<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wing-settle-requirements-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="Requirements for HTTPS for Local Domains">Requirements for HTTPS for Local Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wing-settle-requirements-01"/>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Citrix">Cloud Software Group, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Erik Nygren">
      <organization>Akamai Technologies</organization>
      <address>
        <email>erik+ietf@nygren.org</email>
        <uri>http://erik.nygren.org/</uri>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="March" day="19"/>
    <keyword>https</keyword>
    <keyword>local domains</keyword>
    <keyword>pki</keyword>
    <keyword>pkix</keyword>
    <keyword>certificate authority</keyword>
    <keyword>tls</keyword>
    <keyword>identity</keyword>
    <keyword>authentication</keyword>
    <abstract>
      <?line 202?>

<t>When connecting to servers on their local network, users are
surprised to encounter user interfaces that display errors,
show insecure connections, and block some HTTP features
when missing a secure context.  However, obtaining PKIX
certificates for those servers is difficult for a variety
of reasons.</t>
      <t>This document explores requirements for authenticating local servers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/settle-requirements/draft-wing-settle-requirements.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wing-settle-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SETTLE  mailing list (<eref target="mailto:settle@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/settle/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/settle/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/settle-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <?line 213?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Servers on local networks have historically settled for
unencrypted communications -- printers, routers, network attached
storage (NAS).
However, with the advent of HTTPS everywhere <xref target="everywhere"/>, browsers disadvantage unencrypted
communications (e.g., <xref target="not-secure"/>, <xref target="sec-context"/>).
This increases importance of a secure context (HTTPS) to local domains.</t>
      <t>In addition, it is recognized that home networks are not (and perhaps have never been) the idyllic secure gardens that many think they are.
There are persistent threats in the home due to malware on devices within the home, as well as malware that might arrive on guest devices.
Most home networks have little protection against various kinds of (layer-2) spoofing attacks, which means that active on-path attacks (MITM) must be assumed.
Securing the administrative and regular connections within the home network would result in significant security gains for all devices in the home.</t>
      <t>Today, a secure context is obtained with a PKIX certificate (<xref target="RFC5280"/>)
signed by a Certification Authority (CA) that is trusted by the client.</t>
      <t>However, servers on a local network cannot easily get PKIX
certificates signed by a Certification Authority because: they are not directly reachable from the outside (due to firewall or NAPT), lack of domain name delegation, and need for ongoing certificate renewal.</t>
      <t>The problem has been well recognized since about 2010 and several
proposals have been suggested to solve this problem, each with their
own drawbacks.  This document is not intended to summarize these proposals
or their drawbacks; for that detail see the pointers to previous work
in <xref target="related"/>.  At a high level, the proposals have involved
solutions such as:</t>
      <ul spacing="normal">
        <li>
          <t>pre-shared secrets (scanned, printed, or displayed by the server)</t>
        </li>
        <li>
          <t>Public DNS pointing at local domain's IP address (e.g., <xref target="plex"/>)</t>
        </li>
        <li>
          <t>Local Certification Authority, where a CA is
added to client's certificate trust list and that CA signs
certificates for devices within the local network</t>
        </li>
        <li>
          <t>Trust On First Use (TOFU), where a user verifies the first
connection to a server and the client remembers that verification,
similar to common use of ssh</t>
        </li>
        <li>
          <t>WebRTC and WebTransport, where a PKI-signed server provides a
public key fingerprint of another server that it has previously
bootstrapped</t>
        </li>
        <li>
          <t>Encoding server's public key into the hostname <xref target="thomson-hld"/></t>
        </li>
      </ul>
      <t>This document explores IETF requirements for an alternative server
authentication system for local hosts.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="technical-requirements">
      <name>Technical Requirements</name>
      <t>The goal is to work out the engineering tradeoff around <xref target="zookotriangle"/>.
