).
Organizational PKI is very often coupled with email and LDAP systems, and can be used for associating
a human or machine identity identifier with a public key.
Within the organization, authentication systems already agree on the roots of trust for validating entity certificates issued by organizational PKI.</t>
      <t>Attempting to use organizational PKI outside the organization can be challenging.
In order to authenticate a certificate, the certificate's CA must be trusted.
CAs have no way of controlling identifiers in certificates issued by other CAs.
Consequently, trusting multiple CAs at the same time can enable entity identifier collisions.
Asking an entity to trust your CA implies trust in anything that your CA signs.
This is why many organizations operate a private CA, and require devices connecting to the
organization's networks or applications to possess certificates issued by the organization's CA.</t>
      <t>These limitations make the implementation and ongoing maintenance of a PKI costly, and have a
chilling effect on the broader adoption of certificate-based IoT device identity.
If certificate-based device identity were easier to manage, more broadly trusted, and less
operationally expensive, more organizations and applications would be able to use it.</t>
      <t>The lack of trust between PKI domains has lead to a lack of simple and globally scalable solutions
for secure end-to-end inter-domain communication between entities, such as SIP phones, email and
chat accounts and IoT devices belonging to different organizations.</t>
      <t>DANCE seeks to make PKI-based IoT device identity universally discoverable, more broadly recognized,
and less expensive to maintain by using DNS as the constraining namespace and lookup mechanism.
DANCE builds on patterns established by the original DANE RFCs to enable client and sending entity
certificate, public key, and trust anchor discovery.
DANCE allows entities to possess a first-class identity, which, thanks to DNS, may be trusted by any
application also trusting the DNS.
A first-class identity is an application-independent identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t><strong>This section will be interesting to define. We have great examples of identity terminology in the https://datatracker.ietf.org/doc/html/draft-sarikaya-t2trg-sbootstrapping-06 document, but this document also admits that there is semantic drift on terms like "bootstrapping", depending on who's talking.</strong></t>
      <t><strong>How to Dance with ENTITY:</strong> This architecture document delegates many details of how DANCE can be used with some specific protocol to a document with the names "How to Dance with <em>entity</em>".</t>
      <t><strong>Identity provisioning:</strong> This refers to the set of tasks required to securely provision an asymmetric
key pair for the device, sign the certificate (if the public credential is not simply a raw public key),
and publish the public key or certificate in DNS. Under some circumstances, these steps are not all performed
by the same party or organization. A manufacturer may instantiate the key pair, and a systems integrator may
be responsible for issuing (and publishing) the device certificate in DNS. In some circumstances,
a manufacturer may also publish device identity records in DNS. In this case, the system integrator needs
to perform network and application access configuration, since the identity already exists in DNS.</t>
      <t><strong>DANCEr:</strong> A DANCEr is the term which is used to describe a protocol that has been taught to use DANE,
usually through a <em>How to Dance with</em> document.</t>
      <t><strong>Identity provisioning:</strong> This refers to the set of tasks required to securely provision an asymmetric
key pair for the device, sign the certificate (if the public credential is not simply a raw public key),
and publish the public key or certificate in DNS.
Under some circumstances, these steps are not all performed by the same party or organization.
A manufacturer may instantiate the key pair, and a systems integrator may be responsible for issuing (and publishing) the device certificate in DNS.
In some circumstances, a manufacturer may also publish device identity records in DNS.
In this case, the system integrator needs to perform network and application access configuration, since the identity already exists in DNS.</t>
      <t><strong>Security Domain:</strong> DNS-bound client identity allows the device to establish secure communications with
any server with a DNS-bound identity, as long as a network path exists, the entity is configured to trust
its communicating peer by name, and agreement on protocols can be achieved.
The act of joining a security domain, in the past, may have involved certificate provisioning.
Now, it can be as simple as using a manufacturer-provisioned identity to join the device to the network and application.
