<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dance-architecture-10" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DNS-Bound Identities Architecture">An Architecture for DNS-Bound Client and Sender Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dance-architecture-10"/>
    <author initials="A." surname="Wilson" fullname="Ash Wilson">
      <organization>Valimail</organization>
      <address>
        <email>ash.d.wilson@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Huque" fullname="Shumon Huque">
      <organization>Salesforce</organization>
      <address>
        <email>shuque@gmail.com</email>
      </address>
    </author>
    <author initials="O." surname="Johansson" fullname="Olle Johansson">
      <organization>Edvina.net</organization>
      <address>
        <email>oej@edvina.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works Inc</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="December" day="03"/>
    <area>Internet</area>
    <workgroup>DANCE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 58?>

<t>This architecture document defines terminology, interaction, and authentication patterns,
related to the use of DANE DNS records for TLS client and messaging peer identity,
within the context of existing object security and TLS-based protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    DANE Authentication for Network Clients Everywhere Working Group mailing list (dance@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dance/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ashdwilson/draft-dance-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A digital identity, in an abstract sense, possesses at least two features: an identifier (or name),
and a means of proving ownership of the identifier.
One of the most resilient mechanisms for tying an identifier to a method for proving ownership of
the identifier is the digital certificate, issued by a well-run Certification Authority (CA).
The CA acts as a mutually trusted third party, a root of trust.</t>
      <t>Certificate-based identities are limited in scope by the issuing CA, or by the namespace of the
application responsible for issuing or validating the identity.</t>
      <t>Attempting to use organizational PKI outside the organization can be challenging.
In order to authenticate a certificate, the certificate’s CA must be trusted.
CAs have no way of controlling identifiers in certificates issued by other CAs.
Consequently, trusting multiple CAs at the same time can enable entity identifier collisions.
In the browser-anchored "WebPKI" this is a serious concern with noteable events such as <xref target="comodogate"/>, which has led to the IETF Public Notary Transparency WG:trans, <xref target="RFC6962"/> and later <xref target="RFC9162"/>.</t>
      <t>Asking an entity to trust your CA implies trust in anything that your CA signs.
This is why many organizations operate a private CA, and require users and devices connecting to the
organization’s networks or applications to possess certificates issued by the organization’s CA.</t>
      <t>These limitations make the implementation and ongoing maintenance of a PKI costly, and have a
chilling effect on the broader adoption of certificate-based IoT device identity and user identity.
If certificate-based device and user identity were easier to manage, more broadly trusted, and less
operationally expensive, more organizations and applications would be able to use it.</t>
      <t>The lack of trust between PKI domains has lead to a lack of simple and globally scalable solutions
for secure end-to-end inter-domain communication between entities, such as SIP phones, email and
chat accounts and IoT devices belonging to different organizations.</t>
      <t>DANCE seeks to make PKI-based user and IoT device identity universally discoverable, more broadly recognized,
and less expensive to maintain by using DNS as the constraining namespace and lookup mechanism.
DANCE builds on patterns established by the original DANE RFCs to enable client and sending entity
certificate, public key, and trust anchor discovery.
DANCE allows entities to possess a first-class identity, which, thanks to DNSSEC, may be trusted by any
application also trusting the DNS.
A first-class identity is an application-independent identity.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t><strong>Identity provisioning:</strong> This refers to the set of tasks required to securely provision an asymmetric key pair for the device, sign the certificate (if the public credential is not simply a raw public key), and publish the public key or certificate in DNS.
These steps not necessarily performed by the same party or organization.
Examples:</t>
      <ul spacing="normal">
        <li>
          <t>A device manufacturer may instantiate the key pair, and a systems integrator may be
responsible for issuing (and publishing) the device certificate in DNS.</t>
        </li>
        <li>
          <t>A device manufacturer may publish the device identity records in DNS. The system integrator
needs to perform network and application access configuration, since the identity already exists in DNS.</t>
        </li>
        <li>
          <t>A user may instantiate a key pair, based upon which an organization's CA may produce
a certificate after internally assuring the user identity, and the systems integrator
may publish the CA root certificate in DNS.</t>
        </li>
      </ul>
      <t><strong>DANCE protocol:</strong> A DANCE protocol is protocol that has been taught to use DANE client mchanisms..</t>
      <t><strong>Client:</strong> This architecture document adopts the definition of "Client" from RFC 8446: "The endpoint initiating the TLS connection"</t>
      <t><strong>User:</strong> A client whose name consists of a user identity and a DNS owner name prefixed with a _user label.</t>
      <t><strong>Server:</strong> This architecture document adopts the definition of "Server" from RFC 8446: "The endpoint that did not initiate the TLS connection"</t>
      <t><strong>Store-and-forward system:</strong> A message handling system in-path between the sending agent and the receiving agent.</t>
      <t><strong>Systems integrator:</strong> The party responsible for configuration and deployment of application components.
In some cases, the systems integrator also installs the software onto the device, and may provision the device identity in DNS.</t>
      <t><strong>Consumer:</strong> The entity or organization which pays for the value provided by the application, and defines the success criteria for the output of the application.</t>
    </section>
    <section anchor="communication-patterns">
      <name>Communication Patterns</name>
      <section anchor="clientserver">
        <name>Client/Server</name>
        <t>Client/server communication patterns imply a direct connection between an entity which provides a service (the server), and an entity which initiates a connection to the server, called a client.
A secure implementation of this pattern includes a TLS-protected session directly between the client and the server.
A secure implementation may also include public key-based mutual authentication.</t>
        <t>Extending DANE to include client identity allows the server to authenticate clients independent of the private PKI used to issue the client certificate.