Specifically it says there are three aspects that must be traded off:</t>
      <ul spacing="normal">
        <li>
          <t>Human-meaningful</t>
        </li>
        <li>
          <t>Secure</t>
        </li>
        <li>
          <t>Decentralized</t>
        </li>
      </ul>
      <section anchor="naming">
        <name>Naming</name>
        <t>PKIX certificates are a centralized naming scheme derived from DNS.
These names have (the possibility of) having human-readable names.
But the most significant property is uniqueness -- each name has its own
identity and that identity can be proven.</t>
        <t>A system that does not rely on centralized naming lacks this inherient
uniqueness property.</t>
        <t>Name collisions can be engineered by attackers for nefarious purposes.
For example, if a victim is configured to use the (likely) unique
name "printer-12ab34cd56ef.local" (containing the printer's full or
partial MAC address), an attacker can respond to connections to that
name, potentially stealing the user's authentication credentials
to that printer or seeing the content the user sent to that printer.
Similar attacks are possible with file shares.  This problem is
exacerbated if non-unique names are used (e.g., simply "printer.local"
or "router.local"), as it reduces the attacker's effort.
Humans prefer simple, human-readable
names, but a strong identity cannot be created with such names.</t>
        <ul empty="true">
          <li>
            <t>R-UNIQUE-NAME: The system <bcp14>MUST</bcp14> have a way to uniquely identify
  servers.</t>
          </li>
        </ul>
      </section>
      <section anchor="cryptographic-binding">
        <name>Cryptographic Binding</name>
        <t>A server's name has to be mapped to its cryptographic identity.</t>
        <ul empty="true">
          <li>
            <t>R-BINDING: The Web Origin <bcp14>MUST</bcp14> be cryptographically bound to one or
  more key pairs, where the private keying material is on the service
  endpoint and where an attacker without the private key(s) is unable
  to access any state associated with the Web Origin.</t>
          </li>
        </ul>
        <t>A client has to be able to validate the name maps to the cryptographic
identity.</t>
        <ul empty="true">
          <li>
            <t>R-VALIDATE: Clients <bcp14>MUST</bcp14> be able to cryptographically validate that
  the authenticating server matches the identity in the URI / Web
  Origin.</t>
          </li>
        </ul>
        <t>Web browsers and modern users both expect a URI.</t>
        <ul empty="true">
          <li>
            <t>R-URI: It <bcp14>MUST</bcp14> be possible to construct a URI that encapsulates a
  Web Origin and its cryptographically-bound identity information.</t>
          </li>
        </ul>
      </section>
      <section anchor="abstract-naming">
        <name>Abstract Naming</name>
        <t>Using IP addresses in names is problematic if the server's IP address
changes due to ISP renumbering or internal network DHCP server
reconfiguration.</t>
        <t>Given common NAT44 (NAPT), many many networks will share the same IPv4 addresses.</t>
        <ul empty="true">
          <li>
            <t>R-ABSTRACT: The solution <bcp14>SHOULD</bcp14> abstract names from IP addresses.</t>
          </li>
        </ul>
        <t>Any given name should be resolvable to a mixture of IPv4, IPv6
Link-Local (on an Interface), IPv6 ULA, and IPv6 Globally-Routable
addresses. Operating a local DNS is beyond the scope of many
administrators, so being able to advertise the server using
<xref target="DNS-SD"/> is necessary.</t>
        <ul empty="true">
          <li>
            <t>R-DNS-SD: The name <bcp14>MUST</bcp14> be advertisable using <xref target="DNS-SD"/></t>
          </li>
        </ul>
      </section>
      <section anchor="avoid-central-authority">
        <name>Avoid Central Authority</name>
        <t>A solution needs to be self-contained and not use the central
authority of PKIX.  Being self-contained also removes reliance
