<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc linkmailto="no" ?>
<?rfc rfcedstyle="yes"?>
<?rfc-ext allow-markup-in-artwork="yes" ?>
<?rfc-ext include-references-in-index="yes" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cdni-https-delegation-subcerts-12" category="std" tocInclude="true" symRefs="true" sortRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="RFC XML Examples">CDNI Metadata for Delegated Credentials</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cdni-https-delegation-subcerts-12"/>
    <author initials="F." surname="Fieau" fullname="Frederic Fieau">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>40-48, avenue de la Republique</street>
          <city>Chatillon</city>
          <code>92320</code>
          <country>France</country>
        </postal>
        <email>frederic.fieau@orange.com</email>
      </address>
    </author>
    <author initials="E." surname="Stephan" fullname="Emile Stephan">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>2, avenue Pierre Marzin</street>
          <city>Lannion</city>
          <code>22300</code>
          <country>France</country>
        </postal>
        <email>emile.stephan@orange.com</email>
      </address>
    </author>
    <author initials="G." surname="Guillaume" fullname="Guillaume Bichot">
      <organization>Broadpeak</organization>
      <address>
        <postal>
          <street>15, rue Claude Chappe</street>
          <city>Cesson-Sevigne</city>
          <code>35510</code>
          <country>France</country>
        </postal>
        <email>guillaume.bichot@broadpeak.tv</email>
      </address>
    </author>
    <author initials="C." surname="Christoph" fullname="Christoph Neumann">
      <organization>Broadpeak</organization>
      <address>
        <postal>
          <street>15, rue Claude Chappe</street>
          <city>Cesson-Sevigne</city>
          <code>35510</code>
          <country>France</country>
        </postal>
        <email>christoph.neumann@broadpeak.tv</email>
      </address>
    </author>
    <date/>
    <abstract>
      <t>
The delivery of content over HTTPS involving multiple Content Delivery Networks (CDNs)
raises credential management issues.  This document defines 
metadata in the CDNI Control and Metadata interface to setup HTTPS 
delegation using delegated credentials from an Upstream CDN (uCDN) 
to a Downstream CDN (dCDN).
</t>
    </abstract>
  </front>
  <middle>
    <section>
      <name>Introduction</name>
      <t>
Content delivery over HTTPS utilizing one or more Content Delivery Networks
(CDNs) along the delivery path necessitates the management of credentials. 
This requirement is particularly pertinent when an entity delegates the delivery of content via HTTPS to another trusted entity.
</t>
      <t>
This document specifies the CDNI Metadata interface for establishing HTTPS delegation through the use of delegated credentials, as defined in  <xref target="RFC9345"/>)
between an upstream CDN (uCDN) and a downstream CDN (dCDN).
</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL"
in this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
      <t>
This document uses terminology from CDNI framework documents:
CDNI framework document <xref target="RFC7336"/>, CDNI requirements <xref target="RFC7337"/> and
CDNI interface specifications documents: CDNI Metadata interface <xref target="RFC8006"/>.
</t>
    </section>
    <section anchor="FCI">
      <name>CDNI Footprint and Capabilities Advertisement interface (FCI) capabilities object for delegated credentials</name>
      <t>
A dCDN should advertise its supported delegation methods using the
Footprint and Capabilities Advertisement interface (FCI) as defined in <xref target="RFC8008"/>.
The FCI.Metadata object enables a dCDN to communicate its capabilities and the Metadata Interface (MI) objects it supports. 
To indicate support for delegated credentials, the dCDN should announce the support for MI.DelegatedCredentials, as illustrated in the example below.
</t>
      <artwork align="left"><![CDATA[
   {
     "capabilities": [
       {
         "capability-type": "FCI.Metadata",
         "capability-value": {
           "metadata": [
             "MI.DelegatedCredentials",
             "... other supported MI objects ..."
           ]
         },
         "footprints": [
           "Footprint objects"
         ]
       }
     ]
   }
]]></artwork>
      <t>
This document also defines an object that informs the uCDN of the number of delegated credentials supported by the dCDN, 
enabling the uCDN to supply the appropriate number of delegated credentials. To this end, the FCI object, FCI.DelegationCredentials, is introduced. 
</t>
      <section anchor="FCI_DelegatedCredentials">
        <name>FCI.DelegatedCredentials</name>
        <t>
The FCI.DelegationCredentials object enables advertising the maximum number of delegated credentials supported by the dCDN.
This number typically (but not necessarily) corresponds to the number of servers designated by the dCDN to support delegated credentials.
</t>
        <t>
The property PrivateKeyEncryptionKey contains a public key provided by the dCDN that MUST be used by the uCDN to
encrypt private keys whenever such private keys are transmitted to the dCDN using MI.DelegatedCredentials (see <xref target="MI"/>).
