<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-cdni-https-delegation-subcerts-12" number="9677" submissionType="IETF" consensus="true" category="std" tocInclude="true" symRefs="true" sortRefs="true" xml:lang="en" obsoletes="" updates="" prepTime="2024-10-31T14:16:27" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-cdni-https-delegation-subcerts-12" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9677" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="CDNI Metadata for Delegated Credentials">Content Delivery Network Interconnection (CDNI) Metadata for Delegated Credentials</title>
    <seriesInfo name="RFC" value="9677" stream="IETF"/>
    <author initials="F." surname="Fieau" fullname="Frédéric Fieau">
      <organization showOnFrontPage="true">Orange</organization>
      <address>
        <postal>
          <street>40-48, avenue de la République</street>
          <city>Châtillon</city>
          <code>92320</code>
          <country>France</country>
        </postal>
        <email>frederic.fieau@orange.com</email>
      </address>
    </author>
    <author initials="E." surname="Stephan" fullname="Emile Stephan">
      <organization showOnFrontPage="true">Orange</organization>
      <address>
        <postal>
          <street>2, avenue Pierre Marzin</street>
          <city>Lannion</city>
          <code>22300</code>
          <country>France</country>
        </postal>
        <email>emile.stephan@orange.com</email>
      </address>
    </author>
    <author initials="G." surname="Bichot" fullname="Guillaume Bichot">
      <organization showOnFrontPage="true">Broadpeak</organization>
      <address>
        <postal>
          <street>3771 Boulevard des Alliés</street>
          <city>Cesson-Sévigné</city>
          <code>35510</code>
          <country>France</country>
        </postal>
        <email>guillaume.bichot@broadpeak.tv</email>
      </address>
    </author>
    <author initials="C." surname="Neumann" fullname="Christoph Neumann">
      <organization showOnFrontPage="true">Broadpeak</organization>
      <address>
        <postal>
          <street>3771 Boulevard des Alliés</street>
          <city>Cesson-Sévigné</city>
          <code>35510</code>
          <country>France</country>
        </postal>
        <email>christoph.neumann@broadpeak.tv</email>
      </address>
    </author>
    <date month="10" year="2024"/>
    <area>WIT</area>
    <workgroup>cdni</workgroup>
    <keyword>HTTPS</keyword>
    <keyword>TLS</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
The delivery of content over HTTPS involving multiple Content Delivery
Networks (CDNs) raises credential management issues.  This document defines
metadata in the Content Delivery Network Interconnection (CDNI) Control and
Metadata interface to set up HTTPS delegation using delegated credentials from
an upstream CDN (uCDN) to a downstream CDN (dCDN).
</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9677" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2024 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cdni-footprint-and-capabili">CDNI Footprint and Capabilities Advertisement Interface (FCI) Capabilities Object for Delegated Credentials</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-fcidelegatedcredentials">FCI.DelegatedCredentials</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-expected-usage-of-the-prope">Expected Usage of the Property Number of Supported Delegated Credentials</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cdni-metadata-interface-mi-">CDNI Metadata Interface (MI) Metadata Object for Delegated Credentials</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-delegated-credentials-call-">Delegated Credentials Call Flow</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cdni-midelegatedcredentials">CDNI MI.DelegatedCredentials Payload Type</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cdni-fcidelegatedcredential">CDNI FCI.DelegatedCredentials Payload Type</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
Content delivery over HTTPS utilizing one or more Content Delivery Networks
(CDNs) along the delivery path necessitates the management of credentials. 
This requirement is particularly pertinent when an entity delegates the delivery of content via HTTPS to another trusted entity.
</t>
      <t indent="0" pn="section-1-2">
This document specifies the CDNI Metadata interface for establishing HTTPS delegation through the use of delegated credentials, as defined in  <xref target="RFC9345" format="default" sectionFormat="of" derivedContent="RFC9345"/>,
between an upstream CDN (uCDN) and a downstream CDN (dCDN).
</t>
    </section>
    <section anchor="terminology" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>",
    "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be
    interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals, as
    shown here.
      </t>
      <t indent="0" pn="section-2-2">
This document uses terminology from the CDNI specifications -- CDNI framework
<xref target="RFC7336" format="default" sectionFormat="of" derivedContent="RFC7336"/>, CDNI requirements <xref target="RFC7337" format="default" sectionFormat="of" derivedContent="RFC7337"/>, and CDNI
Metadata interface <xref target="RFC8006" format="default" sectionFormat="of" derivedContent="RFC8006"/>.
