<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yusef-lamps-rfc7030-renewal-recommendation-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="est-renew">Certificate Renewal Recommendations for Enrollment over Secure Transport</title>
    <seriesInfo name="Internet-Draft" value="draft-yusef-lamps-rfc7030-renewal-recommendation-03"/>
    <author initials="R." surname="Shekh-Yusef" fullname="Rifaat Shekh-Yusef">
      <organization>Ciena</organization>
      <address>
        <email>rifaat.s.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization>Entrust Limited</organization>
      <address>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="03"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>This document describes an extension to RFC7030, Enrollment over Secure Transport to
give an indication to a end-entity device when it should start attempting to renew its certificates.</t>
      <t>Prior art is that client decides, with a typical recommmendation to start when the remaining lifetime of the certificate is at the 50% point.
As typical certificate lifetimes are reduced from years to fractions of a year, the 50% may be far too early, and this document provides a way to give alternate advice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-yusef-lamps-rfc7030-renewal-recommendation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        lamps Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/rfc7030-renewal-recommendation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="1" sectionFormat="comma" target="RFC9773"/> explains why certificate lifetimes and renewal times need more deterministic control in the ACME <xref target="RFC8555"/> ecosystem.
Similar arguments apply to the <xref target="RFC7030"/> ecosystem.</t>
      <t>This document extends <xref target="RFC7030"/> to add support for renewal information, by adding a new entry to the HTTP URIs for Control list defined in <xref section="3.2.2" sectionFormat="comma" target="RFC7030"/></t>
      <t>This mechanism enables EST servers to provide suggested detailed renewal operations to EST clients.</t>
      <t>The /renewal-info URI is added, as an <bcp14>OPTIONAL</bcp14> operation, to the table in figure 5 in section 3.2.2 of <xref target="RFC7030"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <section anchor="renewal-information-request">
        <name>Renewal Information Request</name>
        <t>To retrieve the renewal information, the EST client uses the following HTTP request-line:</t>
        <artwork><![CDATA[
GET /.well-known/est/renewal-info/<certificate-id>;
]]></artwork>
        <t>The request includes a unique identifier for the certificate in question.
The unique identifier is constructed by concatenating the base64url encoding <xref target="RFC4648"/> of the keyIdentifier field of the certificate's Authority Key Identifier (AKI) <xref target="RFC5280"/> extension, the period character ".", and the base64url encoding of the DER-encoded Serial Number field (without the tag and length bytes).
All trailing "=" characters <bcp14>MUST</bcp14> be stripped from both parts of the unique identifier.</t>
        <t>Thus, the full request URL is constructed as follows (split onto multiple lines for readability), where the "||" operator indicates string concatenation:</t>
        <artwork><![CDATA[
    url = /.well-known/est/renewal-info
      || '/'
      || base64url(AKI keyIdentifier)
      || '.'
      || base64url(Serial)
]]></artwork>
      </section>
      <section anchor="renewal-information-response">
        <name>Renewal Information Response</name>
        <t>The structure the EST RenewalInfo object is as follows:</t>
        <t>suggestedWindow (object, required):
      A JSON object with two keys, "start" and "end", whose values are
      timestamps, encoded in the format specified in <xref target="RFC3339"/>, which
      bound the window of time in which the CA recommends renewing the
      certificate.</t>
        <t>For example:</t>
        <artwork><![CDATA[
    HTTP/1.1 200 OK
    Content-Type: application/json
    Retry-After: 21600

    {
      "suggestedWindow": {
        "start": "2025-01-02T04:00:00Z",
        "end": "2025-01-03T04:00:00Z"
      }
    }
]]></artwork>
        <section anchor="base64-not-used">
          <name>Base64 Not Used</name>
          <t><xref target="RFC7030"/> mistakenly declared that all content would be base64 encoded.
<xref target="RFC8951"/> clarifies that the content is to be base64 encoded, whether or not there is a Content-Transfer-Encoding header present.
It further clarifies that future extensions (such as this document) will not use base64 encoding.