</t>
        <dl>
          <dt>Property: </dt>
          <dd>
            <t>number-delegated-certs-supported
            </t>
            <dl>
              <dt>Description:</dt>
              <dd>Number of delegated credentials supported by the dCDN.</dd>
              <dt>Type:</dt>
              <dd>integer</dd>
              <dt>Mandatory-to-Specify:</dt>
              <dd>Yes</dd>
            </dl>
          </dd>
        </dl>
        <dl>
          <dt>Property: </dt>
          <dd>
            <t>PrivateKeyEncryptionKey
            </t>
            <dl>
              <dt>Description:</dt>
              <dd>Public key in JWK format (<xref target="RFC7517"/>) of the dCDN to be used by the uCDN to encrypt private keys.</dd>
              <dt>Type:</dt>
              <dd>string</dd>
              <dt>Mandatory-to-Specify:</dt>
              <dd>No</dd>
            </dl>
          </dd>
        </dl>
        <t>
The following is an example of the FCI.DelegatedCredentials.
</t>
        <artwork align="left"><![CDATA[
    {
      "capabilities": [
        {
         "capability-type": "FCI.DelegatedCredentials",
         "capability-value": {
            "number-delegated-certs-supported": 10
           }
         "footprints": [
            <Footprint objects>
           ]
        }
      ]
    }
]]></artwork>
      </section>
      <section anchor="usage_FCI">
        <name>Expected usage of the property number of supported delegated credentials</name>
        <t>The dCDN uses the FCI.DelegatedCredentials object to announce the number of servers that support delegated credentials</t>
        <t>When the uCDN receives the FCI.DelegatedCredentials object it can issue the supported number of delegated credentials to the dCDN.
When configuring the dCDN, the uCDN MAY decide to provide less than the maximum supported delegated credentials to the dCDN.
Note that, within a dCDN, different deployment possibilities of the delegated credentials on the
endpoints exist. The dCDN MAY use one single delegated credential and deploy it on multiple endpoints. 
Alternatively, the dCDN MAY deploy a different delegated credential for each endpoint 
(provided that the uCDN delivers enough different delegated credentials). 
This choice is at the discretion of the dCDN and depends on the number of delegated credentials provided by the uCDN.</t>
        <t>The FCI.DelegationCredentials object does not address expiry and renewal of delegated credentials.
Once the uCDN has provided delegated credentials via the MI, uCDN SHOULD monitor the provided credentials 
and their expiry times and timely refresh dCDN credentials via the MI. 
The uCDN may decide not to monitor the validity period of delegated credentials 
and not to refresh the credentials, for example in cases of short-term one shot deployments or once it decided to deprovision a dCDN.
If the delegated credential is not renewed on time by the uCDN, the servers of the dCDN that only have expired delegated credentials MUST refuse 
any new TLS connection that requires an up-to-date delegated credential.
</t>
      </section>
    </section>
    <section anchor="MI">
      <name>CDNI Metadata interface (MI) metadata object for delegated credentials</name>
      <t>As expressed in <xref target="RFC9345"/>, when an uCDN has delegated to a dCDN, the dCDN presents the
"delegated_credential" during the TLS handshake <xref target="RFC8446"/> to the User Agent, 
instead of its own certificate. This implies that the dCDN is also in the possession of the private key corresponding to the public key in DelegatedCredential.cred <xref target="RFC9345"/>.
This allows the User Agent to verify the signature in CertificateVerify message (<xref target="RFC8446"/> Section 4.4.3.) sent and signed by the dCDN.</t>
      <t>
This section defines the MI.DelegatedCredentials object containing an array of delegated
credentials and optionally the corresponding private keys. 
The CDNI MI <xref target="RFC8006"/> describes the CDNI metadata distribution 
mechanisms according to which a dCDN can retrieve the MI.DelegatedCredentials object 
from the uCDN.
