CDNI Working Group F. Fieau, Ed.
Internet-Draft E. Stephan
Intended status: Standards Track Orange
Expires: September 10, 2020 S. Mishra
Verizon
March 09, 2020

CDNI extensions for HTTPS delegation
draft-ietf-cdni-interfaces-https-delegation-03

Abstract

The delivery of content over HTTPS involving multiple CDNs raises credential management issues. This document proposes extensions in CDNI Control and Metadata interfaces to setup HTTPS delegation from an Upstream CDN (uCDN) to a Downstream CDN (dCDN).

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on September 10, 2020.

Copyright Notice

Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

Content delivery over HTTPS using one or more CDNs along the path requires credential management. This specifically applies when an entity delegates delivery of encrypted content to another trusted entity.

Several delegation methods are currently proposed within different IETF working groups. They specify different methods for provisioning HTTPS delivery credentials.

This document extends the CDNI Metadata interface to setup HTTPS delegation between an upstream CDN (uCDN) and downstream CDN (dCDN) using the Standardized delegation methods. Furthermore, it includes a proposal of IANA registry to enable adding of new methods.

Section 2 is about terminology used in this document. Section 3 presents delegation methods specified at the IETF. Section 4 addresses the extension for handling HTTPS delegation in CDNI. Section 5 describes simple data types. Section 6 addresses IANA registry for delegation methods. Section 7 covers the security issues. Section 8 is about comments and questions.

2. Terminology

This document uses terminology from CDNI framework documents such as: CDNI framework document [RFC7336], CDNI requirements [RFC7337] and CDNI interface specifications documents: CDNI Metadata interface [RFC8006] and CDNI Control interface / Triggers [RFC8007].

3. Known delegation methods

There are currently two Internet drafts within the TLS and ACME working groups adopted to handle delegation of HTTPS delivery between entities.

This Internet Draft (I-D) proposes standardizing HTTPS delegation between the entities using CDNI interfaces.

This document considers the following two I-Ds that deals with HTTPS delegation:

- Sub-certificates [I-D.ietf-tls-subcerts] in the TLS Working Group.

- Short-term, Automatically-Renewed (STAR) certificates in Automated Certificate Management Environment(ACME) [I-D.ietf-acme-star]

4. Extending the CDNI metadata model

This section defines a CDNI extension to the current Metadata interface model that allows bootstrapping delegation methods between a uCDN and a delegate dCDN.

4.1. Extension to PathMetadata object

This extension reuses PathMetadata object, as defined in [RFC8006], and adds new "Delegation methods" objects as specified in the following sections.

This allows to explicitly indicate support for a given method. Therefore, the presence (or lack thereof) of an AcmeStarDelegationMethod, SubcertsDelegationMethod, and/or further delegation methods, imply support (or lack thereof) for the given method.

Example:

The PathMatch object can reference a path-metadata that points at the delegation information. Delegation metadata are added to PathMetaData object.

Below shows both PathMatch and PathMetaData objects related to a path, for example, here /movies/* located at https://metadata.ucdn.example/video.example.com/movies


PathMatch:
{
	"path-pattern": {
      "pattern": "/movies/*",
      "case-sensitive": true
	},
	"path-metadata": {
	  "type": "MI.PathMetadata",
      "href": "https://metadata.ucdn.example/video.example.com/movies"
	}
}

Following the example above, the PathMetadata can be modeled 
for ACMEStarDelegationMethod as: 

PathMetadata:
{
    "metadata": [	    
	    {
        "generic-metadata-type": "MI.AcmeStarDelegationMethod",
        "generic-metadata-value": {	
           "star-proxy": "10.2.2.2",
           "acme-server" : "10.2.3.3",
           "credentials-location-uri": “www.ucdn.com/credentials",
           "periodicity": 36000,
           "CSR-template": Json/Text representing the CSR template (see section 4.2)
	    }}]
}

The existence of the "MI.AcmeStarDelegationMethod" object in a PathMetaData Object shall enable the use of one of the AcmeStarDelegation Methods, chosen by the delegating entity. The delegation method will be activated for the set of Path defined in the PathMatch. See Section 4.2 for more details about delegation methods metadata specification.