This reduces the complexity of managing the CA certificate collection, and mitigates the possibility of client identifier collision: the client identity is always a DNS name, no matter what is in the certificate, so no impersonation is possible.</t>
        <t>In many cases the client is not a user specific device (like a laptop or smartphone), but rather an enterprise or residential device with a non-user specific name.</t>
        <t>When the client is a user device, then additional precautions may be necessary to avoid divulging personally identitiable information in the DNS.
Mechanisms like SASL EXTERNAL <xref target="RFC4422"/> can be used to integrate more abstract user identities with specific authorizations that need to be more personal.</t>
      </section>
      <section anchor="peer-to-peer">
        <name>Peer to peer</name>
        <t>The extension also allows an application to find an application identity and set up a secure communication channel directly.
This pattern can be used in mesh networking, IoT and in many communication protocols for multimedia sessions, chat and messaging, where each endpoint may represent a device or a user.</t>
      </section>
      <section anchor="decoupled">
        <name>Decoupled</name>
        <t>Decoupled architecture, frequently incorporating store-and-forward systems, provides no direct connection between the producer and consumer of information.
The producer (or sending agent) and consumer (or receiving agent) are typically separated by at least one host running messaging-oriented middleware.
The Messaging-oriented middleware components may act as a server for the purpose of establishing TLS sessions for the producer and consumer.
This allows the assertion of identity between the middleware and sending agent, and the middleware and receiving agent.
The trust relationship between the sending agent and receiving agent is based on the presumed trustworthiness of the middleware, unless an identity can be attached to the message itself, independent of transport and middleware components.</t>
        <t>Within many existing store-and-forward protocols, certificates may be transmitted within the signed message itself.
An example of this is S/MIME.
Within IoT applications, we find that networks may be more constrained.
Including certificates in message payloads can present an unnecessary overhead on constrained network links.
Decoupled applications benefit from an out-of-band public key discovery mechanism, which may enable the retrieval of certificates only when needed, and sometimes using a less expensive network connection.</t>
      </section>
    </section>
    <section anchor="client-authentication">
      <name>Client authentication</name>
      <section anchor="overview-dance-usage-examples">
        <name>Overview - DANCE usage examples</name>
        <t>A client system sets up a TLS connection to a server, attaching a client certificate with a
subjectAltName <tt>dNSName</tt> indicating the DNS owner name of the client <xref target="RFC5280"/>.
When the client is a user, then their user identity is a subjectAltName extension containing either an <tt>otherName</tt> type with uid attribute <xref target="RFC4519"/> or email address <xref target="RFC9598"/>.</t>
        <t>In the TLS connection the DANE-client-id <xref target="I-D.ietf-dance-tls-clientid"/> extension is used to tell the server to use the certificate dNSName to find a DANE record including the public key of the certificate to be able to validate.
If the server can validate the DNSSEC response, the server validates the certificate and completes the TLS connection setup.</t>
        <t>Using DANE to convey certificate information for authenticating TLS clients gives a not-yet-authenticated client the ability to trigger a DNS lookup on the server side of the TLS connection.
An opportunity for DDOS may exist when malicious clients can trigger arbitrary DNS lookups.</t>
        <t>Without the use of the DANE-client-id extension, a server can not know if the DNS lookup will result in a useful result, and the server then winds up doing needless and potentially privacy violating DNS lookups.</t>
        <t>For instance, an authoritative DNS server <xref target="RFC9499"/> which has been configured to respond slowly, may cause a high concurrency of in-flight TLS authentication processes as well as open connections to upstream resolvers.
This sort of attack (of type slowloris) could have a performance or availability impact on the TLS server.</t>
        <section anchor="example-1-tls-authentication-for-https-api-interaction-dane-pattern-assurance">
          <name>Example 1: TLS authentication for HTTPS API interaction, DANE pattern assurance</name>
          <ul spacing="normal">
            <li>
              <t>The client initiates a TLS connection to the server.</t>
            </li>
            <li>
              <t>The TLS server compares the dane_clientid (conveyed via the DANE Client Identity extension) to a list of allowed client domains.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed, the TLS server then performs a DNS lookup for the client's TLSA record.
If the dane_clientid is not allowed, authentication fails.</t>
            </li>
            <li>
              <t>If the client's TLSA record matches the presented certificate or public key, the TLS handshake completes
successfully and the authenticated dane_clientid is presented to the web application in a header field.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>This pattern translates well to TLS/TCP load balancers, by using a TLS TLV instead of an HTTP header.</t>
            </li>
            <li>
              <t>No traffic reaches the application behind the TLS terminating proxy (and load balancer) unless DANE client authentication is successful.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-2-tls-authentication-for-https-api-interaction-dane-matching-in-web-application">
          <name>Example 2: TLS authentication for HTTPS API interaction, DANE matching in web application</name>
          <ul spacing="normal">
            <li>
              <t>The client initiates a TLS connection to the server.</t>
            </li>
            <li>
              <t>The TLS server accepts any certificate for which the client can prove possession of the corresponding private key.</t>
            </li>
            <li>
              <t>The TLS server passes the certificate to the web application in a header field.</t>
            </li>
            <li>
              <t>The HTTP request body contains the dane_clientid, and is passed to the web application.</t>
            </li>
            <li>
              <t>The web application compares the dane_clientid to a list of allowed clients or client domains.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed, the web application makes the DNS query for the TLSA records for dane_clientid</t>
            </li>
            <li>
              <t>If the presented certificate (which was authenticated by the TLS server) matches at least one TLSA record for dane_clientid, authentication succeeds.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>In a web application where a TLS-terminating load balancer sits in front of a web application, the authentication logic in the load balancer remains simple.</t>
            </li>
            <li>
              <t>The web application ultimately decides whether to make the DNS query to support DANE authentication.