on a device vendor (to operate a centralized service).</t>
        <ul empty="true">
          <li>
            <t>R-AVOID-CENTRAL: A solution <bcp14>MUST NOT</bcp14> rely on central
  trust hierarchy.</t>
          </li>
        </ul>
        <t>Vendors go out of business or lose interest in continuing to service
old products. The products may still be operational.</t>
        <ul empty="true">
          <li>
            <t>R-AVOID-VENDOR: A solution <bcp14>SHOULD NOT</bcp14> (<bcp14>MUST NOT</bcp14>?) have continued
  reliance on a service operated by a vendor, including if the device
  is reset to factory defaults (e.g., reset for troubleshotting or
  because sold).</t>
          </li>
        </ul>
      </section>
      <section anchor="multiple-application-protocols">
        <name>Multiple Application Protocols</name>
        <t>A solution has to support HTTPS because it is frequently used for
device management.</t>
        <ul empty="true">
          <li>
            <t>R-HTTPS: A solution <bcp14>MUST</bcp14> support HTTPS.</t>
          </li>
        </ul>
        <t>Other encrypted protocols are also frequently used on local networks
for DNS, file sharing, mail, and telephony.</t>
        <ul empty="true">
          <li>
            <t>R-MULT-APP: A solution <bcp14>SHOULD</bcp14> support other application-level
  protocols such as DoT <xref target="RFC7858"/>, SMB over
  QUIC <xref target="smb-quic"/>, IMAP <xref target="RFC8314"/>, and SIP <xref target="RFC3261"/>, as
  those protocols are routinely served within a local domain.</t>
          </li>
        </ul>
      </section>
      <section anchor="cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>A solution has to support moving to new cryptographic functions.</t>
        <ul empty="true">
          <li>
            <t>R-AGILITY: A solution <bcp14>SHOULD</bcp14> support cryptographic agility (such as
  supporting more than one active key type and different hashes).</t>
          </li>
        </ul>
      </section>
      <section anchor="tls-server-name-indication">
        <name>TLS Server Name Indication</name>
        <t>TLS servers frequently use the TLS SNI <xref target="RFC6066"/> extension to
support multiple identities on a single server.</t>
        <ul empty="true">
          <li>
            <t>R-TLS-SNI: A solution <bcp14>SHOULD</bcp14> support TLS SNI so a server knows which
  key pair/cert is expected.</t>
          </li>
        </ul>
      </section>
      <section anchor="w3c-private-network-access">
        <name>W3C Private Network Access</name>
        <t>To prevent various attacks, W3C has constrained how browsers operate
on private networks</t>
        <ul empty="true">
          <li>
            <t>R-PNA: A solution <bcp14>SHOULD</bcp14> integrate well with an evolution of
<xref target="w3c-pna"/> and both allow for an improved model there but should also
provide more robust solutions to vulnerabilities that it tries to
address</t>
          </li>
        </ul>
      </section>
      <section anchor="operate-with-local-resources">
        <name>Operate with Local Resources</name>
        <t>The TLDs ".local" and ".internal" are defined local domains and
enterprise networks usually have a site domain
("internal.example.com").  A solution that scales from a home
network to an enterprise network is desirable.</t>
        <ul empty="true">
          <li>
            <t>R-LOCAL: A solution <bcp14>MUST</bcp14> operate with  .local and .internal, and <bcp14>SHOULD</bcp14>
operate with an administratively-defined zone (e.g., internal.example.com).</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discuss: <bcp14>MAY</bcp14> constrain to the DHCP domain-search value??  Should we
also allow any arbitrary name if the IP address is local (RFC1918
address), too?</t>
          </li>
        </ul>
      </section>
      <section anchor="operate-standalone">
        <name>Operate Standalone</name>
        <t>The system needs to operate without a connection to the Internet.