4.2. Delegation methods

This section defines the delegation methods objects metadata. Those metadata allows bootstrapping a secured delegation by providing the dCDN with the needed parameters to set it up.

4.2.1. AcmeStarDelegationMethod object

This section defines the AcmeStarDelegationMethod object which describes metadata related to the use of ACME/STAR API presented in [I-D.ietf-acme-star]

As expressed in [I-D.ietf-acme-star], when an origin has set a delegation to a specific domain (i.e. dCDN), the dCDN should present to the end-user client, a short-term certificate bound to the master certificate.


dCDN                  uCDN             Content Provider            CA 
 |              ACME/STAR proxy        ACME/STAR client      ACME/STAR Server
 |                     |                     |                     |
 | 1. GET Metadata incl. Delegation Method object with CSR template [CDNI]
 +-------------------->|                     |                     |
 | 200 OK + Metadata incl. CSR template [CDNI]                     |
 |<--------------------+                     |                     |
 | 2. Request delegation: video.dcdn.example + dCDN public key     |
 +-------------------->|                     |                     |
 |                     | 3. Request STAR Cert + dCDN public key    |
 |                     +-------------------->| 4. Request STAR cert + PubKey
 |                     |                     |-------------------->|
 |                     |                     | 5. STAR certificate |
 |                     | 6. STAR certificate |<--------------------|
 | 7. STAR certificate |<--------------------+                     |
 +<--------------------|                     |                     |
 |                     |                     |                     |
 | 8. Retrieve STAR certificate (credential-location-uri)          |
 +---------------------------------------------------------------->|                   
 |                     |                     |                     |--+ 9. renew       
 |                     |                     |                     |  | cert         
 | 10. Star certificate                      |                     |<-+      
 |<----------------------------------------------------------------+
 |  ...                |                     |                     |
   
Figure 1: Example call-flow of STAR delegation in CDNI showing 2 levels of delegation

Property: star-proxy

Property: acme-server

Property: credentials-location-uri

Property: periodicity

Property: CSR-template

4.2.2. SubcertsDelegationMethod object

This section defines the SubcertsDelegationMethod object which describes metadata related to the use of Subcerts as presented in [I-D.ietf-tls-subcerts]


Client                  dCDN                 uCDN                 Content 
   |                     |                     |                  Provider
   |                     |                     |                     |  
   |                     |                     | Certificate         |  
   |                     |                     |<--------------------| 
   |                     | GET Metadata incl. Subcerts method obj    |          
   |                     +-------------------->|                     |                     
   |                     | 200 OK + Metadata   |                     |                    
   |                     |<--------------------+                     |                    
   |                     | Get Subcert         |                     |          
   |                     +-------------------->|                     |                     
   |                     | Subcert             |                     |                    
   |                     |<--------------------+                     |                    
   | Client Hello + Subcert support            |                     |
   +-------------------->|                     |                     |
   | Server Hello + Subcert                    |                     |
   |<--------------------|                     |                     |
   | Certificate         |                     |                     |
   |<--------------------|                     |                     |
   | TLS ServerKeyExchange                     |                     |
   |<--------------------|                     |                     |
   | TLS ClientKeyExchange                     |                     |
   |<--------------------|                     |                     |
   | TLS Finished        |                     |                     |
   |<--------------------|                     |                     |
   |                     |                     |                     | 
   
   Figure 2: Example call-flow of SubCert delegation in CDNI

As expressed in [I-D.ietf-tls-subcerts], when an origin has set a delegation to a downstream entity such as a downstream CDN (i.e. dCDN), the dCDN should present the Origin or uCDN certificate or "delegated_credential" during the TLS handshake [RFC8446] to the end-user client application, instead of its own certificate.