This allows the web application to reject clients with identifiers which are not allowed, before making a DNS query for TLSA retrieval and comparison.
No need to manage an allow-list in the load balancer.</t>
            </li>
            <li>
              <t>This can be implemented with no changes to the TLS handshake.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-3-tls-user-authentication-for-an-ldap-query">
          <name>Example 3: TLS user authentication for an LDAP query</name>
          <ul spacing="normal">
            <li>
              <t>The LDAP client initiates a TLS connection to the server, conveying the user's domain via the DANE Client Identity extension.</t>
            </li>
            <li>
              <t>If the dane_clientid is allowed and begins with a _user label, the TLS server then performs a DNS lookup for TLSA records holding the user's CA, and includes them when requesting a client certificate.</t>
            </li>
            <li>
              <t>If the client's certificate is signed by a CA found in the TLSA records and the certificate's dNSName prefixed with a _user label matches the dane_clientid then the client identity is authenticated to consist of the lowercase uid in the certificate, an "@" symbol and the lowercase UTF-8 representation of the certificate's dNSName (which lacks the "_user." prefix).</t>
            </li>
            <li>
              <t>The LDAP server responds to SASL EXTERNAL authentication by obtaining the authenticated user identity in userid@domain.name form and, if so requested, attempts to change to an authorization identity.</t>
            </li>
          </ul>
          <t>This pattern has the following advantages:</t>
          <ul spacing="normal">
            <li>
              <t>SASL authentication under TLS encryption is common to many protocols, including new ones.</t>
            </li>
            <li>
              <t>This LDAP example demonstrates the potential of authentication with realm crossover support as a precursor to fine access control to possibly sensitive data.</t>
            </li>
            <li>
              <t>User identities cannot be iterated in DNS; TLS 1.3 conceals the client certificate; TLS in general conceals the user's choice of authorization identity during SASL EXTERNAL.</t>
            </li>
            <li>
              <t>This can be implemented with no changes to the TLS handshake.</t>
            </li>
          </ul>
        </section>
        <section anchor="example-4-iot-device-to-cloud">
          <name>Example 4: IoT: Device to cloud</name>
          <t>Direct device-to-cloud communication is common in simple IoT applications.
Authentication in these applications is usually accomplished using shared credentials like API keys, or using client certificates.
Client certificate authentication frequently requires the consumer to maintain a CA.
Before client DANE, the CA trust anchor certificate would be installed into the cloud application, and used in the TLS authentication process.</t>
          <t>Using client DANE for device identity can allow parties other than the implementer to operate the CA.
A hardware manufacturer can provide a pre-established identity, with the certificate or public key already published in DNS.
This makes PKI-based identity more approachable for small organizations which currently lack the resources to operate an organizational CA.</t>
        </section>
        <section anchor="example-5-lorawan">
          <name>Example 5: LoRaWAN</name>
          <t>For the end-device onboarding in LoRaWAN, the "network server" and the "join server" <xref target="RFC8376"/> needs to establish mutual TLS authentication in order to exchange configuration parameters.
Certificate Authority based mutual TLS authentication doesn't work in LoRaWAN due to the non availability of the CA trust store in the LoRaWAN network stack.
Self-signed certificate based mutual-TLS authentication method is the alternative solution.</t>
          <t>DANE based client identity allows the server to authenticate clients during the TLS handhsake.
Thus, independent of the private PKI used to issue the client's self-signed certificate, the "network server" and the "join server" could be mutually authenticated.</t>
        </section>
        <section anchor="example-6-edge-computing">
          <name>Example 6: Edge Computing</name>
          <t><xref target="I-D.hong-t2trg-iot-edge-computing"/> may require devices to mutually authenticate in the field.
A practical example of this pattern is the edge computing in construction use case <xref section="6.2.1" sectionFormat="comma" target="I-D.hong-t2trg-iot-edge-computing"/>
Using traditional certificate-based identity, the sensor and the gateway may have certificates issued by
the same organizational PKI.
By using DANE for client and sender identity, the sensor and the gateway may have identities represented
by the equipment supplier, and still be able to mutually authenticate.
Important sensor measurements forwarded by the gateway to the cloud may bear the DNS owner name and signature of
the originating sensor, and the cloud application may authenticate the measurement independent of the gateway
which forwarded the information to the application.</t>
        </section>
        <section anchor="example-7-domain-users">
          <name>Example 7: Domain Users</name>
          <t>The allocation of user identities is the prerogative of a domain, in line with the nesting suggested in URI notation.
Domains may even choose to assign domain user identities to services, possibly with easily recognised identities like +mail+archive@domain.name.
Domains who publish TLSA records for a CA under a _user name underneath their domain allow the validation of user identities as mentioned in a certificate as TLS client or peer identities.
This mechanism is not restricted to domain-internal users, but can be used to validate users under any domain.</t>
          <t>Since ENUM maps telephone numbers to DNS owner names, it is possible to employ these same mechanisms for telephone number users.
Any DANCE protocol may however define alternate derivation procedures to obtain the DNS owner name for a phone number from specialised PKIX or LDAP attributes such as telephoneNumber, telexNumber, homePhone, mobile and pager.</t>
          <t>There is no reason why other uses, such as store-and-forward with S/MIME, could not benefit from this DNS-based PKI, as long as they remain mindful that anything in the certificate is the prerogative of the domain publishing the TLSA record, and the only reliable identity statements are for resources underneath the domain -- notably, the assignment of uid names.</t>
        </section>
        <section anchor="example-8-sip-and-webrtc-inter-domain-privacy">
          <name>Example 8: SIP and WebRTC inter-domain privacy</name>
          <t>End to end security in SIP is currently based on a classical S/MIME model which has not received much implementation.
