<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-acme-profiles-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="ACME Profiles">Automated Certificate Management Environment (ACME) Profiles Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-acme-profiles-00"/>
    <author fullname="Aaron Gable">
      <organization>Internet Security Research Group</organization>
      <address>
        <email>aaron@letsencrypt.org</email>
      </address>
    </author>
    <date year="2025" month="September" day="05"/>
    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <abstract>
      <?line 31?>

<t>This document defines how an ACME Server may offer a selection of different certificate profiles to ACME Clients, and how those clients may indicate which profile they want.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://aarongable.github.io/draft-acme-profiles/draft-ietf-acme-profiles.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-acme-profiles/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Automated Certificate Management Environment Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/acme/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aarongable/draft-acme-profiles"/>.</t>
    </note>
    <note>
      <name>Current Implementations</name>
      <?line 35?>

<t>This note is to be removed before publishing as an RFC.</t>
      <t>This document is implemented by at least two ACME Servers (<eref target="https://github.com/letsencrypt/boulder/issues/7309">Boulder</eref> and <eref target="https://github.com/letsencrypt/pebble/pull/473">Pebble</eref>), and at least seven ACME Clients (<eref target="https://github.com/certbot/certbot/issues/10194">Certbot</eref>, <eref target="https://github.com/go-acme/lego/pull/2415">Lego</eref>, <eref target="https://github.com/eggsampler/acme/pull/25">eggsampler/acme</eref>, <eref target="https://github.com/caddyserver/caddy/commit/2c4295ee48f494bc8dda5fa09b37612d520c8b3b">caddy</eref>, <eref target="https://docs.certifytheweb.com/blog/acme-profiles-draft/">certifytheweb</eref>, <eref target="https://github.com/rmbolger/Posh-ACME/releases/tag/v4.28.0">poshacme</eref>, and <eref target="https://github.com/dehydrated-io/dehydrated/pull/956">dehydrated</eref>). It is <eref target="https://letsencrypt.org/2025/01/09/acme-profiles/">deployed</eref> by the Let's Encrypt CA, with <eref target="https://letsencrypt.org/docs/profiles/">three profiles</eref> advertised in both their <eref target="https://acme-staging-v02.api.letsencrypt.org/directory">staging</eref> and <eref target="https://acme-v02.api.letsencrypt.org/directory">production</eref> directories.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Throughout the history of the WebPKI, Certificate Authorities have used "profiles" to describe the kinds of certificates they issue. For example, an "S/MIME" profile might indicate that the resulting certificate will contain the <tt>id-kp-emailProtection</tt> Extended Key Usage and use a Certificate Policy OID to assert compliance with the CA/Browser Forum S/MIME Baseline Requirements; or a "Constrained Sub-CA" profile might indicate the inclusion of the Basic Constraints extension, the keyCertSign Key Usage, and a Name Constraints extension. Subscribers generally select a profile as part of their certificate ordering process or negotiations with the CA, depending on their needs (and sometimes their budget).</t>
      <t>The ACME protocol only allows clients to customize their certificate in two ways: the newOrder request allows selection of the identifiers (generally Subject Alternative Names) and validity period; and the finalize request contains a CSR in which the client can theoretically include any combination of fields and extensions that they desire. But requesting certificate features via the CSR is onerous, error-prone, and dangerous. Numerous compliance incidents across the WebPKI have been caused by CAs trusting values included in a CSR and copying them directly into the issued certificate. It requires clients to know how to construct a valid CSR, provides no mechanism for servers to advertise what CSR fields they're willing to accept, and means that CAs have to evaluate on a case-by-case basis which combinations of requested features they're willing to issue.</t>
      <t>This document provides a mechanism for ACME Servers to advertise what certificate profiles they offer, and for ACME Clients to select a profile when creating a new Order. This allows site operators to make informed decisions about the kind of certificate they request, without placing an undue burden on ACME Clients or Servers to transmit such information in the form of a CSR. It also encourages the evolution of the WebPKI by allowing CAs to more easily offer new and improved profiles while maintaining backwards compatibility for old subscribers.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="extensions-to-the-directory-resource">
      <name>Extensions to the Directory Resource</name>
      <t>An ACME Server which wishes to allow Clients to select profiles <bcp14>MUST</bcp14> include a new field, <tt>profiles</tt>, in the <tt>meta</tt> field of its Directory object.</t>
      <t><tt>profiles</tt> (optional, object):  A map of profile names to human-readable descriptions of those profiles.</t>
      <t>The contents of these human-readable descriptions are up to the CA; for example, they might be prose descriptions of the properties of the profile, or the might be URLs pointing at a documentation site. ACME Clients <bcp14>SHOULD</bcp14> present these profile names and descriptions to their operator during initial setup and at appropriate times thereafter.</t>
      <sourcecode type="text"><![CDATA[
    HTTP/1.1 200 OK
    Content-Type: application/json