</t>
    </section>
    <section anchor="FCI" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-cdni-footprint-and-capabili">CDNI Footprint and Capabilities Advertisement Interface (FCI) Capabilities Object for Delegated Credentials</name>
      <t indent="0" pn="section-3-1">
A dCDN should advertise its supported delegation methods using the
Footprint and Capabilities Advertisement interface (FCI) as defined in <xref target="RFC8008" format="default" sectionFormat="of" derivedContent="RFC8008"/>.
The FCI.Metadata object enables a dCDN to communicate its capabilities and the Metadata interface (MI) objects it supports. 
To indicate support for delegated credentials, the dCDN should announce the support for MI.DelegatedCredentials, as illustrated in the example below.
      </t>
      <sourcecode markers="false" pn="section-3-2">
   {
     "capabilities": [
       {
         "capability-type": "FCI.Metadata",
         "capability-value": {
           "metadata": [
             "MI.DelegatedCredentials",
             "... other supported MI objects ..."
           ]
         },
         "footprints": [
           "Footprint objects"
         ]
       }
     ]
   }
</sourcecode>
      <t indent="0" pn="section-3-3">
This document also defines an object that informs the uCDN of the number of delegated credentials supported by the dCDN, 
enabling the uCDN to supply the appropriate number of delegated credentials. To this end, the FCI object, FCI.DelegationCredentials, is introduced. 
</t>
      <section anchor="FCI_DelegatedCredentials" numbered="true" removeInRFC="false" toc="include" pn="section-3.1">
        <name slugifiedName="name-fcidelegatedcredentials">FCI.DelegatedCredentials</name>
        <t indent="0" pn="section-3.1-1">
The FCI.DelegationCredentials object enables advertising the maximum number of delegated credentials supported by the dCDN.
This number typically (but not necessarily) corresponds to the number of servers designated by the dCDN to support delegated credentials.
</t>
        <t indent="0" pn="section-3.1-2">
The property PrivateKeyEncryptionKey contains a public key provided by the dCDN that <bcp14>MUST</bcp14> be used by the uCDN to
encrypt private keys whenever such private keys are transmitted to the dCDN using MI.DelegatedCredentials (see <xref target="MI" format="default" sectionFormat="of" derivedContent="Section 4"/>).
</t>
        <dl newline="false" spacing="compact" indent="3" pn="section-3.1-3">
          <dt pn="section-3.1-3.1">Property: </dt>
          <dd pn="section-3.1-3.2">number-delegated-certs-supported</dd>
          <dt pn="section-3.1-3.3">Description:</dt>
          <dd pn="section-3.1-3.4">Number of delegated credentials supported by the dCDN.</dd>
          <dt pn="section-3.1-3.5">Type:</dt>
          <dd pn="section-3.1-3.6">integer</dd>
          <dt pn="section-3.1-3.7">Mandatory-to-Specify:</dt>
          <dd pn="section-3.1-3.8">Yes</dd>
        </dl>
        <dl newline="false" spacing="compact" indent="3" pn="section-3.1-4">
          <dt pn="section-3.1-4.1">Property: </dt>
          <dd pn="section-3.1-4.2">PrivateKeyEncryptionKey</dd>
          <dt pn="section-3.1-4.3">Description:</dt>
          <dd pn="section-3.1-4.4">Public key in JSON Web Key (JWK) format <xref target="RFC7517" format="default" sectionFormat="of" derivedContent="RFC7517"/> of the dCDN to be used by the uCDN to encrypt private keys.</dd>
          <dt pn="section-3.1-4.5">Type:</dt>
          <dd pn="section-3.1-4.6">string</dd>
          <dt pn="section-3.1-4.7">Mandatory-to-Specify:</dt>
          <dd pn="section-3.1-4.8">No</dd>
        </dl>
        <t indent="0" pn="section-3.1-5">
The following is an example of the FCI.DelegatedCredentials.