This is necessary because Internet connectivity is sometimes flaky or
unavailable (e.g., cabin in the woods, lengthy ISP outage).</t>
        <ul empty="true">
          <li>
            <t>R-STANDALONE: <bcp14>MUST NOT</bcp14> require Internet connectivity to operate
securely, for its initial configuration, or to add or remove a device
from list of authorized devices in the system.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discuss: perhaps want to refine wording of this requirement, or
split into separate requirements.</t>
          </li>
        </ul>
      </section>
      <section anchor="web-origin">
        <name>Web Origin</name>
        <t>The Web Origin is comprised of the scheme (e.g., "https:"), hostname, and port.  Today,
when a key rotation occurs the Web Origin remains the same.  In this way, things like
stored web data (forms, passwords, cookies) can be used even after a key rotation.</t>
        <ul empty="true">
          <li>
            <t>R-WEB-ORIGIN:  The Web Origin <bcp14>MUST</bcp14> be retained during key rotation.</t>
          </li>
        </ul>
      </section>
      <section anchor="miscellaneous">
        <name>Miscellaneous</name>
        <ol spacing="normal" type="1"><li>
            <t>It <bcp14>SHOULD</bcp14> be possible to have a way to represent a URI that
includes a single specific IP address and the cryptographic identity
of the service endpoint.</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t><bcp14>SHOULD</bcp14> support key rotation (even if via 301 redirect)</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Q: is it acceptable to state to be lost here?  Note: likely cannot
do 301 if doing TLS (HTTPS).  Is this suggestion to start HTTP and
upgrade to HTTPS?  Could be useful for HTTPS but redirect unavailable
for IPP, SMB, DoH.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t><bcp14>SHOULD</bcp14> support building trust relationships within devices in the
local environment</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Could this help with HTTPS access to Wi-Fi login portals
(<xref target="RFC8952"/>, <xref target="RFC8910"/>)?</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Discuss: the above requirement needs to be re-written.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="human-factors-requirements">
      <name>Human Factors Requirements</name>
      <section anchor="discoverable">
        <name>Discoverable</name>
        <t>Most local networks, especially home networks, do not operate their
own DNS server.  Many clients already support listening for DNS-SD
broadcasts.</t>
        <ul empty="true">
          <li>
            <t>R-DISCOVER: A solution <bcp14>SHOULD</bcp14> have a way to do discovery of
endpoints and their identities (for example, via <xref target="DNS-SD"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="easy-to-use">
        <name>Easy to Use</name>
        <t>Successful solutions are usually also easy to deploy.</t>
        <ul empty="true">
          <li>
            <t>R-EASY: A solution <bcp14>SHOULD</bcp14> have human factors and adversarial testing
on proposed solutions to make sure that this solution provides a
reasonable experience to average and novice end-users and does not
introduce new security exploitation vectors</t>
          </li>
        </ul>
      </section>
      <section anchor="bookmarkable">
        <name>Bookmarkable</name>
        <t>Names (or aliases to those names) should be simple for users -- ideally,
user-defined so that if the underlying name is complex the user can
create an alias that is meaningful to them.</t>
        <ul empty="true">
          <li>
            <t>R-BOOKMARK: A solution <bcp14>SHOULD</bcp14> have a URI that users can Bookmark to create an association
to a friendly name.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Discussion: Can URL bar of the browser honor mDNS/DNSSD advertised
names, or give a pull-down of them similar to how the "add printer"
dialog does for printers?  This would help ease the use of long FQDN
so it's almost as easy as router.local.  Especially if it could show a
nickname that is configured by the printer.  Browser extensions
exist for DNS-SD and mDNS (<xref target="Safari-ext"/>, <xref target="Firefox-ext"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="human-friendly-name">
        <name>Human-friendly Name</name>
        <t>Names (or aliases to those names) should be simple for users -- ideally,
user-defined so that if the underlying name is complex the user can
create an alias that is meaningful to them.</t>
        <ul empty="true">
          <li>
            <t>R-CONSISTENT: A solution <bcp14>SHOULD</bcp14> represent these URIs to humans in a