There are also SIP standards that build upon a trust chain anchored on the HTTP trust chain (SIP identity, STIR).
WebRTC has a trust model between the web browser and the servers using TLS, but no inter-domain trust infrastructure.
WebRTC lacks a definition of namespace to map to DNS, where SIP is based on an email-style addressing scheme.
For WebRTC the application developer needs to define the name space and mapping to DNS.</t>
          <t>By using DNS as a shared root of trust, SIP and WebRTC end points can anchor the keys used for DTLS/SRTP media channel setup.
In addition, SIP devices can establish security in the SIP messaging by using DNS to find the callee’s and the callers digital identity.</t>
          <t>For an example, read <xref target="I-D.johansson-sipcore-dane-sip"/>(SIPDANE).</t>
        </section>
        <section anchor="example-9-dns-over-tls-client-authentication">
          <name>Example 9: DNS over TLS client authentication</name>
          <t>DNS-over-TLS client authentication is applicable to most portions of the
transport segments of the DNS infrastructure.
Current best practise for authentication between DNS infrastructure tends to be based
upon a shared secret in the form of TSIG.</t>
          <t>From authoritative to authoritative secondary, it can be applied to
XFR-over-TLS ("XoT") as an upgrade to TSIG, removing the need for out-of-band
communication of shared secrets, currently a weak point in that portion of
the infrastructure.</t>
          <t>From authoritative servers to recursive servers <xref target="RFC9499"/>, in situations in which both
are part of a common trust-group or have access to the same non-public or
split-horizon zone data, client authentication allows authoritative servers
to give selective access to specific recursive servers. Alternatively, some
recursive servers could authenticate in order to gain access to
non-content-related special services, such as a higher query rate-limit quota
than is publicly available.</t>
          <t>Between recursive resolvers and caching/forwarding or stub resolvers <xref target="RFC9499"/>,
authentication can be used to gain access to special services, such as
subscription-based malware blocking, or visibility of corporate split-horizon
internal zone, or to distinguish between subscribers to different performance tiers.</t>
          <t>In the ideal implementation, client and server would bidirectionally authenticate, using DANE client certificates to bootstrap TLS transport security.</t>
        </section>
        <section anchor="example-10-smtp-starttls">
          <name>Example 10: SMTP, STARTTLS</name>
          <t>SMTP has included the ability to upgrade in-protocol to TLS using the STARTTLS <xref target="RFC7817"/> command.
When upgrading the connection, the client checks the server certificate using the DNS-ID mechanisms described in <xref target="RFC9525"/>.
Support for this is very common and most email on the Internet is transmitted in this way.</t>
          <t>The use of client TLS certificates has not yet become common, in part because it is unclear how or what the server would check the certificate against.</t>
          <t>For mail-transfer-agent (MTA) to MTA communications, the use of a TLSA RR as described in <xref target="I-D.ietf-dance-client-auth"/> permits the SMTP server to check the identity of the parties trying to send email.
There are many use cases, but a major one is often dealing with authenticated relaying of email.</t>
        </section>
        <section anchor="example-11-ssh-client">
          <name>Example 11: SSH client</name>
          <t>SSH servers have for some time been able to put their host keys into DNS using <xref target="RFC4255"/>.</t>
          <t>In many SSH server implementations the list of users that is authorized to login to an account is given by listing their public keys in a per-user file ("authorized_keys").
The file provides both authorization (who may login), and authentication (how they prove their identity).
While this is an implementation detail, doing both in one place has been one of Secure Shell's major reason for success.</t>
          <t>However, there are downsides to this: a user can not easily replace their key without visiting every host they are authorized to access and update the key on that host.
Separation of authorization and authentication in this case would involve putting the key material in a third place, such as in a DANE record in DNS, and then listing only the DNS owner name in the authorization file:</t>
          <ul spacing="normal">
            <li>
              <t>A user who wants to update their key need only update DNS in that case.</t>
            </li>
            <li>
              <t>A user who has lost access to their key, but can still update DNS (or can have a colleague update it) would more easily be able to recover.</t>
            </li>
            <li>
              <t>An administrator who controls the domain would be able to remove a departing user's key from DNS, preventing the user from authenticating in the future.</t>
            </li>
          </ul>
          <t>The DNS record used could be TLSA, but it is possible with some protocol work that it could instead be SSHFP.
Since SSH can trust CA certificates from X.509 <xref target="RFC6187"/>, those may be published for user authentication.</t>
        </section>
        <section anchor="example-12-network-access">
          <name>Example 12: Network Access</name>
          <t>Network access refers to an authentication process by which a node is admitted securely onto network infrastructure.
This is most common for wireless networks (wifi, 802.15.4), but has also routinely been done for wired infrastructure using 802.1X mechanisms with EAPOL.</t>
          <t>While there are EAP protocols that do not involve certificates, such as EAPSIM <xref target="RFC4186"/>, the use of symmetric key mechanisms as the "network key" <xref target="WPAPSK"/> (is common in many homes.
The use of certificate based mechanisms are expected to increase, due to challenges, such as Randomized and Changing MAC addresses (RCM), as described in <xref target="I-D.ietf-madinas-use-cases"/>.</t>
          <section anchor="eap-tls-with-radius">
            <name>EAP-TLS with RADIUS</name>
            <t>Enterprise EAP methods use a version of TLS to form a secure transport.
Client and server-side certificates are used as credentials.
EAP-TLS <xref target="EAP-TLS"/> does not run over TCP, but rather over a reliable transport provided by EAP.
To keep it simple the EAP "window" is always one, and there are various amounts of overhead that needs to be accounted for, and the EAP segment size is often noticeably smaller than the normal ethernet 1500 bytes.