    {
      "newNonce": "https://acme.example.com/new-nonce",
      "newAccount": "https://acme.example.com/new-account",
      "newOrder": "https://acme.example.com/new-order",
      "newAuthz": "https://acme.example.com/new-authz",
      "revokeCert": "https://acme.example.com/revoke-cert",
      "keyChange": "https://acme.example.com/key-change",
      "meta": {
        "termsOfService": "https://example.com/acme/terms",
        "website": "https://example.com/acme/docs",
        "caaIdentities": ["example.com"],
        "externalAccountRequired": false,
        "profiles": {
          "profile1": "https://example.com/acme/docs/profiles#profile1",
          "profile2": "https://example.com/acme/docs/profiles#profile2",
        }
      }
    }
]]></sourcecode>
    </section>
    <section anchor="extensions-to-the-order-resource">
      <name>Extensions to the Order Resource</name>
      <t>In order to convey information about the profile associated with an Order, a new field is added to the Order object:</t>
      <t><tt>profile</tt> (string, optional): A string uniquely identifying the profile which will be used to affect issuance of the certificate requested by this Order.</t>
      <t>To select a profile, the client includes the desired profile name in the <tt>profile</tt> field of the Order object they supply to the newOrder request. The client <bcp14>SHOULD NOT</bcp14> request a profile name that is not advertised in the server's Directory metadata object.</t>
      <sourcecode type="text"><![CDATA[
    POST /acme/new-order HTTP/1.1
    Host: acme.example.com
    Content-Type: application/jose+json

    {
      "protected": base64url({
        "alg": "ES256",
        "kid": "https://acme.example.com/acct/evOfKhNU60wg",
        "nonce": "5XJ1L3lEkMG7tR6pA00clA",
        "url": "https://acme.example.com/new-order"
      }),
      "payload": base64url({
        "identifiers": [{"type": "dns", "value": "example.org"}],
        "profile": "profile1"
      }),
      "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
    }
]]></sourcecode>
      <t>If the server receives a newOrder request specifying a profile that it is not advertising, or specifying a profile which is incompatible with the rest of the contents of the request (e.g. a "tls-server-auth" profile alongside an identifier of type "email"), it <bcp14>MUST</bcp14> reject the request with a problem document of type "invalidProfile" (see Section 6.3).</t>
      <t>If it accepts the request, the server responds with an Order object including the selected profile.</t>
      <sourcecode type="text"><![CDATA[
    HTTP/1.1 201 Created
    Replay-Nonce: MYAuvOpaoIiywTezizk5vw
    Link: <https://acme.example.com/directory>;rel="index"
    Location: https://acme.example.com/order/TOlocE8rfgo

    {
      "status": "valid",
      "expires": "2025-01-01T12:00:00Z",
      "identifiers": [{"type": "dns", "value": "example.org"}],
      "profile": "profile1",
      "authorizations": ["https://acme.example.com/authz/PAniVnsZcis"],
      "finalize": "https://acme.example.com/order/TOlocE8rfgo/finalize",
    }
]]></sourcecode>
      <t>If the server is advertizing profiles and receives a newOrder request which does not identify a specific profile, it is <bcp14>RECOMMENDED</bcp14> that the server select a profile and associate it with the new Order object.</t>
      <t>If a server receives a request to finalize an Order whose profile the CA is no longer willing to issue under, it <bcp14>MUST</bcp14> respond with a problem document of type "invalidProfile". The server <bcp14>SHOULD</bcp14> attempt to avoid this situation, e.g. by ensuring that all Orders for a profile have expired before it stops issuing under that profile.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The extensions to the ACME protocol described in this document build upon the Security Considerations and threat model defined in <xref section="10.1" sectionFormat="of" target="RFC8555"/>. It does not change the account management or identifier validation flows, so the security considerations are largely unchanged.</t>
      <t>The one exception is in regards to CA Policy Considerations. RFC 8555 did not address how a server should determine whether it is willing to issue the certificate as requested by the finalize CSR. This document greatly simplifies this determination by making the contents of the CSR (beyond the Subject Alternative Names and Subject Public Key) irrelevant to the decision-making process.</t>
      <t>Additionally, by moving profile selection out of the finalize CSR and into the Order resource itself, this document reduces the need for ACME Clients and Servers to parse and process x509 ASN.1. This increases the security and stability of the WebPKI as a whole by reducing the incidence of parsing errors and the likelihood of values being copied directly from the CSR into the resulting certificate.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="acme-directory-metadata-fields">
        <name>ACME Directory Metadata Fields</name>
        <t>IANA will add the following entry to the "ACME Directory Metadata Fields" registry within the "Automated Certificate Management Environment (ACME) Protocol" registry group at <eref target="https://www.iana.org/assignments/acme">https://www.iana.org/assignments/acme</eref>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Field Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">profiles</td>
              <td align="left">object</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-order-object-fields">
        <name>ACME Order Object Fields</name>
        <t>IANA will add the following entry to the "ACME Order Object Fields" registry within the "Automated Certificate Management Environment (ACME) Protocol" registry group at <eref target="https://www.iana.org/assignments/acme">https://www.iana.org/assignments/acme</eref>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Field Type</th>
              <th align="left">Configurable</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">profile</td>
              <td align="left">string</td>
              <td align="left">true</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-error-types">
        <name>ACME Error Types</name>
        <t>IANA will add the following entry to the "ACME Error Types" registry within the "Automated Certificate Management Environment (ACME) Protocol" registry group at <eref target="https://www.iana.org/assignments/acme">https://www.iana.org/assignments/acme</eref>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">invalidProfile</td>
              <td align="left">The request specified a profile which this server does not support</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8555">
        <front>
          <title>Automatic Certificate Management Environment (ACME)</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <author fullname="D. McCarney" initials="D." surname="McCarney"/>
          <author fullname="J. Kasten" initials="J." surname="Kasten"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8555"/>
        <seriesInfo name="DOI" value="10.17487/RFC8555"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 191?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>My thanks to Phil Porada for spearheading the implementation of this protocol in the Boulder software. Thanks also to Jacob Hoffman-Andrews, Samantha Frank, James Kasten, and Jason Baker for discussions and brainstorming on what this protocol should look like.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