consistent, readable, and non-confusing fashion.  (In a browser,
users shouldn't see the key fingerprint by default but rather a
representation of its presence)</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="big-open-questions">
      <name>Big Open Questions</name>
      <section anchor="trust-on-first-use-tofu">
        <name>Trust on First Use (TOFU)</name>
        <t>As evidenced by web browser behavior over the years with self-signed certificates
and their (increased) warnings, TOFU will not be acceptable.</t>
      </section>
      <section anchor="user-experience">
        <name>User Experience</name>
        <t>For a solution, what is the User Experience for any trust relationship / web-of-trust?</t>
      </section>
      <section anchor="trust-relationship">
        <name>Trust Relationship</name>
        <t>For a solution, what is the nature of the trust relationship?</t>
        <ul spacing="normal">
          <li>
            <t>Peer trust web?</t>
          </li>
          <li>
            <t>Central CA within the local environment / trust clearing house?</t>
          </li>
          <li>
            <t>Client establishes its own trust to the server</t>
          </li>
        </ul>
      </section>
      <section anchor="interaction-with-matterthread">
        <name>Interaction with Matter/Thread</name>
        <t>How does a solution tie into systems like Matter/Thread that have their own trust establishment frameworks?</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>For the below, "Secure communications" means being able to make a TLS
connection to a service such that the service is able to authenticate
itself in a way to prevent MitM attacks.  The security model must be
TOFU at a minimum, but when the identity of a service is none it
should be possible to send it as a URI in such as a way to present a
secure association rooted in the connection that sent it:</t>
      <ul spacing="normal">
        <li>
          <t>Secure communications via HTTPS to admin interfaces on CPEs for
both initial and ongoing configuration tasks of various servers
(router, printer, NAS, etc.).</t>
        </li>
        <li>
          <t>Secure communications to DoH/DoT servers on CPEs</t>
        </li>
        <li>
          <t>Secure communications to printers (IPPS <xref target="RFC7472"/> printing)</t>
        </li>
        <li>
          <t>Secure communications to other local services (SMB over QUIC to
another workstation or a NAS) and IoT devices</t>
        </li>
        <li>
          <t>Secure communications to localhost processes from a browser (e.g.,
admin tools)</t>
        </li>
      </ul>
    </section>
    <section anchor="related">
      <name>Related Work</name>
      <t>Martin Thomson wrote HTTPS for Local Domains <xref target="thomson-hld"/> which
covers requirements, discusses several solutions and their tradeoffs,
and suggests a solution where the client extends the Web Origin to
include the server's public key. It does not allow the server to
rotate its public key as that would change the extended Web Origin (see
<xref target="web-origin"/>).</t>
      <t>Dan Wing has proposed a Referee system <xref target="I-D.wing-settle-referee"/>
which uses a new HTTPS-based server to authorize servers public keys
(akin to an allowlist or to OCSP stapling) and encoding the server's
public key into its hostname.  Like <xref target="thomson-hld"/>, it does not allow
a server to rotate its key (see <xref target="web-origin"/>).</t>
      <t>Michael Sweet has proposed a locally-deployed Certification Authority
<xref target="I-D.sweet-iot-acme"/> that can be incrementally deployed.</t>
      <t>W3C worked on this problem from 2017 through 2021 <xref target="w3c-httpslocal"/>. More recently,
W3C had a workshop on the problem in September 2024 <xref target="tpac"/>.</t>
      <t>W3C has a working draft on OpenScreen Network Protocol <xref target="w3c-onsp"/> which
establish trust between devices for the purposes of media casting and
remote presentation using DNS-SD, TLS for an initial unauthenticated
connection, SPAKE2 to validate mutual identity and exchange
certificates.</t>
      <t>W3C WICG also has a working draft on Peer-to-Peer API <xref target="w3c-local-peer"/>
that layers a web API on top of the OpenScreen Network Protocol to
allow local communication between browsers without the aid of a
server. It contains proposed APIs for the following on a local
network: peer advertising, peer discovery and authentication,
and establishing a WebTransport.</t>
      <t>The boundaries of a limited domain -- such as the local domain described in this
document -- are explored in <xref section="6" sectionFormat="of" target="RFC8799"/>.</t>
      <t>The IOTOPS working group and the associated IOT Security Foundation