</t>
        <sourcecode markers="false" pn="section-3.1-6">
    {
      "capabilities": [
        {
         "capability-type": "FCI.DelegatedCredentials",
         "capability-value": {
            "number-delegated-certs-supported": 10
           }
         "footprints": [
            &lt;Footprint objects&gt;
           ]
        }
      ]
    }
</sourcecode>
      </section>
      <section anchor="usage_FCI" numbered="true" removeInRFC="false" toc="include" pn="section-3.2">
        <name slugifiedName="name-expected-usage-of-the-prope">Expected Usage of the Property Number of Supported Delegated Credentials</name>
        <t indent="0" pn="section-3.2-1">The dCDN uses the FCI.DelegatedCredentials object to announce the number of servers that support delegated credentials.</t>
        <t indent="0" pn="section-3.2-2">When the uCDN receives the FCI.DelegatedCredentials object, it can issue the supported number of delegated credentials to the dCDN.
When configuring the dCDN, the uCDN <bcp14>MAY</bcp14> decide to provide less than the maximum supported delegated credentials to the dCDN.
Note that, within a dCDN, different deployment possibilities of the delegated credentials on the
endpoints exist. The dCDN <bcp14>MAY</bcp14> use one single delegated credential and deploy it on multiple endpoints. 
Alternatively, the dCDN <bcp14>MAY</bcp14> deploy a different delegated credential for each endpoint 
(provided that the uCDN delivers enough different delegated credentials). 
This choice is at the discretion of the dCDN and depends on the number of delegated credentials provided by the uCDN.</t>
        <t indent="0" pn="section-3.2-3">The FCI.DelegationCredentials object does not address expiry or renewal of delegated credentials.
  Once the uCDN has provided
  delegated credentials via the MI, the uCDN <bcp14>SHOULD</bcp14> monitor the provided
  credentials and their expiry times and <bcp14>SHOULD</bcp14> refresh dCDN
  credentials via the MI in a timely manner.
The uCDN may decide not to monitor the validity period of delegated credentials 
and not to refresh the credentials, for example, in cases of short-term one-shot deployments or once it has decided to deprovision a dCDN.
If the delegated credential is not renewed on time by the uCDN, the servers of the dCDN that only have expired delegated credentials <bcp14>MUST</bcp14> refuse 
any new TLS connection that requires an up-to-date delegated credential.
</t>
      </section>
    </section>
    <section anchor="MI" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-cdni-metadata-interface-mi-">CDNI Metadata Interface (MI) Metadata Object for Delegated Credentials</name>
      <t indent="0" pn="section-4-1">As expressed in <xref target="RFC9345" format="default" sectionFormat="of" derivedContent="RFC9345"/>, when an uCDN has delegated to a dCDN, the dCDN presents the
"delegated_credential" (rather than its own certificate) during the TLS handshake <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> to the User Agent. This implies that the dCDN is also in the possession of the private key corresponding to the public key in DelegatedCredential.cred <xref target="RFC9345" format="default" sectionFormat="of" derivedContent="RFC9345"/>.
This allows the User Agent to verify the signature in a CertificateVerify message (<xref target="RFC8446" sectionFormat="of" section="4.4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8446#section-4.4.3" derivedContent="RFC8446"/>) sent and signed by the dCDN.</t>
      <t indent="0" pn="section-4-2">
This section defines the MI.DelegatedCredentials object containing an array of delegated
credentials and optionally the corresponding private keys. 
The CDNI MI <xref target="RFC8006" format="default" sectionFormat="of" derivedContent="RFC8006"/> describes the CDNI metadata distribution 
mechanisms according to which a dCDN can retrieve the MI.DelegatedCredentials object 
from the uCDN.