<xref target="RFC3748"/> does guarantee a minimum payload of 1020 bytes.</t>
            <t>The client side certificates are often larger than 1500 bytes and can take two or three round trip times to transport from the supplicant to the authenticator (see <xref target="EAP-TLS"/> and <xref target="RFC5126"/> for terminology).
In worst case scenarios, which are common with eduroam <xref target="RFC7593"/>, the EAP packets are transported some distance, easily across the entire planet.
The authenticating system (the "authentication server" in EAP terms) is a system at the institute that issued the client side certificate, and so already has access to the entire client certificate.
Transferring the client certificate is redundant.
That is, the authenticator already has access to the entire certificate, but the client does not know this to the case, so it sends the entire certificate anyway.</t>
            <t>The use of DANE Client IDs in TLS as described in <xref target="I-D.ietf-dance-tls-clientid"/> reduces the redundant bytes of certificate sent.
If the client can assume that the server will be able to lookup it's client certificate in DNS, then it need never send it.
For the eduroam case, where it was never needed, so this significantly reduces the packet size.
For the non-eduroam cases, the client can be assured that omitting an inline certificate chain will not result in failure.</t>
            <t>Guidance for implementing RADIUS strongly encourages the use of a single common CA for all supplicants, to mitigate the possibility of identifier collisions across PKIs.
The use of DANE for client identity can allow the safe use of any number of CAs.
DNS acts as a constraining namespace, which prevents two unrelated CAs from issuing valid certificates bearing the same identifier.</t>
          </section>
          <section anchor="radsec">
            <name>RADSEC</name>
            <t>Note that EAP-TLS lives within a number of protocols, including RADIUS, but this section refers to the outer layer, while the above was about the inner portion.</t>
            <t>The RADIUS protocol has a few recognized security problems.
<xref target="RADSEC"/> and <xref target="I-D.ietf-radext-radiusdtls-bis"/> addresses the challenges related to the weakness of MD5-based authentication and confidentiality over untrusted networks by establishing a TLS session between the RADIUS protocol client and the RADIUS protocol server.
The use of client-side certificates has been encouraged by the recent work.
There are no protocol or specification changes required to put client-side certificates into DNS.
The use of the <xref target="I-D.ietf-dance-tls-clientid"/> with the created TLS connectio should suffice.
Note that this use cases addresses the security of the hop-by-hop RADIUS protocol, not the security of the end-to-end EAP(-TLS) session that might be carried within.</t>
          </section>
        </section>
        <section anchor="example-13-structured-data-messages-josecose">
          <name>Example 13: Structured data messages: JOSE/COSE</name>
          <t>JOSE and COSE provide formats for exchanging authenticated and encrypted structured data. JOSE defines the x5u field in <xref section="4.1.5" sectionFormat="comma" target="RFC7515"/>, and COSE defines a field of the same name in <xref section="2" sectionFormat="comma" target="I-D.ietf-cose-x509"/>.</t>
          <t>However, this URL field points to where the key can be found.
There is, as yet, no URI scheme which says that the key can be found via the DNS lookup itself.</t>
          <t>In order to make use of x5u, a DANCE protocol would have to define a new URI scheme that explained how to get the right key from DNS.</t>
        </section>
      </section>
    </section>
    <section anchor="protocol-implementations">
      <name>Protocol implementations</name>
      <t>For each protocol implementation, a specific usage document needs to be published. In this document,
the DANCE protocol requirements and usage needs to be specified (this is refered above as the "How to DANCE" document).
These documents should as a minimum contain the following sections:</t>
      <ul spacing="normal">
        <li>
          <t>Specifics on naming: How the name of the client is defined and how this is related to the name in
a DNS zone. This defines the organization of the related DNS zone. Whether a flat namespace is used,
or a way to use a DNS Zone hierarchy is applied to this usage. (see notes above on DNS zone design)</t>
        </li>
        <li>
          <t>Privacy: If the subject name is a personal identifier, how to protect that name from being exposed
in the DNS zone. <xref target="RFC7929"/> describes one way to handle privacy for personal identifiers in DNS.</t>
        </li>
        <li>
          <t>TTL: Recommended TTL settings for records in this usage</t>
        </li>
        <li>
          <t>Security: Security considerations for this usage</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>DNS clients should use DNS over TLS with trusted DNS resolvers to protect the identity of authenticating peers.</t>
      </section>
      <section anchor="integrity">
        <name>Integrity</name>
        <t>The integrity of public keys represented in DNS is most important.
An altered public key can enable device impersonation, and the denial of existence for a valid identity can cause devices to become un-trusted by the network or the application.
DNS records should be validated using the DNSSEC protocol.
When using a DNS stub resolver <xref target="RFC9499"/> rather than doing local validation, then the connection to the validating DNS resolver needs to be secured.</t>
        <t>Compartmentalizing failure domains within an application is a well-known architectural best practice.
Within the context of protecting DNS-based identities, this compartmentalization may manifest by hosting an identity zone on a DNS server which only supports the resource record types essential for representing device identities.
This can prevent a compromised identity zone DNS server from presenting records essential for impersonating web sites under the organization’s domain name.</t>
        <t>The naming pattern suggested in <xref target="I-D.ietf-dance-client-auth"/> includes
an underscore label (_device).
The underscore is not a valid character for names used in the Web PKI.
This prevents the issuance of any Web PKI-validating certificates for these names.</t>
        <t>This means that even were the authoritative DNS server compromised, it would not be possible to issue Web PKI certificates using, for instance, the <xref target="RFC8555"/> DNS-01 challenge.</t>
        <t>An alternative underscore label _user separates the TLSA records with the domain CA from the TLSA records for devices.</t>
      </section>
      <section anchor="availability">
        <name>Availability</name>
        <t>One of the advantages of DNS is that it has more than fourty years of demonstrated scaling.