<xref target="iotsf"/> discussed the problem and some requirements in their white
paper <xref target="iotops-suib"/> and presentation to IOTOPS working group at
IETF112 <xref target="iotops-suib-prezo"/>.</t>
      <t>A threshold key system is described and implemented at <xref target="phb-mesh"/> with the following
description:</t>
      <ul empty="true">
        <li>
          <t>The Mesh is designed to provide users with the highest level of
  security that is possible without asking them to do anything at
  all. For this to become possible, the Mesh will have to be shipped
  to users as part of the machine Operating System.</t>
        </li>
      </ul>
      <t>A summary of the problem and analysis of several solutions
(Locally-installed CAs, Plex, WebRTC and WebTransport, TOFU, shared
secrets) and some drawbacks of those solutions is at <xref target="stark"/>.</t>
      <t>A method using PAKE and a shared secret (displayed on the server) is
explained at <xref target="shared"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="thomson-hld" target="https://docs.google.com/document/u/0/d/170rFC91jqvpFrKIqG4K8Vox8AL4LeQXzfikBQXYPmzU/edit">
          <front>
            <title>HTTPS for Local Domains</title>
            <author initials="M." surname="Thomson" fullname="Martin Thomson">
              <organization/>
            </author>
            <date year="2017" month="September"/>
          </front>
        </reference>
        <reference anchor="Safari-ext" target="https://apps.apple.com/ca/app/discovery-dns-sd-browser/id1381004916?mt=12">
          <front>
            <title>Discovery - DNS-SD Browser</title>
            <author initials="L." surname="Ballard" fullname="Lily Ballard">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="Firefox-ext" target="https://addons.mozilla.org/en-US/firefox/addon/mdns-discover/">
          <front>
            <title>mDNS Discover</title>
            <author initials="D." surname="Smith" fullname="Dale Smith">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="tpac" target="https://github.com/w3c/tpac2024-breakouts/issues/78">
          <front>
            <title>HTTPS for Local Networks</title>
            <author initials="C." surname="IL" fullname="Carlos IL">
              <organization>W3C</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="phb-mesh" target="https://github.com/hallambaker/Mathematical-Mesh">
          <front>
            <title>Mathematical Mesh</title>
            <author initials="P." surname="Hallam-Baker" fullname="Phillip Hallam-Baker">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="zookotriangle" target="https://en.wikipedia.org/wiki/Zooko%27s_triangle">
          <front>
            <title>Zooko's triangle</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="iotops-suib-prezo" target="https://datatracker.ietf.org/meeting/112/materials/slides-112-iotops-suib-browsing-local-web-resources-in-a-secure-usable-manner-iot-device-configuration-as-a-special-case-00.pdf">
          <front>
            <title>SUIB: Browsing local web resources in a secure usable manner</title>
            <author initials="J." surname="Geertsma" fullname="Jan Geertsma">
              <organization/>
            </author>
            <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
              <organization/>
            </author>
            <author initials="M." surname="Richardson" fullname="Micheal Richardson">
              <organization/>
            </author>
            <author initials="N." surname="Allott" fullname="Nick Allott">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
          <annotation>Presentation of IOT Security Foundation SUIB to IETF112 IOTOPS working group</annotation>
        </reference>
        <reference anchor="iotops-suib" target="https://iotsecurityfoundation.org/wp-content/uploads/2021/08/ManySecured-SUIB-White-Paper.pdf">
          <front>
            <title>SUIB: Router and IoT Vulnerabilities: Insecure by Design</title>
            <author>
              <organization>IOT Security Foundation</organization>
            </author>
            <date year="2021" month="August"/>
          </front>
        </reference>
        <reference anchor="iotsf" target="https://iotsecurityfoundation.org">
          <front>
            <title>IOT Security Foundation</title>
            <author>
              <organization/>
            </author>
            <date year="2015" month="September"/>
          </front>
        </reference>
        <reference anchor="stark" target="https://emilymstark.com/2021/12/24/when-a-web-pki-certificate-wont-cut-it.html">
          <front>
            <title>When a web PKI certificate won't cut it</title>
