<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birgelee-lamps-caa-security-01" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="CAA Security Tag">CAA Security Tag for Cryptographic Domain Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-birgelee-lamps-caa-security-01"/>
    <author fullname="Henry Birge-Lee">
      <organization>Princeton University</organization>
      <address>
        <email>birgelee@princeton.edu</email>
      </address>
    </author>
    <author fullname="Grace Cimaszewski">
      <organization>Princeton University</organization>
      <address>
        <email>gcimaszewski@princeton.edu</email>
      </address>
    </author>
    <author fullname="Cyrill E. Krähenbühl">
      <organization>Princeton University</organization>
      <address>
        <email>cyrill.k@princeton.edu</email>
      </address>
    </author>
    <author fullname="Liang Wang">
      <organization>Princeton University</organization>
      <address>
        <email>lw19@princeton.edu</email>
      </address>
    </author>
    <author fullname="Aaron Gable">
      <organization>ISRG</organization>
      <address>
        <email>aaron@letsencrypt.org</email>
      </address>
    </author>
    <author fullname="Prateek Mittal">
      <organization>Princeton University</organization>
      <address>
        <email>pmittal@princeton.edu</email>
      </address>
    </author>
    <date year="2025" month="March" day="19"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>PKI</keyword>
    <keyword>CAA</keyword>
    <abstract>
      <?line 68?>

<t>Cryptographic domain validation procedures leverage authenticated communication channels to ensure resilience against attacks by both on-path and off-path network adversaries which may be located between the CA and the network resources related to the domain contained in the certificate.
Domain owners can leverage "security" Property Tags specified in CAA records (defined in <xref target="RFC8659"/>) with the critical flag set, to ensure that CAs perform cryptographic domain validation during their issuance procedure, hence defending against global man-in-the-middle adversaries.
This document defines the syntax of the CAA security Property as well as acceptable means for cryptographic domain validation procedures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://birgelee.github.io/draft-caa-security-tag/draft-birgelee-lamps-caa-security.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birgelee-lamps-caa-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/birgelee/draft-caa-security-tag"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A CAA security Property Tag is compliant with <xref target="RFC8659"/> and puts restrictions on the circumstances under which a CA is allowed to sign a certificate for a given domain.
A security Property Tag on a domain implies that validation for this domain must be done in a manner that defends against network adversaries even if an adversary is capable of intercepting and/or modifying communication between the CA and the network resources related to the domain being validated.
Issuance of a certificate to a domain with a security Property Tag <bcp14>MUST</bcp14> follow one of the specified Cryptographic Domain Validation (CDV) methods outlined in this document or future extensions.
CDV methods <bcp14>MUST</bcp14> rely on cryptographic protocols (like DNSSEC or DoH/DoT) that offer security properties even in the presence of man-in-the-middle adversaries that can intercept any communication occurring over the public Internet.</t>
      <t>Not all CDV methods are themselves compliant with the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
Hence, any CDV method that does not meet the CA/Browser Forum Baseline Requirements for TLS server certificate issuance must be used in conjunction with such a compliant domain validation method.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="cryptographic-domain-validation">
        <name>Cryptographic Domain Validation</name>
        <t>The goal of cryptographic domain validation is to ensure that domain validation is based on communication channels that are authenticated through cryptographic operations.</t>
        <section anchor="threat-model">
          <name>Threat Model</name>
          <t>Cryptographic domain validation defends against a network adversary that can block, intercept, modify, and forge arbitrary network packets sent between a CA and the domain's network resources, but cannot forge cryptographic objects, such as signatures and encrypted data.
Cryptographic domain validation is based on DNS and thus assumes that a domain owner can securely mange their DNS records, i.e., communication between the domain owner and their DNS infrastructure is protected against network adversaries.
Similarly, communication between the entity generating the private key and requesting the certificate, e.g., the domain owner, and the webserver(s) where the private key and certificate are installed, is assumed to be protected against network adversaries.
Furthermore, it assumes that all CAs are benign and correctly follow all necessary validation procedures as described in the relevant standardization documents.</t>
          <t>Cryptographic domain validation can be used on domains that are contained in both domain validation certificates (where only the domain name in a certificate is validated) and extended or organization validated certificates (where information like organization identity as well as domain name is validated).