The response detailed above is not base64 encoded.</t>
        </section>
      </section>
    </section>
    <section anchor="renewal-operations">
      <name>Renewal Operations</name>
      <t>Clients <bcp14>MUST</bcp14> attempt renewal at a time of their choosing based on the suggested renewal window, obtained in the previous step.</t>
      <t>The following algorithm is <bcp14>RECOMMENDED</bcp14> for choosing a renewal time:</t>
      <ol spacing="normal" type="1"><li>
          <t>Select a uniform random time within the suggested window.</t>
        </li>
        <li>
          <t>If the selected time is in the past, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, if the client can schedule itself to attempt renewal
at exactly the selected time, do so.</t>
        </li>
        <li>
          <t>Otherwise, if the selected time is before the next time that the
client would wake up normally, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, sleep until the time indicated by the Retry-After
header and return to Step 1.</t>
        </li>
      </ol>
      <t>In all cases, renewal attempts are subject to the client's existing error backoff and retry intervals.</t>
      <t>A RenewalInfo object in which the end timestamp equals or precedes the start timestamp is invalid.  Servers <bcp14>MUST NOT</bcp14> serve such a response, and clients <bcp14>MUST</bcp14> treat one as though they failed to receive any response from the server (e.g., retry at an appropriate interval, renew on a fallback schedule, etc.).</t>
      <section anchor="fetching-schedule">
        <name>Fetching Schedule</name>
        <t>The advice in <xref section="4.3" sectionFormat="comma" target="RFC9773"/> applies:</t>
        <t>Clients <bcp14>SHOULD</bcp14> fetch a certificate's RenewalInfo immediately after
   issuance.</t>
        <t>During the lifetime of a certificate, the renewal information needs
   to be fetched frequently enough that clients learn about changes in
   the suggested window quickly, but without overwhelming the server.
   This protocol uses the Retry-After header [RFC9110] to indicate to
   clients how often to retry.  Note that in other HTTP applications,
   Retry-After often indicates the minimum time to wait before retrying
   a request.  In this protocol, it indicates the desired (i.e., both
   requested minimum and maximum) amount of time to wait.</t>
        <t>Clients <bcp14>MUST NOT</bcp14> check a certificate's RenewalInfo after the
   certificate has expired.  Clients <bcp14>MUST NOT</bcp14> check a certificate's
   RenewalInfo after they consider the certificate to be replaced (for
   instance, after a new certificate for the same identifiers has been
   received and configured).</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A very short certificate lifetime renewal time will cause clients to communicate with the EST Registrar more frequently.</t>
      <t>EST connections for renewals typically make use of mutually authenticated TLS.
When the client certificate being an IDevID, or the last issued certificate, often an LDevID, there is potential to disclose identities during this connection when using TLS 1.2.</t>
      <t>TLS 1.3 does not suffer from this problem, and it's use is <bcp14>RECOMMENDED</bcp14> as per <xref target="I-D.ietf-uta-require-tls13"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Not sure what yet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Might need a header allocation</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many bits of text are taken from <xref target="RFC9773"/>.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3339" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC8951" target="https://www.rfc-editor.org/info/rfc8951" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8951.xml">
          <front>
            <title>Clarification of Enrollment over Secure Transport (EST): Transfer Encodings and ASN.1</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Werner" initials="T." surname="Werner"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document updates RFC 7030: Enrollment over Secure Transport to resolve some errata that were reported and that have proven to cause interoperability issues when RFC 7030 was extended.</t>
              <t>This document deprecates the specification of "Content-Transfer-Encoding" headers for Enrollment over Secure Transport (EST) endpoints. This document fixes some syntactical errors in ASN.1 that were present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8951"/>
          <seriesInfo name="DOI" value="10.17487/RFC8951"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9773" target="https://www.rfc-editor.org/info/rfc9773" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9773.xml">
          <front>
            <title>ACME Renewal Information (ARI) Extension</title>
            <author fullname="A. Gable" initials="A." surname="Gable"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies how an Automated Certificate Management Environment (ACME) server may provide suggestions to ACME clients as to when they should attempt to renew their certificates. This allows servers to mitigate load spikes and ensures that clients do not make false assumptions about appropriate certificate renewal periods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9773"/>
          <seriesInfo name="DOI" value="10.17487/RFC9773"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.ietf-uta-require-tls13" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-require-tls13-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-require-tls13.xml">
          <front>
            <title>New Protocols Using TLS Must Require TLS 1.3</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram"/>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>TLS 1.3 use is widespread, it has had comprehensive security proofs, and it improves both security and privacy over TLS 1.2. Therefore, new protocols that use TLS must require TLS 1.3. As DTLS 1.3 is not widely available or deployed, this prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only. This document updates RFC9325 and discusses post-quantum cryptography and the security and privacy improvements over TLS 1.2 as a rationale for that update.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-12"/>
        </reference>
      </references>
    </references>
    <?line 216?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
