Internet DRAFT - draft-mattsson-acme-use-cases

draft-mattsson-acme-use-cases







Network Working Group                                        J. Mattsson
Internet-Draft                                                   R. Skog
Intended status: Informational                                  Ericsson
Expires: September 10, 2015                                March 9, 2015


    Additional Use Cases for Automatic Certificate Management (ACME)
                    draft-mattsson-acme-use-cases-00

Abstract

   Contacting a CA is just one way in which a newly deployed HTTPS
   server can get hold of the certificate to use.  This document
   describes additional (and common) use cases that fall into the major
   guiding use case for ACME as stated by [I-D.barnes-acme], "obtaining
   certificates for Web sites".

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 10, 2015.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



Mattsson & Skog        Expires September 10, 2015               [Page 1]

Internet-Draft               ACME Use Cases                   March 2015


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Additional Use Cases  . . . . . . . . . . . . . . . . . . . .   2
   3.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   5
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   It is well known that security features should be on by default and
   automatically configured.  Otherwise the risk is overwhelming that
   the security features are left unused, or used in non-secure ways.
   One important task that benefits from more automation is certificate
   management.

   The document [I-D.barnes-acme] describes the use case where an HTTPS
   web server contacts a certification authority (CA) to request (and
   often pay for) a new domain validation certificate for a domain.  But
   contacting a CA is just one way in which a newly deployed HTTPS
   server can get hold of the certificate to use.

   This document describes additional (and common) use cases that fall
   into the major guiding use case for ACME as stated by [I-D.barnes-
   acme], "obtaining certificates for Web sites".  To fulfill the needs
   of these use cases, we introduce the following certificate management
   function for ACME:

   o  Certificate Download

   where the ACME server is not the CA, but rather a server operated by
   the domain owner.

   Just as the main scenario in [I-D.barnes-acme], the scenarios in this
   document often uses a collection of ad hoc mechanisms.  And while [I-
   D.barnes-acme] mentions the already horrible 1-3 hours to obtain and
   install certificates for a newly deployed HTTPS server, the process
   of transferring an existing certificate can be even more time
   consuming, and people flying back on forth just to manually transfer
   certificates is not unheard of.

2.  Additional Use Cases

   A newly deployed HTTPS server replacing or complementing an existing
   HTTPS server should import an existing certificate instead of buying
   a new.  In the flow diagram in Figure 1, the new HTTPS server (ACME
   CLIENT) requests, downloads, and imports an existing certificate from
   a server (ACME SERVER).  A PKCS#10 Certificate Signing Request (CSR)
   cannot be used as that creates a new certificate.  Instead the client



Mattsson & Skog        Expires September 10, 2015               [Page 2]

Internet-Draft               ACME Use Cases                   March 2015


   sends a request (here called CertDownload) to request download of an
   existing certificate.  Authorization may e.g. be based on
   authentication of the computer operator.

                ACME CLIENT                   ACME SERVER


                Identifier      ------->

                                <-------      Challenges

                Responses       ------->

                                <-------      Authorization

                CertDownload    ------->

                                <-------      Certificate

                Figure 1: Downloading existing certificate

   A large domain with several virtualized HTTPS servers is likely to
   have a centralized certificate repository, and a newly deployed HTTPS
   server should download a certificate from the central repository.
   The flow diagram in Figure 2 shows two separate ACME sessions.  First
   the repository (acting as an ACME client) requests a new certificate
   from the CA (ACME server).  Secondly the HTTPS server (ACME client)
   downloads the certificate from the repository (now acting as an ACME
   server).  The two sessions are usually separated in time.






















Mattsson & Skog        Expires September 10, 2015               [Page 3]

Internet-Draft               ACME Use Cases                   March 2015


HTTPS SERVER                  REPOSITORY                              CA


                              Identifier       ------->

                                               <-------       Challenges

                              Responses        ------->

                                               <-------    Authorization

                              CSR              ------->

                                               <-------      Certificate
Identifier      ------->

                <-------      Challenges

Responses       ------->

                <-------      Authorization

CertDownload    ------->

                <-------      Certificate

         Figure 2: Downloading certificate from central repository

   A newly deployed HTTPS server operated by another juridical person
   (e.g. a CDN provider) cannot (and shouldn't be able to) prove
   ownership of the domain.  The message flow in Figure 2 with two
   serial ACME sessions might be used also in this case.  But the domain
   owner might be unwilling to distribute its ordinary long-term domain
   certificate.  Instead the domain owner might only authorize the HTTPS
   sever to obtain a certificate with certain restriction.  The
   restrictions could be that the certificate is only valid for a
   certain subdomain (e.g. cdn-aXtckW7K3Rgf29UPuGUF@example.com) and
   with a restricted lifetime (days instead of years).  In this case two
   parallel ACME sessions may be used where the HTTPS server first
   contacts the domain owner, who proves ownership of the domain to the
   CA, and then forwards the newly issued certificate to the HTTPS
   server.  An example message flow is shown in Figure 3.  Authorization
   may e.g. be based on the HTTPS server proving ownership of a DV, OV,
   or EV certificate (perhaps issued in an earlier ACME session).







Mattsson & Skog        Expires September 10, 2015               [Page 4]

Internet-Draft               ACME Use Cases                   March 2015


HTTPS SERVER                  DOMAIN OWNER                            CA


Identifier      ------->
                              Identifier       ------->

                                               <-------       Challenges
                <-------      Challenges


Responses       ------->
                              Responses        ------->

                                               <-------    Authorization
                <-------      Authorization


CSR             ------->
                              CSR              ------->

                                               <-------      Certificate
                <-------      Certificate

             Figure 3: Obtaining certificate with restrictions

3.  References

   [I-D.barnes-acme]
              Barnes, R., Eckersley, P., Schoen, S., Halderman, A., and
              J. Kasten, "Automatic Certificate Management Environment
              (ACME)", draft-barnes-acme-01 (work in progress), January
              2015.

Authors' Addresses

   John Mattsson
   Ericsson AB
   SE-164 80 Stockholm
   Sweden

   Email: john.mattsson@ericsson.com










Mattsson & Skog        Expires September 10, 2015               [Page 5]

Internet-Draft               ACME Use Cases                   March 2015


   Robert Skog
   Ericsson AB
   SE-164 80 Stockholm
   Sweden

   Email: robert.skog@ericsson.com













































Mattsson & Skog        Expires September 10, 2015               [Page 6]