Cryptographic domain validation only hardens the security of the validation of domain names, not broader identities (e.g., organization names).
The use of cryptographic domain validation in an OV or EV certificate only improves the validation of the domain name(s) contained in the certificate (in the common name or subject-alternate names fields) and does not impact the validation of other forms of identity contained in the certificate.
Use of cryptographic domain validation in a DV certificate does not imply validation of any identity beyond the domain name(s) in the certificate.</t>
          <t>The defense involves the domain owner specifying a policy indicating their desire for cryptographic domain validation via DNS CAA records and securely communicating these records to all CAs.
Hence, a core aspect of cryptographic domain validation is 1) ensuring secure policy lookups, and 2) preventing downgrade attacks that convince a CA to issue a certificate using non-cryptographic domain validation.</t>
        </section>
        <section anchor="secure-policy-lookup">
          <name>Secure Policy Lookup</name>
          <t>The authenticity of the retrieved security CAA record <bcp14>SHOULD</bcp14> be protected to prevent an active network adversary from modifying its content.
Authenticity can either be ensured by signing the security CAA record or by retrieving the security CAA record via an authenticated channel.
Any security CAA record not protected by such a signature or authenticated channel may not benefit from the security properties outlined in this document.</t>
          <section anchor="signed-record">
            <name>Signed Record</name>
            <t>A security CAA record <bcp14>SHOULD</bcp14> be protected with a valid DNSSEC signature chain going back to the ICANN DNSSEC root, to prove the authenticity of the record and its content.</t>
          </section>
          <section anchor="authenticated-channel">
            <name>Authenticated Channel</name>
            <t>If it is not possible to have a DNSSEC signature chain back to the ICANN root, security CAA records <bcp14>SHOULD</bcp14> alternately be hosted on an authoritative DNS resolver that supports recursive-to-authoritative authenticated channels.
Authenticated channels between recursive and authoritative nameservers could be deployed as described in <xref target="RFC9539"/> and leverage DoT, DoQ, or DoH as protocols providing an authenticated channel.
Since secure policy lookup considers a more stringent threat model than the passive network adversary in <xref target="RFC9539"/>, the deployment <bcp14>MUST</bcp14> also implement defenses against active adversaries highlighted in <xref section="B" sectionFormat="of" target="RFC9539"/>.
One option to implement these defenses is by creating DNSSEC-protected SVCB DNS records at the authoritative nameserver.
These SVCB records provide a signaling mechanism for authoritative nameservers offering authenticated channel.
Furthermore, the authenticity of the TLS certificate public key used to establish the channel <bcp14>MUST</bcp14> be protected, e.g., by specifying the public key hash as an SVCB parameter.
This step is crucial to achieve our desired security properties, since it eliminates the circular dependency of requiring an authentic TLS certificate to secure the issuance of new TLS certificate.</t>
          </section>
        </section>
        <section anchor="downgrade-prevention">
          <name>Downgrade Prevention</name>
          <t>To ensure that the CAA security Property is immediately and incrementally deployable without requiring all publicly-trusted CAs to understand the property, the CAA record containing the property <bcp14>MUST</bcp14> set the critical flag.</t>
          <t>Serving security CAA records over authenticated DNS channels or using authenticated DNS records (i.e., DNSSEC) is critical to the effectiveness of the records because a security CAA record not protected by authenticated DNS may be suppressed by an adversary that can manipulate DNS responses.
This could potentially allow the adversary to downgrade validation to use a low-security method and undermine the security properties of the security Property Tag.</t>
          <t>If DNSSEC is used to authenticate the CAA record, a CA <bcp14>MUST</bcp14> only accept the non-existence of a security CAA record if its non-existence is proven by NSEC record as described in <xref target="RFC7129"/>.</t>
          <t>If authenticated channels are used to authenticate the CAA record, CAs <bcp14>MUST</bcp14> also require recursive-to-authoritative DoT or DoH communication (and not permit standard unencrypted DNS connections) for DNS providers that host security CAA records.