Property: credentials-delegating-entity

Property: credential-recipient-entity

Property: credentials-location-uri

Property: periodicity

5. Metadata Simple Data Type Descriptions

This section describes the simple data types that are used for properties for objects in this document.

5.1. Periodicity

A time value expressed in seconds to indicate a periodicity.

Type: Integer

6. IANA considerations

This document requests the registration of the following entries under the "CDNI Payload Types" registry hosted by IANA regarding “CDNI delegation”:

	
+----------------------------+---------------+
| Payload Type               | Specification |
+----------------------------+---------------+
| MI.AcmeStarDelegationMethod| RFCthis       |
| MI.SubCertDelegationMethod | RFCthis       |
+----------------------------+---------------+

[RFC Editor: Please replace RFCthis with the published RFC number for
   this document.]


		

6.1. CDNI MI AcmeStarDelegationMethod Payload Type

Purpose: The purpose of this Payload Type is to distinguish AcmeStarDelegationMethod MI objects (and any associated capability advertisement)

Interface: MI/FCI

Encoding: see Section 4.2.1

6.2. CDNI MI SubCertsDelegationMethod Payload Type

Purpose: The purpose of this Payload Type is to distinguish SubcertsDelegationMethod MI objects (and any associated capability advertisement)

Interface: MI/FCI

Encoding: see Section 4.2.2

7. Security considerations

Extensions proposed here do not alter nor change Security Considerations as outlined in the CDNI Metadata and Footprint and Capabilities RFCs [RFC8006].

8. Comments and questions

Should dCDN be visible from the Content Provider or not? This would lead to different solutions to handle delegation towards the CP. In most cases, the dCDNs should never be visible to the CP, in order to reduce the burden of certificates generation for dCDN.

9. References

9.1. Normative References

[I-D.ietf-acme-star] Sheffer, Y., Lopez, D., Dios, O., Pastor, A. and T. Fossati, "Support for Short-Term, Automatically-Renewed (STAR) Certificates in Automated Certificate Management Environment (ACME)", Internet-Draft draft-ietf-acme-star-11, October 2019.
[I-D.ietf-acme-star-delegation] Sheffer, Y., Lopez, D., Pastor, A. and T. Fossati, "An ACME Profile for Generating Delegated STAR Certificates", Internet-Draft draft-ietf-acme-star-delegation-03, March 2020.
[I-D.ietf-tls-subcerts] Barnes, R., Iyengar, S., Sullivan, N. and E. Rescorla, "Delegated Credentials for TLS", Internet-Draft draft-ietf-tls-subcerts-06, February 2020.
[RFC8006] Niven-Jenkins, B., Murray, R., Caulfield, M. and K. Ma, "Content Delivery Network Interconnection (CDNI) Metadata", RFC 8006, DOI 10.17487/RFC8006, December 2016.
[RFC8007] Murray, R. and B. Niven-Jenkins, "Content Delivery Network Interconnection (CDNI) Control Interface / Triggers", RFC 8007, DOI 10.17487/RFC8007, December 2016.

9.2. Informative References

[RFC7336] Peterson, L., Davie, B. and R. van Brandenburg, "Framework for Content Distribution Network Interconnection (CDNI)", RFC 7336, DOI 10.17487/RFC7336, August 2014.
[RFC7337] Leung, K. and Y. Lee, "Content Distribution Network Interconnection (CDNI) Requirements", RFC 7337, DOI 10.17487/RFC7337, August 2014.
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018.

Authors' Addresses

Frederic Fieau (editor) Orange 40-48, avenue de la Republique Chatillon, 92320 France EMail: frederic.fieau@orange.com
Emile Stephan Orange 2, avenue Pierre Marzin Lannion, 22300 France EMail: emile.stephan@orange.com
Sanjay Mishra Verizon 13100 Columbia Pike Silver Spring, MD 20904 USA EMail: sanjay.mishra@verizon.com