[Is the security domain defined by how broadly the identity is recognized, or by the breadth of the application or network access policy?]</t>
      <t><strong>Client:</strong> This architecture document adopts the definition of "Client" from RFC 8446: "The endpoint initiating the TLS connection"</t>
      <t><strong>Server:</strong> This architecture document adopts the definition of "Server" from RFC 8446: "The endpoint that did not initiate the TLS connection"</t>
      <t><strong>Sending agent:</strong> Software which encodes and transmits messages.
A sending agent may perform tasks related to generating cryptographic signatures and/or encrypting messages before transmission.</t>
      <t><strong>Receiving agent:</strong> Software which interprets and processes messages.
A receiving agent may perform tasks related to the decryption of messages, and verification of message signatures.</t>
      <t><strong>Store-and-forward system:</strong> A message handling system in-path between the sending agent and the receiving agent.</t>
      <t><strong>Hardware supplier role:</strong> The entity which manufactures or assembles the physical device.
In many situations, multiple hardware suppliers are involved in producing a given device.
In some cases, the hardware supplier may provision an asymmetric key pair for the device and establish the device identity in DNS.
In some cases, the hardware supplier may ship a device with software pre-installed.</t>
      <t><strong>Systems integrator:</strong> The party responsible for configuration and deployment of application components.
In some cases, the systems integrator also installs the software onto the device, and may provision the device identity in DNS.</t>
      <t><strong>Consumer:</strong> The entity or organization which pays for the value provided by the application, and defines the success criteria for the output of the application.</t>
    </section>
    <section anchor="communication-patterns">
      <name>Communication Patterns</name>
      <section anchor="clientserver">
        <name>Client/Server</name>
        <t>Client/server communication patterns imply a direct connection between an entity which provides a service (the server), and an entity which initiates a connection to the server, called a client.
A secure implementation of this pattern includes a TLS-protected session directly between the client and the server.
A secure implementation may also include public key-based mutual authentication.</t>
        <t>Extending DANE to include client identity allows the server to authenticate clients independent of the private PKI used to issue the client certificate.
This reduces the complexity of managing the CA certificate collection, and mitigates the possibility of client identifier collision.</t>
      </section>
      <section anchor="peer2peer">
        <name>Peer2peer</name>
        <t>The extension also allows an application to find an application identity and set up a secure communication channel directly.
This pattern can be used in mesh networking, IoT and in many communication protocols for multimedia sessions, chat and messaging.</t>
      </section>
      <section anchor="decoupled">
        <name>Decoupled</name>
        <t>Decoupled architecture, frequently incorporating store-and-forward systems, provides no direct connection between the producer and consumer of information.
The producer (or sending agent) and consumer (or receiving agent) are typically separated by at least one layer of messaging-oriented middleware.
The Messaging-oriented middleware components may act as a server for the purpose of establishing TLS sessions for the producer and consumer.
This allows the assertion of identity between the middleware and sending agent, and the middleware and receiving agent.
The trust relationship between the sending agent and receiving agent is based on the presumed trustworthiness of the middleware, unless an identity can be attached to the message itself, independent of transport and middleware components.</t>
        <t>Within many existing store-and-forward protocols, certificates may be transmitted within the signed message itself.
An example of this is S/MIME.
Within IoT applications, we find that networks may be more constrained.
Including certificates in message payloads can present an unnecessary overhead on constrained network links.
Decoupled applications benefit from an out-of-band public key discovery mechanism, which may enable the retrieval of certificates only when needed, and sometimes using a less expensive network connection.</t>
      </section>
    </section>
    <section anchor="client-authentication">
      <name>Client authentication</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>The client sets up a TLS connection to a server, attaches a client certificate with a subjectAltName dNSName indicating the name of the client.
In the TLS connection the DANE-client-id extension is used to tell the server to use the certificate dNSName to find a DANE record including the public key of the certificate to be able to validate.
If the server can validate the DNSSEC response, the server validates the certificate and completes the TLS connection setup.</t>
        <t>Using DNS to convey certificate information for authenticating TLS clients gives a not-yet-authenticated client the ability to trigger a DNS lookup on the server side of the TLS connection.