This prevents downgrade attacks where an adversary attempts to interfere with the establishment of a DoT or DoH encrypted channel and cause a fallback to unencrypted DNS over UDP or TCP.</t>
        </section>
      </section>
    </section>
    <section anchor="caa-security-property">
      <name>CAA security Property</name>
      <t>The CAA security Property Tag <bcp14>MUST</bcp14> be "security" and the flags field of a CAA record containing the security Property <bcp14>MUST</bcp14> have the critical bit set.
In this document, we refer to a CAA record with these characteristics as a <strong>security CAA record</strong>.</t>
      <section anchor="syntax">
        <name>Syntax</name>
        <t>The CAA security Property Value has the following sub-syntax (specified in ABNF as per <xref target="RFC5234"/>).</t>
        <artwork><![CDATA[
security-value = *WSP [attribute-list] *WSP

attribute-list = (attribute *WSP ";" *WSP attribute-list) / attribute
attribute = attribute-name *WSP "=" *WSP attribute-value

attribute-name = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT))
attribute-value = *(value-char / WSP) value-char *(value-char / WSP)
value-char = %x21-3A / %x3C-7E
]]></artwork>
        <t>Hence, the security Property Value can either be empty or entirely whitespace, or contain a list of semicolon-separated attribute name-value pairs.</t>
        <t>Similar to <xref target="RFC8659"/>, attribute names are specified in letter-digit-hyphen Label (LDH-Label) form while attribute values can contain whitespace and any printable character except semicolon.
Note that attribute values <bcp14>MUST</bcp14> contain at least one printable (non-whitespace) character.</t>
        <t>All attributes specified in an attribute-list <bcp14>MUST</bcp14> be unique.
An attribute-list <bcp14>MUST NOT</bcp14> have two attributes with the same name specified even if they contain different attribute values.</t>
      </section>
      <section anchor="well-known-attributes">
        <name>Well-known Attributes</name>
        <t>The attribute-list <bcp14>MAY</bcp14> contain the following attributes.</t>
        <t>The attribute values of the attributes specified in this document have the following sub-syntax (specified in ABNF as per <xref target="RFC5234"/>).</t>
        <artwork><![CDATA[
well-known-attribute-value = *WSP comma-sep-list *WSP

comma-sep-list = (list-item *WSP "," *WSP comma-sep-list) / list-item
list-item = 1*item-char
item-char = %x21-2B / %x2D-3A / %x3C-7E
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t><strong>methods:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of cryptographic domain validation methods that can be used to validate that particular domain.
A CA <bcp14>MUST</bcp14> use one of the methods specified in the methods attribute value to perform cryptographic domain validation.
If there is no method specified that the CA is capable of complying with, the CA <bcp14>MUST</bcp14> deny issuance.</t>
          </li>
          <li>
            <t><strong>options:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of options.
A CA <bcp14>SHOULD</bcp14> try to honor any option specified in this list.
If a CA does not understand an option or does not have that option implemented the, CA <bcp14>MAY</bcp14> proceed with issuance.</t>
          </li>
          <li>
            <t><strong>options-critical:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of options.
To proceed with issuance, a CA <bcp14>MUST</bcp14> understand and implement all options specified in the options-critical attribute value.</t>
          </li>
        </ol>
        <t>The attribute-list <bcp14>MAY</bcp14> contain additional attributes and a CA <bcp14>MAY</bcp14> proceed with issuance even if it does not understand these additional attributes.
Subsequent RFCs <bcp14>MAY</bcp14> standardize additional attributes.</t>
        <section anchor="permissible-methods">
          <name>Permissible Methods</name>
          <t>The following attributes <bcp14>MAY</bcp14> be specified in the methods attribute value.
Each method specifies particular aspects of certificate issuance that <bcp14>MUST</bcp14> be satisfied for a certificate to be issued using that method.
While some methods entail the use of CA/Browser Forum-compliant domain control validation methods, others do not entail CA/Browser Forum-compliant domain control validation and must be used in conjunction with a CA/Browser Forum-compliant domain control validation method to permit certificate issuance.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>secure-dns-record-change:</strong> This method involves an applicant showing control of a DNSSEC-protected DNS record or a record that was retrieved via a DoH or DoT tunnel to the relevant authoritative nameservers used in the DNS resolution.