</t>
      <t>
The properties of the MI.DelegatedCredentials object are as follows:
</t>
      <dl>
        <dt>Property: </dt>
        <dd>
          <t>delegated-credentials
          </t>
          <dl>
            <dt>Description:</dt>
            <dd>Array of delegated credentials</dd>
            <dt>Type:</dt>
            <dd>Array of DelegatedCredentialObject objects</dd>
            <dt>Mandatory-to-Specify:</dt>
            <dd>Yes</dd>
          </dl>
        </dd>
      </dl>
      <t>
The DelegatedCredentialObject object is composed of the following properties:
</t>
      <dl>
        <dt>Property: </dt>
        <dd>
          <t>delegated-credential
          </t>
          <dl>
            <dt>Description:</dt>
            <dd>Base64-encoded (as defined in Section 4 of <xref target="RFC4648"/>) version of a CertificateEntry as defined in <xref target="RFC8446"/> Section 4.4.2. The CertificateEntry MUST contain a DelegatedCredential structure (as defined in <xref target="RFC9345"/>) using the extension in the CertificateEntry of its end-entity certificate (see <xref target="RFC9345"/> section 4.1.1)</dd>
            <dt>Type:</dt>
            <dd>string</dd>
            <dt>Mandatory-to-Specify:</dt>
            <dd>Yes</dd>
          </dl>
        </dd>
      </dl>
      <dl>
        <dt>Property: </dt>
        <dd>
          <t>private-key
          </t>
          <dl>
            <dt>Description:</dt>
            <dd>Encrypted private key corresponding to the public key contained in the DelegatedCredential. The envelope format for this property is JWE <xref target="RFC7516"/> using the base64 compact serialization (Section 7.1 of <xref target="RFC7516"/>).</dd>
            <dt>Type:</dt>
            <dd>string</dd>
            <dt>Mandatory-to-Specify:</dt>
            <dd>No</dd>
          </dl>
        </dd>
      </dl>
      <t>
The private-key property is not mandatory. If not specified, it is assumed that the dCDN generated the public-private key pair for the delegated credential itself and provided
the public key information with an out-of-band mechanism to the uCDN.
See <xref target="security"/> for constraints regarding the usage of the private key. 
</t>
      <t>
If the private-key property is used, the transported private key MUST be encrypted using the PrivateKeyEncryptionKey specified in FCI.DelegatedCredentials. 
The envelope format for this property MUST use JWE <xref target="RFC7516"/> using the base64 compact serialization (Section 7.1 of <xref target="RFC7516"/>), whereas the private key is included as JWE Ciphertext in the JWE.
The JWE content-type field MAY be used signal the media type of the encrypted key.
</t>
      <t>
Below, please see an example MI.DelegatedCredential Object.
</t>
      <artwork align="left"><![CDATA[
    {
    "generic-metadata-type": "MI.DelegatedCredentials",
    "generic-metadata-value": {
        "delegated-credentials": [
                {"delegated-credential": 	
                    "cBBfm8KK6pPz/tdgKyedwA...
                    iXCCIAmzMM0R8FLI3Ba0UQ=="},
                {"delegated-credential": 	
                    "4pyIGtjFdys1+9y/4sS/Fg...
                    J+h9lnRY/xgmi65RLGKoRw=="},
                {"delegated-credential": 	
                    "6PWFO0g2AXvUaULXLObcVA...
                    HXoldT/qaYCCNEyCc8JM2A=="}
            ]
        }
    }
]]></artwork>
    </section>
    <section anchor="callflow">
      <name>Delegated credentials call flow</name>
      <t>An example call-flow using delegated credentials is depicted in 
Figure 1.</t>
      <t>
1. It is assumed that the uCDN has been provisioned and configured
with a certificate. Note that it is out of scope of CDNI and the
present document how and from where (e.g., CSP) the uCDN acquired 
its certificate.
</t>
      <t>
2. The uCDN generates a set of delegated credentials 
(here it is assumed that public keys of the dCDN are known). 
Note that the uCDN may generate this material at different points in time, e.g., in advance to have a pool of delegated 
credentials or on-demand when the dCDN announces its maximum number of supported delegated credentials.
</t>
      <t>
3. Using the CDNI FCI <xref target="RFC8008"/>, the 
dCDN advertises MI.DelegatedCredentials capabilities to the uCDN.
The dCDN further uses FCI.DelegatedCredentials to advertise the maximum number 
of supported delegated credentials.
</t>
      <t>
4. Using the CDNI MI <xref target="RFC8006"/>, the dCDN acquires 
the MI.DelegatedCredentials, retrieving an array of delegated
credentials.
</t>
      <t>
5. The client establishes a TLS connection with an endpoint of 
the dCDN according to <xref target="RFC9345"/> using the delegated 
credentials retrieved in step 4.
</t>
      <t>
6. When some delegated credentials are about to expire, the uCDN uses the CDNI MI <xref target="RFC8006"/> to provide new, valid delegated credentials.
</t>
      <figure>
        <name>Example call-flow of Delegated credentials in CDNI</name>
        <artwork align="center"><![CDATA[
User-Agent                  dCDN                 uCDN                 
   |                     |                     |                  
   |                     |      [1.uCDN acquires its certificate
   |                     |            out of scope of CDNI]
   |                     |                     |    
   |                     |             [2.generation of 
   |                     |          delegated credentials]
   |                     |                     |
   |                  3. CDNI FCI used to
   |              advertise support of MI.DelegatedCredentials
   |              and announce number of delegated credentials
   |                 supported using FCI.DelegatedCredentials
   |                     |-------------------->+          
   |                     |                     |                    
   |                 4. CDNI MI used to
   |             provide the MI.DelegatedCredential object  
   |                     |<--------------------+      
   |                     |                     |    
                         .