An opportunity for DDOS may exist when malicious clients can trigger arbitrary DNS lookups.
For instance, an authoritative DNS server which has been configured to respond slowly, may cause a high concurrency of in-flight TLS authentication processes as well as open connections to upstream resolvers.
This sort of attack (of type slowloris) could have a performance or availability impact on the TLS server.</t>
        <section anchor="example-1-tls-authentication-for-https-api-interaction-dane-preauthorization">
          <name>Example 1: TLS authentication for HTTPS API interaction, DANE preauthorization</name>
          <ul spacing="normal">
            <li>The client initiates a TLS connection to the server.</li>
            <li>The TLS server compares the dane_clientid (conveyed via the DANE Client Identity extension) to a list of allowed client domains.</li>
            <li>If the dane_clientid is allowed, the TLS server then performs a DNS lookup for the client's TLSA record.
If the dane_clientid is not allowed, authentication fails.</li>
            <li>If the client's TLSA record matches the presented certificate or public key, the TLS handshake completes successfully and the authenticated dane_clientid is presented to the web application in the (TBD) header field.</li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>This pattern translates well to TLS/TCP load balancers, by using a TCP TLV instead of an HTTP header.</li>
            <li>No traffic reaches the application behind the load balancer unless DANE client authentication is successful.</li>
          </ul>
          <section anchor="example-2-tls-authentication-for-https-api-interaction-dane-matching-in-web-application">
            <name>Example 2: TLS authentication for HTTPS API interaction, DANE matching in web application</name>
            <ul spacing="normal">
              <li>The client initiates a TLS connection to the server.</li>
              <li>The TLS server accepts any certificate for which the client can prove possession of the corresponding private key.</li>
              <li>The TLS server passes the certificate to the web application in (TBD) header field.</li>
              <li>The HTTP request body contains the dane_clientid, and is passed to the web application.</li>
              <li>The web application compares the dane_clientid to a list of allowed clients or client domains.</li>
              <li>If the dane_clientid is allowed, the web application makes the DNS query for the TLSA records for dane_clientid</li>
              <li>If the presented certificate (which was authenticated by the TLS server) matches at least one TLSA record for dane_clientid, authentication succeeds.</li>
            </ul>
            <t>This pattern has the following advantages:</t>
            <ul spacing="normal">
              <li>In a web application where a TLS-terminating load balancer sits in front of a web application, the authentication logic in the load balancer remains simple.</li>
              <li>The web application ultimately decides whether to make the DNS query to support DANE authentication.
This allows the web application to reject clients with identifiers which are not allowed, before making a DNS query for TLSA retrieval and comparison.
No need to manage an allow-list in the load balancer.</li>
              <li>This can be implemented with no changes to the TLS handshake.</li>
            </ul>
          </section>
        </section>
        <section anchor="iot-device-to-cloud">
          <name>IoT: Device to cloud</name>
          <t>Direct device-to-cloud communication is common in simple IoT applications.
Authentication in these applications is usually accomplished using shared credentials like API keys, or using client certificates.
Client certificate authentication frequently requires the consumer to maintain a CA.
The CA trust anchor certificate is installed into the cloud application, and used in the TLS authentication process.</t>
          <t>Using DANE for device identity can allow parties other than the implementer to operate the CA.
A hardware manufacturer can provide a pre-established identity, with the certificate or public key already published in DNS.
This makes PKI-based identity more approachable for small organizations which currently lack the resources to operate an organizational CA.</t>
        </section>
        <section anchor="lorawan">
          <name>LoRaWAN</name>
          <t>For the end-device onboarding in LoRaWAN, the "network server" and the "join server" <xref target="RFC8376"/> needs to establish mutual TLS authentication in order to exchange configuration parameters.
Certificate Authority based mutual TLS authentication doesn't work in LoRaWAN due to the non availability of the CA trust store in the LoRaWAN network stack.
Self-signed certificate based mutual-TLS authentication method is the alternative solution.</t>
          <t>DANE based client identity allows the server to authenticate clients during the TLS handhsake.