This can be done via 1) the validation method "DNS Change" specified in the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates (Section 3.2.2.4.7) or 2) the "dns-01" method of the ACME RFC <xref target="RFC8555"/>.
For this method to be satisfied, the FQDN where the DNS change is demonstrated <bcp14>MUST</bcp14> be protected by DNSSEC or lookups to the relevant authoritative nameservers <bcp14>MUST</bcp14> be conducted over authenticated channels (e.g., DoH/DoT).</t>
            </li>
            <li>
              <t><strong>http-validation-over-tls:</strong> This method involves the completion of an HTTP domain validation challenge over an HTTPS session using TCP port 443 where the server authenticates with an existing publicly-trusted valid certificate covering the domain in question.
The certificate cannot be self-signed or expired.
This method <bcp14>MAY</bcp14> be directly satisfied while a CA is performing the "Agreed-Upon Change to Website v2" domain control validation method specified in the the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates (Section 3.2.2.4.18). The ACME "http-01" challenge specified in <xref target="RFC8555"/> does not permit the use of HTTPS or port 443 when a CA is contacting the domain in question.
A CA <bcp14>MAY</bcp14> still satisfy the <strong>http-validation-over-tls</strong> method even if it does not initiate connections to port 443 for HTTP challenges so long as either 1) the connection initiated to port 80 serves a redirect to the same domain name over HTTPS at port 443 and the connection to the domain at port 443 servers a valid, trusted certificate or 2) in addition to contacting the domain over port 80 the CA also contacts the domain over port 443 using HTTPS and the connection is established with a valid, trusted certificate and the same challenge value is observed.
Operators of security-critical domains <bcp14>MAY</bcp14> choose not to permit this method since, unlike other cryptographic domain validation methods specified in this document, its security relies on the non-existence of malicious certificates for a domain at time of the creation of the security Property Tag in the domain's policy.</t>
            </li>
            <li>
              <t><strong>known-account-specifier:</strong> For a CA to issue a certificate using this method 1) there <bcp14>MUST</bcp14> exist a unique identifier for a CA subscriber account that is communicated with the CA out-of-band, over authenticated DNS lookups, or in another manner that is immune to man-in-the-middle adversaries, and 2) the CA may only issue a certificate to an applicant that has authenticated itself to the CA as having access to that specified subscriber account.
A CA does not have permission to issue under this method unless both of these criteria are met.
Once these criteria have been met, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
One acceptable way of including this account identifier is with the CAA ACME account URI extension, defined in <xref target="RFC8657"/>, in an authenticated DNS record.</t>
            </li>
            <li>
              <t><strong>private-key-control:</strong> This method involves an applicant showing control of a private key that corresponds to a public key placed in a DNS record associated with the domain being validated.
The private key must be used to sign a message containing: a unique identifier for the CA, the domain name(s) in the certificate, a timestamp, and a hash of the public key in the certificate.
This message may be hashed and then have the signature generated over the hash of this message.
Obtaining such a signed message from a certificate applicant authorizes the CA specified in the message to sign a certificate for those domain names with the specified public key within 24h of the timestamp provided in the message.
The CA <bcp14>MUST</bcp14> retrieve the public key or a hash of the public key corresponding to the private key used for signing the message via an authenticated DNS lookup using either authenticated channels to the relevant authoritative nameservers (e.g., DoH or DoT) or validation of a DNSSEC signature chain back to the ICANN root.
After private key control is established, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.</t>
            </li>
          </ol>
          <t>In the event that <strong>no methods attribute is specified in the attribute-list,</strong> all methods specified in this document are acceptable as well as cryptographic domain validation methods defined in future RFCs.
Future RFCs <bcp14>MAY</bcp14> specify additional methods for cryptographic domain validation so long as they satisfy the properties of cryptographic domain validation (i.e., robustness against global man-in-the-middle adversaries).</t>
        </section>
        <section anchor="permissible-options">
          <name>Permissible Options</name>
          <t>The following options <bcp14>MAY</bcp14> be used in the options or options-critical attribute values.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>authenticated-policy-retrieval:</strong> This option signifies to a CA that it <bcp14>MUST</bcp14> retrieve a domain's CAA security Property and any associated domain-owner identity (e.g., identifiers used for known-account-specifier and private-key-control) using authenticated DNS lookups or other authenticated channels.