            <author initials="E. M." surname="Stark" fullname="Emily M. Stark">
              <organization/>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="shared" target="https://httpslocal.github.io/proposals/#approach-2">
          <front>
            <title>APPROACH-2: Using Shared Secret</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="plex" target="https://words.filippo.io/how-plex-is-doing-https-for-all-its-users/">
          <front>
            <title>How Plex Is Doing Https for All Its Users</title>
            <author initials="F." surname="Valsorda" fullname="Filippo Valsorda">
              <organization/>
            </author>
            <date year="2015" month="June"/>
          </front>
        </reference>
        <reference anchor="w3c-httpslocal" target="https://github.com/httpslocal">
          <front>
            <title>HTTPS in Local Network Community Group</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="w3c-pna" target="https://wicg.github.io/private-network-access/">
          <front>
            <title>Private Network Access</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="sec-context" target="https://w3c.github.io/webappsec-secure-contexts/">
          <front>
            <title>Secure Contexts</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="not-secure" target="https://blog.chromium.org/2018/02/a-secure-web-is-here-to-stay.html">
          <front>
            <title>A secure web is here to stay</title>
            <author>
              <organization>Google</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="smb-quic" target="https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-over-quic">
          <front>
            <title>SMB over QUIC</title>
            <author>
              <organization>Microsoft</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="everywhere" target="https://www.eff.org/https-everywhere">
          <front>
            <title>HTTPS Everywhere</title>
            <author>
              <organization>EFF</organization>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="w3c-onsp" target="https://www.w3.org/TR/openscreen-network/">
          <front>
            <title>Open Screen Network Protocol</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="w3c-local-peer" target="https://wicg.github.io/local-peer-to-peer/">
          <front>
            <title>Local Peer-to-Peer API</title>
            <author>
              <organization>W3C WICG</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="DNS-SD">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8314">
          <front>
            <title>Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access</title>
            <author fullname="K. Moore" initials="K." surname="Moore"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This specification outlines current recommendations for the use of Transport Layer Security (TLS) to provide confidentiality of email traffic between a Mail User Agent (MUA) and a Mail Submission Server or Mail Access Server. This document updates RFCs 1939, 2595, 3501, 5068, 6186, and 6409.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8314"/>
          <seriesInfo name="DOI" value="10.17487/RFC8314"/>
        </reference>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC8910">
          <front>
            <title>Captive-Portal Identification in DHCP and Router Advertisements (RAs)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>In many environments offering short-term or temporary Internet access (such as coffee shops), it is common to start new connections in a captive portal mode. This highly restricts what the user can do until the user has satisfied the captive portal conditions.</t>
              <t>This document describes a DHCPv4 and DHCPv6 option and a Router Advertisement (RA) option to inform clients that they are behind some sort of captive portal enforcement device, and that they will need to satisfy the Captive Portal conditions to get Internet access. It is not a full solution to address all of the issues that clients may have with captive portals; it is designed to be one component of a standardized approach for hosts to interact with such portals. While this document defines how the network operator may convey the captive portal API endpoint to hosts, the specific methods of satisfying and interacting with the captive portal are out of scope of this document.</t>
              <t>This document replaces RFC 7710, which used DHCP code point 160. Due to a conflict, this document specifies 114. Consequently, this document also updates RFC 3679.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8910"/>
          <seriesInfo name="DOI" value="10.17487/RFC8910"/>