Thus, independent of the private PKI used to issue the client's self-signed certificate, the "network server" and the "join server" could be mutually authenticated.</t>
        </section>
        <section anchor="edge-computing">
          <name>Edge Computing</name>
          <t><eref target="Edge Computing">https://datatracker.ietf.org/doc/html/draft-hong-t2trg-iot-edge-computing-01</eref> may require devices to mutually authenticate in the field.
A practical example of this pattern is the edge computing in construction use case [https://datatracker.ietf.org/doc/html/draft-hong-t2trg-iot-edge-computing-01#section-6.2.1].
Using traditional certificate-based identity, the sensor and the gateway may have certificates issued by
the same organizational PKI.
By using DANE for client and sender identity, the sensor and the gateway may have identities represented
by the equipment supplier, and still be able to mutually authenticate.
Important sensor measurements forwarded by the gateway to the cloud may bear the DNS name and signature of
the originating sensor, and the cloud application may authenticate the measurement independent of the gateway
which forwarded the information to the application.</t>
        </section>
        <section anchor="sip-and-webrtc-inter-domain-privacy">
          <name>SIP and WebRTC inter-domain privacy</name>
          <t>End to end security in SIP is currently based on a classical S/MIME model which has not received much implementation.
There are also SIP standards that build upon a trust chained anchored on the HTTP trust chain (SIP identity, STIR).
WebRTC has a trust model between the web browser and the servers using TLS, but no inter-domain trust infrastructure.
WebRTC lacks a definition of namespace to map to DNS, where SIP is based on an email-style addressing scheme.
For WebRTC the application developer needs to define the name space and mapping to DNS.</t>
          <t>By using DNS as a shared root of trust SIP and WebRTC end points can anchor the keys used for DTLS/SRTP media channel setup.
In addition, SIP devices can establish security in the SIP messaging by using DNS to find the callee's and the callers digital identity.</t>
          <t><xref target="I-D.johansson-sipcore-dane-sip"/>(SIPDANE)</t>
        </section>
        <section anchor="dns-over-tls-client-authentication">
          <name>DNS over TLS client authentication</name>
          <t>Issue #7</t>
        </section>
        <section anchor="smtp-starttls">
          <name>SMTP, STARTTLS</name>
          <t>Issue #8</t>
        </section>
        <section anchor="ssh-client">
          <name>SSH client</name>
          <t>SSH servers have for some time been able to put their host keys into DNS using <xref target="RFC4255"/>.</t>
          <t>In many SSH server implementations the list of users that is authorized to login to an account is given by listing their public keys in a per-user file ("authorized_keys").
The file provides both authorization (who may login), and authentication (how they prove their identity).
While this is an implementation detail, doing both in one place has been one of Secure Shell's major reason for success.</t>
          <t>However, there are downsides to this: a user can not easily replace their key without visiting every host they are authorized to access and update the key on that host.
Separation of authorization and authentication in this case would involve putting the key material in a third place, such as in a DANE record in DNS, and then listing only the DNS name in the authorization file:</t>
          <ul spacing="normal">
            <li>A user who wants to update their key need only update DNS in that case.</li>
            <li>A user who has lost access to their key, but can still update DNS (or can have a colleague update it) would more easily be able to recover.</li>
            <li>An administrator who controls the domain would be able to remove a departing user's key from DNS, preventing the user from authenticating in the future.</li>
          </ul>
          <t>The DNS record used could be TLSA, but it is possible with some protocol work that it could instead be SSHFP.</t>
        </section>
        <section anchor="network-access">
          <name>Network Access</name>
          <t>Network access refers to an authentication process by which a node is admitted securely onto network infrastructure.
This is most common for wireless networks (wifi, 802.15.4), but has also routine been done for wired infrastructure using 802.1X mechanisms with EAPOL.</t>
          <t>While there are EAP protocols that do not involve certificates, such as EAPSIM (<xref target="RFC4186"/>, the use of symmetric key mechanisms as the "network key" is common in many homes.