If a CA finds this option in the options-critical attribute and the CAA security Property was not retrieved using authenticated DNS lookups, the CA <bcp14>MUST NOT</bcp14> issue a certificate for that domain.</t>
            </li>
          </ol>
          <t>Additionally, a CA <bcp14>MAY</bcp14> choose to honor its own non-standardized options that do not need to be supported by other CAs or the IETF.
These options <bcp14>MUST</bcp14> be prefixed with "ca-&lt;ca_name&gt;-" where ca_name is the name of the CA that initially developed the option.</t>
        </section>
      </section>
      <section anchor="co-existence-with-other-caa-properties">
        <name>Co-existence with other CAA Properties</name>
        <t>The behavior of a CA when encountering a CAA RRset that contains multiple CAA Properties, including a security Property, depends on the CAA Property Tags.</t>
        <section anchor="caa-security-property-1">
          <name>CAA security Property</name>
          <t>To minimize complexity and avoid the risk of unexpected behavior, a domain's entire cryptographic domain validation policy <bcp14>SHOULD</bcp14> be encoded into a single CAA security Property.
If a CAA RRset contains multiple security Properties, a CA <bcp14>MUST</bcp14> block issuance if the certificate request does not comply with all of the security Tags.
This ensures that if a new security Property Tag is specified, its security properties cannot be subverted by a stale security Property Tag.</t>
        </section>
        <section anchor="caa-issue-and-issuewild-property">
          <name>CAA issue and issuewild Property</name>
          <t>If a domain specifies both security Properties and a set of issue and issuewild Properties, the CA <bcp14>MUST</bcp14> adhere to all security Properties, as described above, and the CA <bcp14>MUST</bcp14> adhere to the set of issue and issuewild Properties as described in <xref target="RFC8659"/>.</t>
        </section>
        <section anchor="caa-iodef-property">
          <name>CAA iodef Property</name>
          <t>The usage of the iodef Property is analogous to <xref target="RFC8659"/>, i.e., it provides a CA the means of reporting certificate issue requests or cases of certificate issue for domains for which the Property appears in the Relevant RRset, when those requests or issuances violate the security policy of the Issuer or the FQDN holder.
The iodef Property can be used to inform a domain owner about a blocked issuance due to an overly restrictive security Property.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Many of the security considerations regarding security CAA records are inherited from those of CAA records more generally.
Because security CAA records do not introduce any new methods for validating domain ownership, they do not increase the attack surface of fraudulent validations.
Security CAA records reduce the attack surface of fraudulent validations by limiting which validation methods may be used and thus eliminating the risk posed by less-secure validation methods.
Particularly, domains without a security CAA record are often highly vulnerable to man-in-the-middle adversaries that can intercept communications from a CA to the victim's domain.
The security Property significantly reduces this attack surface.</t>
      <t>As with any restriction on certificate issuance, this introduces the potential for a Denial of Service (DoS) attack.
There are two potential approaches to launching a DoS attack via security CAA records.
The first is to attack a domain and spoof the existence of a security CAA record in order to prevent the domain owner from renewing his or her certificate (presuming the domain under attack was not using a validation method compliant with the security CAA record).
This attack vector is not novel to security CAA records and is enabled solely by following the procedure specified in <xref target="RFC8659"/>.
Per <xref target="RFC8659"/>, the presence of any not-understood CAA record with the critical flag prevents issuance.
Thus, the adoption of security CAA records does not increase the attack surface for this form of DoS attack as a gibberish CAA record with the critical flag set could lead to the same type of attack.</t>
      <t>A second approach to a DoS attack enabled by security CAA records is to target a domain already using a security CAA record and interfere with all of the permitted validation methods with the idea that the presence of the security CAA will prevent the domain from falling back on alternative validation methods.
This attack vector is mitigated by the diversity of different methods available to domain owners for validating domain ownership using security CAA records.
A domain owner may use an alternate method to satisfy the security CAA record.
In the event that a domain owner truly cannot satisfy any cryptographic domain validation method, the domain owner can still mitigate this attack by removing the security CAA record, obtaining a certificate, and then reinstating the security CAA record once the attack is over.