It is a distributed database with a caching mechanism, and properly configured, it has proven resilient
to many kinds of outages and attacks.</t>
        <t>A key part of this availability is the proper use of Time To Live (TTL) values for resource records.
A cache is allowed to hang on to the data for a set time, the TTL, after which it must do a new query to find out if the data has changed, or perhaps been deleted.</t>
        <t>There is therefore a tension between resilience (higher TTL values), and agility (lower TTL values).
A lower TTL value allows for revocation or replacement of a key to become known much faster.
This allows for a more agile security posture.</t>
        <t>The TTL value is not enforced, which may lead to unexpected responses, like a malicious server
caching responses for a long time after the TTL for the record has expired. This may lead
to a situation where a revocation by removing the record from DNS doesn't come in
to effect as expected.</t>
        <t>On the other hand, lower TTLs cause the queries to occur more often,
which may reveal more information to an observer about which devices are active.
Encrypted transports like DoT/DoH/DoQ make these queries far less visible.
In addition to the on-path observer being able to see more, the resolver logs also may be a source of information.
It also allows for more opportunities for an attacker to affect the response time of the queries.</t>
      </section>
      <section anchor="tls-server-availability">
        <name>TLS Server availability</name>
        <t>TLS servers supporting DANCE should implement a list of domains that are valid for client authentication,
in order not to be open to DDOS attacks where a large number of clients force the server to do random DNS lookups.
More implementation details are to be found in the protocol specific documents.</t>
      </section>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>If the DNS owner name of the identity proven by a certificate is directly or indirectly relatable to a person, privacy needs to be considered when forming the name of the DNS resource record for the certificate.
This privacy is implied for domain users inasfar as the domain CA does not mention users.
When creating the DNS owner name, effects of DNS zone walking and possible harvesting of identities in the DNS zone will have to be considered.
The DNS owner name may not have to have a direct relation to the name of the subject or the subjectAltName of the certificate.
If there is such a relation, a DANCE protocol may specify support for CA certificates, stored under a wildcard in DNS.</t>
        <t>Further work has do be done in this area.</t>
        <section anchor="dns-scalability">
          <name>DNS Scalability</name>
          <t>In the use case for IoT, an implementation must be scalable to a large amount of devices.
In many cases, identities may also be very short lived as revocation is performed by simply removing a DNS record.
A zone will have to manage a large amount of changes as devices are constantly added and de-activated.</t>
          <t>In these cases it is important to consider the architecture of the DNS zone and when possible use a tree-like structure with many subdomain parts, much like reverse DNS records or how telephone numbers are represented in the ENUM standard (RFC 6116).</t>
          <t>If an authoritative resolver were configured to respond quite slowly using TCP, (for instance, a
<xref target="slowloris"/> attack), it possible that this would cause a TLS server to exhaust all it's TCP sockets.</t>
          <t>The availability of a client identity zone is essential to permitting clients to authenticate.
If the DNS infrastructure hosting client identities becomes unavailable, then the clients represented by that zone cannot be authenticated.</t>
        </section>
        <section anchor="change-of-ownership-for-iot-devices">
          <name>Change of ownership for IoT devices</name>
          <t>One of the significant use cases is where the devices are identified by their manufacturer assigned identities.
A significant savings was that enterprises would not have to run their own (private) PKI systems, sometimes even one system per device type.
But, with this usage style for DANCE there is no private PKI to run, and as a result there is no change of ownership required.
The device continues to use the manufacturer assigned identity.</t>
          <t>The device OwnerOperator is therefore at risk if the device's manufacturer goes out of business, or decides that they no longer wish to manufacturer that device.
Should that happen then the OwnerOperator of the device may be in trouble, and may find themselves having to replace the devices.</t>
          <t><xref section="10.4" sectionFormat="comma" target="RFC8995"/> (BRSKI) deals with concerns about manufacturers influence on devices.
In the case of BRSKI, the concern was limited to when the device ownership transfer was performed (the BRSKI transaction itself).
There was no concern once the OwnerOperator had taken control over the device through an <xref target="RFC8366"/> voucher.</t>
          <t>In the case of DANCE, the manufacturer is continuously involved with the day to day operation of the device.</t>
          <t>If this is of concern, then the OwnerOperator should perform some kind of transfer of ownership, such as using DPP, <xref target="RFC8995"/>(BRSKI), <xref target="RFC9140"/>(EAP-NOOB), and others yet to come.</t>
          <t>The DANCE method of using manufacturer assigned identities would therefore seem to be best used for devices which have a short lifetime: one much smaller than the uncertainty about the anticipated lifespan of the manufacturer.