The use of certificate based mechanisms are expected to increase, due to challenges, such as Randomized and Changing MAC addresses (RCM), as described in <xref target="I-D.ietf-madinas-use-cases"/>.</t>
          <section anchor="eap-tls-with-radius">
            <name>EAP-TLS with RADIUS</name>
            <t>Enterprise EAP methods use a version of TLS to form a secure transport.
Client and server-side certificates are used as credentials.
EAP-TLS does not run over TCP, but rather over a reliable transport provided by EAP.
To keep it simple the EAP "window" is always one, and there are various amounts of overhead that needs to be accounted for, and the EAP segment size is often noticeably smaller than the normal ethernet 1500 bytes.
<xref target="RFC3748"/> does guarantee a minimum payload of 1020 bytes.</t>
            <t>The client side certificates are often larger than 1500 bytes and can take two or three round trip times to transport from the supplicant to the authenticator.
In worst case scenarios, which are common with eduroam <xref target="RFC7593"/>, the EAP packets are transported some distance, easily across the entire planet.
The authenticating system (the "authentication server" in EAP terms) is a system at the institute that issued the client side certificate, and so already has access to the entire client certificate.
Transferring the client certificate is redundant.
That is, the authenticator already has access to the entire certificate, but the client does not know this to tbe case, so it sends the entire certificate anyway.</t>
            <t>The use of DANE Client IDs in TLS as described in <xref target="I-D.ietf-dance-tls-clientid"/> reduces the redundant bytes of certificate sent.</t>
            <section anchor="terminology">
              <name>Terminology</name>
              <t><strong>Supplicant:</strong> The entity which acts as the TLS client in the EAP-TLS authentication protocol.
This term is defined in IEEE 802.1x.
The suppliant acts as a client in the EAPOL (EAP over LAN) protocol, which is terminated at the authenticator (defined below).</t>
              <t><strong>Authentication server:</strong> The entity which acts as the TLS server in the EAP-TLS protocol.
RADIUS (RFC 2865) is a frequently-used authentication server protocol.</t>
              <t><strong>Authenticator:</strong> The authenticator is the device which acts as a server the EAPOL (EAP over LAN) protocol, and is a client of the authentication server.
The authenticator is responsible for passing EAP messages between the supplicant and the authentication server, and for ensuring that only authenticated supplicants gain access to the network.</t>
              <t><eref target="EAP-TLS">https://datatracker.ietf.org/doc/html/rfc5216</eref> is a mature and widely-used protocol for network authentication, for IoT and IT equipment.
IEEE 802.1x defines the encapsulation of EAP over LAN access technologies, like IEEE 802.11 wireless and IEEE 802.3 ethernet.
RADIUS is a protocol and server technology frequently used for supporting the server side of EAP-TLS authentication.
Guidance for implementing RADIUS strongly encourages the use of a single common CA for all supplicants, to mitigate the possibility of identifier collisions across PKIs.
The use of DANE for client identity can allow the safe use of any number of CAs.
DNS acts as a constraining namespace, which prevents two unrelated CAs from issuing valid certificates bearing the same identifier.
Certificates represented in DNS are valid, and all others are un-trusted.</t>
            </section>
          </section>
          <section anchor="radsec">
            <name>RADSEC</name>
            <t>The RADIUS protocol has a few recognized security problems.
<eref target="RADSEC">https://datatracker.ietf.org/doc/html/rfc6614</eref> addresses the challenges related to the weakness of MD5-based authentication and confidentiality over untrusted networks by establishing a TLS session between the RADIUS protocol client and the RADIUS protocol server.
RADIUS datagrams are then transmitted between the authenticator and authentication server within the TLS session.
Updating the RADSEC standard to include the use of DANE for client and server identity would allow a RADIUS server and client to mutually authenticate, independent of the client's and server's issuing CAs.