                         .
                         .                                                  
  [5. TLS handshake according                  |
          to [RFC9345]]  .                     | 
   |<------------------->|                     |
   |                     |                     |
                         .
                         .
                         .                                               
   |              6.Some delegated credentials about to expire.
   |                   CDNI MI used to
   |             provide new MI.DelegatedCredential object  
   |                     |<--------------------+    
   |                     |                     |  
]]></artwork>
      </figure>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>
This document requests IANA registration of the following entries
under the "CDNI Payload Types" registry hosted by IANA regarding
"CDNI delegation":
</t>
      <table>
        <tbody>
          <tr>
            <td>Payload Type</td>
            <td>Specification</td>
          </tr>
          <tr>
            <td>MI.DelegatedCredentials</td>
            <td>RFCthis</td>
          </tr>
          <tr>
            <td>FCI.DelegatedCredentials</td>
            <td>RFCthis</td>
          </tr>
        </tbody>
      </table>
      <t>
[RFC Editor: Please replace RFCthis with the published RFC number for
this document.]
</t>
      <t>
The <xref target="iana_MI"/> and <xref target="iana_FCI"/> below provide additional necessary information for the IANA registration of CDNI payload-types parameters (see <xref target="RFC7736"/> Section 2.2).
</t>
      <section anchor="iana_MI">
        <name>CDNI MI DelegatedCredentials Payload Type</name>
        <dl>
          <dt>Purpose:</dt>
          <dd>The purpose of this Payload Type is to distinguish delegated
credentials MI Objects
</dd>
          <dt>Interface:</dt>
          <dd>MI/FCI</dd>
          <dt>Encoding:</dt>
          <dd>see <xref target="MI"/></dd>
        </dl>
      </section>
      <section anchor="iana_FCI">
        <name>CDNI FCI DelegatedCredentials Payload Type</name>
        <dl>
          <dt>Purpose:</dt>
          <dd>The purpose of this Payload Type is to advertise the number 
of delegated credentials needed (and any associated capability
advertisement)
</dd>
          <dt>Interface:</dt>
          <dd>FCI</dd>
          <dt>Encoding:</dt>
          <dd>see <xref target="FCI_DelegatedCredentials"/></dd>
        </dl>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>
The extensions defined enable providing delegated credentials to dCDNs. 
A delegated credential can only be used by a dCDN if it is in possession of the associated private key.
Similarly, an attacker requires access to the private key in order to exploit delegated credential and impersonate dCDN nodes.
Thus, leakage of only the delegated credential without the private key represents a limited security risk.
</t>
      <t>
Delegated credentials and associated private keys are short-lived (per default the maximum validity period set to 7 days in <xref target="RFC9345"/>) and as such a single leaked delegated credential with its private key represents a limited security risk.
Still, it is NOT RECOMMENDED to send private keys through the MI. Omitting the private key further limits the possibility exploits by an attacker to exploit the delegated credential.
</t>
      <t>
If despite this recommendation, the private key is communicated via the MI, the transported private key MUST be encrypted within a JWE envelope using the encryption key (PrivateKeyEncryptionKey) provided within the FCI.DelegatedCredentials by the dCDN. 
The JWE encryption key (PrivateKeyEncryptionKey) MUST have a strength equal or larger than the private key it is encrypting for transport.
Note that the specified encryption method does not offer forward secrecy. If the dCDN's encryption key becomes compromised in the future, then all encrypted JWEs will become compromised. Due to the short-lived nature of delegated credentials, the impact is limited.
</t>
      <t>
It is also important to ensure that an attacker is not able to systematically retrieve a consecutive or consistent set of delegated credentials and associated private keys.
Such an attack would allow the attacker to systematically impersonate dCDN nodes. 
The MI objects defined in the present document are transferred via the interfaces defined in CDNI <xref target="RFC8006"/>. 
<xref target="RFC8006"/> describes how to secure these interfaces, protecting the integrity, confidentiality and ensuring the
authenticity of the dCDN and uCDN, which should prevent an attacker to systematically retrieve delegated credential and associated private keys.
</t>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>
The information, FCI, and MI objects defined in the present document do not contain any personally identifiable information (PII).
As such this document does not change or alter the Confidentiality and Privacy Consideration outlined in the CDNI Metadata and Footprint and Capabilities RFCs <xref target="RFC8006"/>.</t>
      <t>
A single or systematic retrieval of delegated credentials and associated private keys would allow the attacker to decrypt any data sent by the end user intended for the end service, which may include PII.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7516.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7517.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8006.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8008.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9345.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml"/>
      </references>
      <references>
        <name>Informative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7336.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7337.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7736.xml"/>
      </references>
    </references>
  </back>
</rfc>