As with all CAA records, CAs should not cache stale CAA record lookups that block issuance and should instead recheck the CAA record set when a new issuance request is received.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5234">
        <front>
          <title>Augmented BNF for Syntax Specifications: ABNF</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="P. Overell" initials="P." surname="Overell"/>
          <date month="January" year="2008"/>
          <abstract>
            <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="68"/>
        <seriesInfo name="RFC" value="5234"/>
        <seriesInfo name="DOI" value="10.17487/RFC5234"/>
      </reference>
      <reference anchor="RFC7129">
        <front>
          <title>Authenticated Denial of Existence in the DNS</title>
          <author fullname="R. Gieben" initials="R." surname="Gieben"/>
          <author fullname="W. Mekking" initials="W." surname="Mekking"/>
          <date month="February" year="2014"/>
          <abstract>
            <t>Authenticated denial of existence allows a resolver to validate that a certain domain name does not exist. It is also used to signal that a domain name exists but does not have the specific resource record (RR) type you were asking for. When returning a negative DNS Security Extensions (DNSSEC) response, a name server usually includes up to two NSEC records. With NSEC version 3 (NSEC3), this amount is three.</t>
            <t>This document provides additional background commentary and some context for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticated denial-of-existence responses.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7129"/>
        <seriesInfo name="DOI" value="10.17487/RFC7129"/>
      </reference>
      <reference anchor="RFC8555">
        <front>
          <title>Automatic Certificate Management Environment (ACME)</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <author fullname="D. McCarney" initials="D." surname="McCarney"/>
          <author fullname="J. Kasten" initials="J." surname="Kasten"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8555"/>
        <seriesInfo name="DOI" value="10.17487/RFC8555"/>
      </reference>
      <reference anchor="RFC8657">
        <front>
          <title>Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding</title>
          <author fullname="H. Landau" initials="H." surname="Landau"/>
          <date month="November" year="2019"/>
          <abstract>
            <t>The Certification Authority Authorization (CAA) DNS record allows a domain to communicate an issuance policy to Certification Authorities (CAs) but only allows a domain to define a policy with CA-level granularity. However, the CAA specification (RFC 8659) also provides facilities for an extension to admit a more granular, CA-specific policy. This specification defines two such parameters: one allowing specific accounts of a CA to be identified by URIs and one allowing specific methods of domain control validation as defined by the Automatic Certificate Management Environment (ACME) protocol to be required.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8657"/>
        <seriesInfo name="DOI" value="10.17487/RFC8657"/>
      </reference>
      <reference anchor="RFC8659">
        <front>
          <title>DNS Certification Authority Authorization (CAA) Resource Record</title>
          <author fullname="P. Hallam-Baker" initials="P." surname="Hallam-Baker"/>
          <author fullname="R. Stradling" initials="R." surname="Stradling"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <date month="November" year="2019"/>
          <abstract>
            <t>The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain name. CAA Resource Records allow a public CA to implement additional controls to reduce the risk of unintended certificate mis-issue. This document defines the syntax of the CAA record and rules for processing CAA records by CAs.</t>
            <t>This document obsoletes RFC 6844.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8659"/>
        <seriesInfo name="DOI" value="10.17487/RFC8659"/>
      </reference>
      <reference anchor="RFC9539">
        <front>
          <title>Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS</title>
          <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor"/>
          <author fullname="J. Salazar" initials="J." role="editor" surname="Salazar"/>
          <author fullname="P. Hoffman" initials="P." role="editor" surname="Hoffman"/>
          <date month="February" year="2024"/>
          <abstract>
            <t>This document sets out steps that DNS servers (recursive resolvers and authoritative servers) can take unilaterally (without any coordination with other peers) to defend DNS query privacy against a passive network monitor. The protections provided by the guidance in this document can be defeated by an active attacker, but they should be simpler and less risky to deploy than more powerful defenses.</t>
            <t>The goal of this document is to simplify and speed up deployment of opportunistic encrypted transport in the recursive-to-authoritative hop of the DNS ecosystem. Wider easy deployment of the underlying encrypted transport on an opportunistic basis may facilitate the future specification of stronger cryptographic protections against more-powerful attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9539"/>
        <seriesInfo name="DOI" value="10.17487/RFC9539"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 299?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