The benefit for this use case is that a hosted RADIUS service may mutually authenticate any client device, like a WiFi access point or ethernet switch, via RADSEC, without requiring the distribution of CA certificates.</t>
          </section>
        </section>
      </section>
      <section anchor="object-security">
        <name>Object Security</name>
        <t>Issue #13</t>
        <section anchor="structured-data-messages-josecose">
          <name>Structured data messages: JOSE/COSE</name>
          <t>JOSE and COSE provide formats for exchanging authenticated and encrypted structured data. JOSE defines the x5u field in <xref section="4.1.5" sectionFormat="comma" target="RFC7515"/>, and COSE defines a field of the same name in <xref section="2" sectionFormat="comma" target="I-D.ietf-cose-x509"/>.</t>
          <t>However, this URL field points to where the key can be found.
There is, as yet, no URI scheme which says that the key can be found via the DNS lookup itself.</t>
          <t>In order to make use of x5u, a DANCEr would have to define a new URI scheme that explained how to get the right key from DNS.
(Open Issue #22, about <xref target="RFC4501"/>)</t>
        </section>
      </section>
      <section anchor="operational-anomaly-reporting">
        <name>Operational anomaly reporting</name>
        <t>Issue #14</t>
        <section anchor="mud-reporting-for-improper-provisioning">
          <name>MUD reporting for improper provisioning</name>
        </section>
        <section anchor="xarf-for-abuse-reporting">
          <name>XARF for abuse reporting</name>
        </section>
      </section>
      <section anchor="adjacent-ecosystem-components">
        <name>Adjacent Ecosystem Components</name>
        <section anchor="certification-authority">
          <name>Certification Authority</name>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>DNS clients should use DNS over TLS with trusted DNS resolvers to protect the identity of authenticating peers.</t>
      </section>
      <section anchor="integrity">
        <name>Integrity</name>
        <t>The integrity of public keys represented in DNS is most important.
An altered public key can enable device impersonation, and the denial of existence for a valid identity can cause devices to become un-trusted by the network or the application.
DNS records should be validated by the DNS stub resolver, using the DNSSEC protocol.</t>
        <t>Compartmentalizing failure domains within an application is a well-known architectural best practice.
Within the context of protecting DNS-based identities, this compartmentalization may manifest by hosting an identity zone on a DNS server which only supports the resource record types essential for representing device identities.
This can prevent a compromised identity zone DNS server from presenting records essential for impersonating web sites under the organization's domain name.</t>
        <t>The naming pattern suggested in <eref target="https://datatracker.ietf.org/doc/html/draft-huque-dane-client-cert">https://datatracker.ietf.org/doc/html/draft-huque-dane-client-cert</eref> includes
an underscore label (_device) which also prevents the issuance of Web PKI-validating certificates in the
event a DNS server hosting a client identity zone, which is capable of presenting A and AAAA records, is compromised.</t>
      </section>
      <section anchor="availability">
        <name>Availability</name>
        <t>One of the advantages of DNS is that it has more than fourty years of demonstrated scaling.
It is a distributed database with a caching mechanism, and properly configured, it has proven resilient
to many kinds of outages and attacks.</t>
        <t>A key part of this availability is the proper use of Time To Live (TTL) values for resource records.
A cache is allowed to hang on to the data for a set time, the TTL, after which it must do a new query to find out if the data has changed, or perhaps been deleted.</t>
        <t>There is therefore a tension between resilience (higher TTL values), and agility (lower TTL values).
A lower TTL value allows for revocation or replacement of a key to become known much faster.
This allows for a more agile security posture.</t>
        <t>On the other hand, lower TTLs cause the queries to occur more often, which may reveal more information to an observer about which devices are active.
Encrypted transports like DoT/DoH/DoQ make these queries far less visible.
In addition to the on-path observer being able to see more, the resolver logs also may be a source of information.
It also allows for more opportunities for an attacker to affect the response time of the queries.</t>
      </section>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>If the name of the identity proven by a certificate is directly or indirectly relatable to a person, privacy needs to be considered when forming the name of the DNS resource record for the certificate.
When creating the name of the RR, effects of DNS zone walking and possible harvesting of identities in the DNS zone will have to be considered.