For instance, some kind of battery operated sensor which might be used in a large quantity at a construction site, and which can not be recharged.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-dance-tls-clientid">
          <front>
            <title>TLS Extension for DANE Client Identity</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>OpenSSL Corporation</organization>
            </author>
            <date day="17" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS and DTLS extension to convey a DNS-
   Based Authentication of Named Entities (DANE) Client Identity to a
   TLS or DTLS server.  This is useful for applications that perform TLS
   client authentication via DANE TLSA records.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-tls-clientid-07"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <reference anchor="I-D.ietf-dance-client-auth">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>OpenSSL Corporation</organization>
            </author>
            <date day="19" month="September" year="2025"/>
            <abstract>
              <t>   The DANE TLSA protocol describes how to publish Transport Layer
   Security (TLS) server certificates or public keys in the DNS.  This
   document updates RFC 6698 and RFC 7671.  It describes how to
   additionally use the TLSA record to publish client certificates or
   public keys, and also the rules and considerations for using them
   with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="pkiiot">
          <front>
            <title>PKI for IoT using the DNS infrastructure</title>
            <author fullname="Sandoche Balakrichenan" initials="S." surname="Balakrichenan">
              <organization>Afnic</organization>
            </author>
            <author fullname="Ibrahim Ayoub" initials="I." surname="Ayoub">
              <organization>Afnic</organization>
            </author>
            <author fullname="Benoit Ampeau" initials="B." surname="Ampeau">
              <organization>Afnic</organization>
            </author>
            <date month="September" year="2022"/>
          </front>
          <seriesInfo name="2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)" value="pp. 1-8"/>
          <seriesInfo name="DOI" value="10.1109/pkia56009.2022.9952253"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="EAP-TLS">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RADSEC">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="slowloris" target="https://en.wikipedia.org/wiki/Slowloris_(computer_security)">
          <front>
            <title>Slowloris Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August" day="15"/>
          </front>
        </reference>
        <reference anchor="WPAPSK" target="https://www.wi-fi.org/system/files/WPA_80211_v3_1_090922.pdf">
          <front>
            <title>WPA (Wi-Fi Protected Access). v3.1 2004</title>
            <author>
              <organization>The Wi-Fi Alliance</organization>
            </author>
            <date year="2025" month="October" day="20"/>
          </front>
        </reference>
        <reference anchor="comodogate" target="https://www.schneier.com/blog/archives/2011/03/comodo_group_is.html">
          <front>
            <title>Comodo Group Issues Bogus SSL Certificates</title>
            <author initials="B." surname="Schneier" fullname="Bruce Schneier">
              <organization/>
            </author>
            <date year="2011" month="March" day="31"/>
          </front>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC4422">
          <front>
            <title>Simple Authentication and Security Layer (SASL)</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="K. Zeilenga" initials="K." role="editor" surname="Zeilenga"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms. It provides a structured interface between protocols and mechanisms. The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms. The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t>
              <t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection. In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t>
              <t>This document obsoletes RFC 2222. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4422"/>
          <seriesInfo name="DOI" value="10.17487/RFC4422"/>
        </reference>
        <reference anchor="RFC5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC4519">
          <front>
            <title>Lightweight Directory Access Protocol (LDAP): Schema for User Applications</title>
            <author fullname="A. Sciberras" initials="A." role="editor" surname="Sciberras"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>This document is an integral part of the Lightweight Directory Access Protocol (LDAP) technical specification. It provides a technical specification of attribute types and object classes intended for use by LDAP directory clients for many directory services, such as White Pages. These objects are widely used as a basis for the schema in many LDAP directories. This document does not cover attributes used for the administration of directory servers, nor does it include directory objects defined for specific uses in other documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4519"/>
          <seriesInfo name="DOI" value="10.17487/RFC4519"/>
        </reference>
        <reference anchor="RFC9598">
          <front>
            <title>Internationalized Email Addresses in X.509 Certificates</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="W. Chuang" initials="W." surname="Chuang"/>
            <author fullname="C. Bonnell" initials="C." surname="Bonnell"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name and Issuer Alternative Name extension that allows a certificate subject to be associated with an internationalized email address.</t>
              <t>This document updates RFC 5280 and obsoletes RFC 8398.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9598"/>
          <seriesInfo name="DOI" value="10.17487/RFC9598"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8376">
          <front>
            <title>Low-Power Wide Area Network (LPWAN) Overview</title>
            <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation. This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8376"/>
          <seriesInfo name="DOI" value="10.17487/RFC8376"/>
        </reference>
        <reference anchor="I-D.hong-t2trg-iot-edge-computing">
          <front>
            <title>IoT Edge Challenges and Functions</title>
            <author fullname="Jungha Hong" initials="J." surname="Hong">
              <organization>ETRI</organization>
            </author>
            <author fullname="Yong-Geun Hong" initials="Y." surname="Hong">
              <organization>ETRI</organization>
            </author>
            <author fullname="Xavier de Foy" initials="X." surname="de Foy">
              <organization>InterDigital Communications</organization>
            </author>
            <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
              <organization>Huawei Technologies Duesseldorf GmbH</organization>
            </author>
            <author fullname="Eve Schooler" initials="E." surname="Schooler">
              <organization>Intel</organization>
            </author>
            <author fullname="Dirk KUTSCHER" initials="D." surname="KUTSCHER">
              <organization>University of Applied Sciences Emden/Leer</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Many IoT applications have requirements that cannot be met by the
   traditional Cloud (aka cloud computing).  These include time
   sensitivity, data volume, uplink cost, operation in the face of
   intermittent services, privacy and security.  As a result, the IoT is
   driving the Internet toward Edge computing.  This document outlines
   the requirements of the emerging IoT Edge and its challenges.  It
   presents a general model, and major components of the IoT Edge, with
   the goal to provide a common base for future discussions in T2TRG and
   other IRTF and IETF groups.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hong-t2trg-iot-edge-computing-05"/>
        </reference>
        <reference anchor="I-D.johansson-sipcore-dane-sip">
          <front>
            <title>TLS sessions in SIP using DNS-based Authentication of Named Entities (DANE) TLSA records</title>
            <author fullname="Olle E. Johansson" initials="O. E." surname="Johansson">
              <organization>Edvina AB</organization>
            </author>
            <date day="6" month="October" year="2014"/>
            <abstract>
              <t>   Use of TLS in the SIP protocol is defined in multiple documents,
   starting with RFC 3261.  The actual verification that happens when
   setting up a SIP TLS connection to a SIP server based on a SIP URI is
   described in detail in RFC 5922 - SIP Domain Certificates.