        </reference>
        <reference anchor="RFC7472">
          <front>
            <title>Internet Printing Protocol (IPP) over HTTPS Transport Binding and the 'ipps' URI Scheme</title>
            <author fullname="I. McDonald" initials="I." surname="McDonald"/>
            <author fullname="M. Sweet" initials="M." surname="Sweet"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document defines the Internet Printing Protocol (IPP) over HTTPS transport binding and the corresponding 'ipps' URI scheme, which is used to designate the access to the network location of a secure IPP print service or a network resource managed by such a service.</t>
              <t>This document defines an alternate IPP transport binding to that defined in the original IPP URL Scheme (RFC 3510), but this document does not update or obsolete RFC 3510.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7472"/>
          <seriesInfo name="DOI" value="10.17487/RFC7472"/>
        </reference>
        <reference anchor="I-D.wing-settle-referee">
          <front>
            <title>A Referee to Authenticate Servers in Local Domains</title>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix</organization>
            </author>
            <date day="7" month="January" year="2025"/>
            <abstract>
              <t>   Obtaining and maintaining PKI certificates for devices in a local
   domain network is difficult for both technical and human factors
   reasons.  This document describes an alternative approach to securely
   identify and authenticate servers in the local domain using a HTTPS-
   based trust anchor system, called a Referee.  The Referee allows
   bootstrapping a network of devices by trusting only the Referee trust
   anchor in the local domain.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wing-settle-referee-00"/>
        </reference>
        <reference anchor="I-D.sweet-iot-acme">
          <front>
            <title>ACME-Based Provisioning of IoT Devices</title>
            <author fullname="Michael Sweet" initials="M." surname="Sweet">
              <organization>Lakeside Robotics Corporation</organization>
            </author>
            <date day="7" month="February" year="2025"/>
            <abstract>
              <t>   This document extends the Automatic Certificate Management
   Environment (ACME) to provision X.509 certificates for local Internet
   of Things (IoT) devices that are accepted by existing web browsers
   and other software running on End User client devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sweet-iot-acme-07"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
      </references>
    </references>
    <?line 661?>

<section anchor="change-history">
      <name>Change History</name>
      <section anchor="changes-in-01">
        <name>Changes in -01</name>
        <ul spacing="normal">
          <li>
            <t>Changed to 2010 (from 2017) when the problem of local domain
authentication was first discussed.</t>
          </li>
          <li>
            <t>Rather than simple name collision ("printer.local"), discuss how most
products include the device's (partial) MAC address -- which does help
distinguishing devices on different networks. Also explain how an attacker
can use that name.</t>
          </li>
          <li>
            <t>R-AVOID-CENTRAL changed from <bcp14>SHOULD</bcp14> to <bcp14>MUST</bcp14>.</t>
          </li>
          <li>
            <t>Justification text added to almost all R- requirements.</t>
          </li>
          <li>
            <t>Removed R-LOCALHOST, which had said "localhost" should be handled same
as a local domain.  This was removed because localhost is not a unique
name causing other problems for a solution.</t>
          </li>
          <li>
            <t>R-LOCAL expanded to also cover administratively-defined zone (e.g.,
internal.example.com)</t>
          </li>
          <li>
            <t>Refined R-STANDALONE.</t>
          </li>
          <li>
            <t>Added R-WEB-ORIGIN, and moved key rotation requirement into
R-WEB-ORIGIN to say the web origin has to stay the same if the key
is rotated.</t>
          </li>
          <li>
            <t>Declared TOFU as unacceptable (was a question).</t>
          </li>
          <li>
            <t>As Related Work, added: Referee, locally-deployed CA, W3C OpenScreen
Network Protocol, W3C WICG Peer-to-Peer API.</t>
          </li>
          <li>
            <t>Added pointers to DNS-SD and mDNS extensions for web browsers.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Michael Sweet for his review and feedback.  Thanks to
Michiel De Backker for references to related W3C work.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