The name of the RR may note have to have a direct relation to the name of the subject of the certificate.</t>
        <t>Further work has do be done in this area.</t>
        <t>AW: Consider if an approach like the email local-part hashing used in SMIMEA <eref target="https://datatracker.ietf.org/doc/html/rfc8162">https://datatracker.ietf.org/doc/html/rfc8162</eref> might work for this.
If the identifier/local-part is hashed and the certificate association is a SHA256 or SHA512 hash, the effort required to walk a zone would not produce much useful information.</t>
        <section anchor="dns-scalability">
          <name>DNS Scalability</name>
          <t>In the use case for IoT an implementation must be scalable to a large amount of devices.
In many cases, identities may also be very short lived as revocation is performed by simply removing a DNS record.
A zone will have to manage a large amount of changes as devices are constantly added and de-activated.</t>
          <t>In these cases it is important to consider the architecture of the DNS zone and when possible use a tree-like structure with many subdomain parts, much like reverse DNS records or how telephone numbers are represented in the ENUM standard (RFC 6116).</t>
          <t>If an authoritative resolver were configured to respond quite slowly (think slow loris [XXXrefereceXXX]), is it possible to cause a DoS on the TLS server via complete exhaustion of TCP connections?</t>
          <t>The availability of a client identity zone is essential to permitting clients to authenticate.
If the DNS infrastructure hosting client identities becomes unavailable, then the clients represented by that zone cannot be authenticated.</t>
          <t><strong>OEJ: We may want to have a discussion with the IETF DNS directorate. The scalability section above is from a discussion with one of the members...</strong></t>
        </section>
        <section anchor="change-of-ownership-for-iot-devices">
          <name>Change of ownership for IoT devices</name>
          <t>One of the significant use cases is where the devices are identified by their manufacturer assigned identities.
A significant savings was that enterprises would not have to run their own (private) PKI systems, sometimes even one system per device type.
But, with this usage style for DANCE there is no private PKI to run, and as a result there is no change of ownership required.
The device continues to use the manufacturer assigned identity.</t>
          <t>The device OwnerOperator is therefore at risk if the device's manufacturer goes out of business, or decides that they no longer wish to manufacturer that device.
Should that happen then the OwnerOperator of the device may be in trouble, and may find themselves having to replace the devices.</t>
          <t><xref section="10.4" sectionFormat="comma" target="RFC8995"/> (BRSKI) deals with concerns about manufacturers influence on devices.
In the case of BRSKI, the concern was limited to when the device ownership transfer was performed (the BRSKI transaction itself).
There was no concern once the OwnerOperator had taken control over the device through an <xref target="RFC8366"/> voucher.</t>
          <t>In the case of DANCE, the manufacturer is continuously involved with the day to day operation of the device.</t>
          <t>If this is of concern, then the OwnerOperator should perform some kind of transfer of ownership, such as using DPP, <xref target="RFC8995"/>(BRSKI), <xref target="RFC9140"/>(EAP-NOOB), and others yet to come.</t>
          <t>The DANCE method of using manufacturer assigned identities would therefore seem to be best used for devices which have a short lifetime: one much smaller than the uncertainty about the anticipated lifespan of the manufacturer.
For instance, some kind of battery operated sensor which might be used in a large quantity at a construction site, and which can not be recharged.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8376">
          <front>
            <title>Low-Power Wide Area Network (LPWAN) Overview</title>
            <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8376"/>
          <seriesInfo name="DOI" value="10.17487/RFC8376"/>
        </reference>
        <reference anchor="I-D.johansson-sipcore-dane-sip">
          <front>
            <title>TLS sessions in SIP using DNS-based Authentication of Named Entities (DANE) TLSA records</title>
            <author fullname="Olle E. Johansson" initials="O. E." surname="Johansson">
              <organization>Edvina AB</organization>
            </author>
            <date day="6" month="October" year="2014"/>
            <abstract>
              <t>   Use of TLS in the SIP protocol is defined in multiple documents,
   starting with RFC 3261.  The actual verification that happens when
   setting up a SIP TLS connection to a SIP server based on a SIP URI is
   described in detail in RFC 5922 - SIP Domain Certificates.