   In this document, an alternative method is defined, using DNS-Based
   Authentication of Named Entities (DANE).  By looking up TLSA DNS
   records and using DNSsec protection of the required queries,
   including lookups for NAPTR and SRV records, a SIP Client can verify
   the identity of the TLS SIP server in a different way, matching on
   the SRV host name in the X.509 PKIX certificate instead of the SIP
   domain.  This provides more scalability in hosting solutions and make
   it easier to use standard CA certificates (if needed at all).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-johansson-sipcore-dane-sip-00"/>
        </reference>
        <reference anchor="RFC7817">
          <front>
            <title>Updated Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document describes the Transport Layer Security (TLS) server identity verification procedure for SMTP Submission, IMAP, POP, and ManageSieve clients. It replaces Section 2.4 (Server Identity Check) of RFC 2595 and updates Section 4.1 (Processing After the STARTTLS Command) of RFC 3207, Section 11.1 (STARTTLS Security Considerations) of RFC 3501, and Section 2.2.1 (Server Identity Check) of RFC 5804.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7817"/>
          <seriesInfo name="DOI" value="10.17487/RFC7817"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="RFC6187">
          <front>
            <title>X.509v3 Certificates for Secure Shell Authentication</title>
            <author fullname="K. Igoe" initials="K." surname="Igoe"/>
            <author fullname="D. Stebila" initials="D." surname="Stebila"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>X.509 public key certificates use a signature by a trusted certification authority to bind a given public key to a given digital identity. This document specifies how to use X.509 version 3 public key certificates in public key algorithms in the Secure Shell protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6187"/>
          <seriesInfo name="DOI" value="10.17487/RFC6187"/>
        </reference>
        <reference anchor="RFC4186">
          <front>
            <title>Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM)</title>
            <author fullname="H. Haverinen" initials="H." role="editor" surname="Haverinen"/>
            <author fullname="J. Salowey" initials="J." role="editor" surname="Salowey"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Global System for Mobile Communications (GSM) Subscriber Identity Module (SIM). GSM is a second generation mobile network standard. The EAP-SIM mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and session keys of greater strength than the individual GSM triplets. The mechanism also includes network authentication, user anonymity support, result indications, and a fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4186"/>
          <seriesInfo name="DOI" value="10.17487/RFC4186"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-use-cases">
          <front>
            <title>Randomized and Changing MAC Address: Context, Network Impacts, and Use Cases</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yiu Lee" initials="Y." surname="Lee">
              <organization>Comcast</organization>
            </author>
            <date day="20" month="December" year="2024"/>
            <abstract>
              <t>   To limit the privacy issues created by the association between a
   device, its traffic, its location, and its user in [IEEE_802]
   networks, client and client Operating System vendors have started
   implementing MAC address randomization.  This technology is
   particularly important in Wi-Fi [IEEE_802.11] networks due to the
   over-the-air medium and device mobility.  When such randomization
   happens, some in-network states may break, which may affect network
   connectivity and user experience.  At the same time, devices may
   continue using other stable identifiers, defeating the MAC address
   randomization purposes.

   This document lists various network environments and a range of
   network services that may be affected by such randomization.  This
   document then examines settings where the user experience may be
   affected by in-network state disruption.  Last, this document
   examines two existing frameworks to maintain user privacy while
   preserving user quality of experience and network operation
   efficiency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-use-cases-19"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5126">
          <front>
            <title>CMS Advanced Electronic Signatures (CAdES)</title>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="N. Pope" initials="N." surname="Pope"/>
            <author fullname="J. Ross" initials="J." surname="Ross"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>This document defines the format of an electronic signature that can remain valid over long periods. This includes evidence as to its validity even if the signer or verifying party later attempts to deny (i.e., repudiates) the validity of the signature.</t>
              <t>The format can be considered as an extension to RFC 3852 and RFC 2634, where, when appropriate, additional signed and unsigned attributes have been defined.</t>
              <t>The contents of this Informational RFC amount to a transposition of the ETSI Technical Specification (TS) 101 733 V.1.7.4 (CMS Advanced Electronic Signatures -- CAdES) and is technically equivalent to it.</t>
              <t>The technical contents of this specification are maintained by ETSI. The ETSI TS and further updates are available free of charge at: http://www.etsi.org/WebSite/Standards/StandardsDownload.aspx This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5126"/>
          <seriesInfo name="DOI" value="10.17487/RFC5126"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="I-D.ietf-radext-radiusdtls-bis">
          <front>
            <title>RadSec: RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Jan-Frederik Rieckers" initials="J." surname="Rieckers">
              <organization>Deutsches Forschungsnetz | German National Research and Education Network</organization>
            </author>
            <author fullname="Stefan Winter" initials="S." surname="Winter">
              <organization>Fondation Restena | Restena Foundation</organization>
            </author>
            <date day="21" month="November" year="2025"/>
            <abstract>
              <t>   This document defines transport profiles for running RADIUS over
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS), allowing the secure and reliable transport of RADIUS
   messages.  RADIUS/TLS and RADIUS/DTLS are collectively referred to as
   RadSec.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-radiusdtls-bis-11"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="13" month="October" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general.  For some algorithms, additional properties are defined that carry parameters relating to keys as needed.  The COSE Key structure is used for transporting keys outside of COSE messages.  This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-09"/>
        </reference>
        <reference anchor="RFC7929">
          <front>
            <title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys. DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS. This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record. Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the "web of trust" or manual verification. The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7929"/>
          <seriesInfo name="DOI" value="10.17487/RFC7929"/>
        </reference>
        <reference anchor="RFC8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8366" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8366.xml">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC9140">
          <front>
            <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9140"/>
          <seriesInfo name="DOI" value="10.17487/RFC9140"/>
        </reference>
      </references>
    </references>
    <?line 520?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