   In this document, an alternative method is defined, using DNS-Based
   Authentication of Named Entities (DANE).  By looking up TLSA DNS
   records and using DNSsec protection of the required queries,
   including lookups for NAPTR and SRV records, a SIP Client can verify
   the identity of the TLS SIP server in a different way, matching on
   the SRV host name in the X.509 PKIX certificate instead of the SIP
   domain.  This provides more scalability in hosting solutions and make
   it easier to use standard CA certificates (if needed at all).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-johansson-sipcore-dane-sip-00"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <author fullname="W. Griffin" initials="W." surname="Griffin">
              <organization/>
            </author>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC).  The document defines a new DNS resource record that contains a standard SSH key fingerprint.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="RFC4186">
          <front>
            <title>Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM)</title>
            <author fullname="H. Haverinen" initials="H." role="editor" surname="Haverinen">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." role="editor" surname="Salowey">
              <organization/>
            </author>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Global System for Mobile Communications (GSM) Subscriber Identity Module (SIM).  GSM is a second generation mobile network standard. The EAP-SIM mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and session keys of greater strength than the individual GSM triplets.  The mechanism also includes network authentication, user anonymity support, result indications, and a fast re-authentication procedure.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4186"/>
          <seriesInfo name="DOI" value="10.17487/RFC4186"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-use-cases">
          <front>
            <title>Randomized and Changing MAC Address Use Cases</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yiu Lee" initials="Y." surname="Lee">
              <organization>Comcast</organization>
            </author>
            <date day="6" month="October" year="2022"/>
            <abstract>
              <t>   To limit the privacy and security issues created by the association
   between a device, its traffic, its location and its user, client
   vendors have started implementing MAC address rotation.  When such
   rotation happens, some in-network states may break, which may affect
   network efficiency and the user experience.  At the same time,
   devices may continue sending other stable identifiers, defeating the
   MAC rotation purposes.  This document lists various network
   environments and a set of functional network services that may be
   affected by such rotation.  This document then examines settings
   where the user experience may be affected by in-network state
   disruption, and settings where other machine identifiers may help re-
   identify the user or recover the identity of the user, and locate the
   device and its associated user.  Last, this document examines
   solutions to maintain user privacy while preserving user quality of
   experience and network operation efficiency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-use-cases-03"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="L. Blunk" initials="L." surname="Blunk">
              <organization/>
            </author>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht">
              <organization/>
            </author>
            <author fullname="J. Carlson" initials="J." surname="Carlson">
              <organization/>
            </author>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz">
              <organization/>
            </author>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga">
              <organization/>
            </author>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz">
              <organization/>
            </author>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia.  The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access.  The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document.  In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="I-D.ietf-dance-tls-clientid">
          <front>
            <title>TLS Extension for DANE Client Identity</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson" initials="A." surname="Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="8" month="November" year="2022"/>
            <abstract>
              <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-01"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header parameters for carrying and referencing X.509 certificates</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="13" month="October" year="2022"/>
            <abstract>
              <t>   The CBOR Signing And Encrypted Message (COSE) structure uses
   references to keys in general.  For some algorithms, additional
   properties are defined which carry parameters relating to keys as
   needed.  The COSE Key structure is used for transporting keys outside
   of COSE messages.  This document extends the way that keys can be
   identified and transported by providing attributes that refer to or
   contain X.509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-09"/>
        </reference>
        <reference anchor="RFC4501">
          <front>
            <title>Domain Name System Uniform Resource Identifiers</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document defines Uniform Resource Identifiers for Domain Name System resources.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4501"/>
          <seriesInfo name="DOI" value="10.17487/RFC4501"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura">
              <organization/>
            </author>
            <author fullname="M. Sethi" initials="M." surname="Sethi">
              <organization/>
            </author>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