</t>
      <t indent="0" pn="section-4-3">
The properties of the MI.DelegatedCredentials object are as follows:
</t>
      <dl newline="false" spacing="compact" indent="3" pn="section-4-4">
        <dt pn="section-4-4.1">Property: </dt>
        <dd pn="section-4-4.2">delegated-credentials</dd>
        <dt pn="section-4-4.3">Description:</dt>
        <dd pn="section-4-4.4">Array of delegated credentials</dd>
        <dt pn="section-4-4.5">Type:</dt>
        <dd pn="section-4-4.6">Array of DelegatedCredentialObject objects</dd>
        <dt pn="section-4-4.7">Mandatory-to-Specify:</dt>
        <dd pn="section-4-4.8">Yes</dd>
      </dl>
      <t indent="0" pn="section-4-5">
The DelegatedCredentialObject object is composed of the following properties:
</t>
      <dl newline="false" spacing="compact" indent="3" pn="section-4-6">
        <dt pn="section-4-6.1">Property: </dt>
        <dd pn="section-4-6.2">delegated-credential</dd>
        <dt pn="section-4-6.3">Description:</dt>
        <dd pn="section-4-6.4">Base64-encoded (as defined in <xref target="RFC4648" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4648#section-4" derivedContent="RFC4648"/>) version of a CertificateEntry as defined in <xref target="RFC8446" sectionFormat="of" section="4.4.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8446#section-4.4.2" derivedContent="RFC8446"/>. The CertificateEntry <bcp14>MUST</bcp14> contain a DelegatedCredential structure (as defined in <xref target="RFC9345" format="default" sectionFormat="of" derivedContent="RFC9345"/>) using the extension in the CertificateEntry of its end-entity certificate (see <xref target="RFC9345" sectionFormat="of" section="4.1.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9345#section-4.1.1" derivedContent="RFC9345"/>).</dd>
        <dt pn="section-4-6.5">Type:</dt>
        <dd pn="section-4-6.6">string</dd>
        <dt pn="section-4-6.7">Mandatory-to-Specify:</dt>
        <dd pn="section-4-6.8">Yes</dd>
      </dl>
      <dl newline="false" spacing="compact" indent="3" pn="section-4-7">
        <dt pn="section-4-7.1">Property: </dt>
        <dd pn="section-4-7.2">private-key</dd>
        <dt pn="section-4-7.3">Description:</dt>
        <dd pn="section-4-7.4">Encrypted private key corresponding to the public key contained in the DelegatedCredential. The envelope format for this property is JSON Web Encryption (JWE) <xref target="RFC7516" format="default" sectionFormat="of" derivedContent="RFC7516"/> using the base64 compact serialization (<xref target="RFC7516" sectionFormat="of" section="7.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7516#section-7.1" derivedContent="RFC7516"/>).</dd>
        <dt pn="section-4-7.5">Type:</dt>
        <dd pn="section-4-7.6">string</dd>
        <dt pn="section-4-7.7">Mandatory-to-Specify:</dt>
        <dd pn="section-4-7.8">No</dd>
      </dl>
      <t indent="0" pn="section-4-8">
The private-key property is not mandatory. If not specified, it is assumed that the dCDN generated the public-private key pair for the delegated credential itself and provided
the public key information with an out-of-band mechanism to the uCDN.
See <xref target="security" format="default" sectionFormat="of" derivedContent="Section 7"/> for constraints regarding the usage of the private key. 
</t>
      <t indent="0" pn="section-4-9">
If the private-key property is used, the transported private key <bcp14>MUST</bcp14> be encrypted using the PrivateKeyEncryptionKey specified in FCI.DelegatedCredentials. 
The envelope format for this property <bcp14>MUST</bcp14> use JWE <xref target="RFC7516" format="default" sectionFormat="of" derivedContent="RFC7516"/> using the base64 compact serialization (<xref target="RFC7516" sectionFormat="of" section="7.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7516#section-7.1" derivedContent="RFC7516"/>), whereas the private key is included as JWE Ciphertext in the JWE.
The JWE content-type field <bcp14>MAY</bcp14> be used to signal the media type of the encrypted key.
</t>
      <t indent="0" pn="section-4-10">
Below, please see an example of an MI.DelegatedCredentials object.
</t>
      <sourcecode markers="false" pn="section-4-11">
    {
    "generic-metadata-type": "MI.DelegatedCredentials",
    "generic-metadata-value": {
        "delegated-credentials": [
                {"delegated-credential":
                    "cBBfm8KK6pPz/tdgKyedwA...
                    iXCCIAmzMM0R8FLI3Ba0UQ=="},
                {"delegated-credential":
                    "4pyIGtjFdys1+9y/4sS/Fg...
                    J+h9lnRY/xgmi65RLGKoRw=="},
                {"delegated-credential":
                    "6PWFO0g2AXvUaULXLObcVA...
                    HXoldT/qaYCCNEyCc8JM2A=="}
            ]
        }
    }
</sourcecode>
    </section>
    <section anchor="callflow" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-delegated-credentials-call-">Delegated Credentials Call Flow</name>
      <t indent="0" pn="section-5-1">An example call-flow using delegated credentials is depicted in 
<xref target="call-flow" format="default" sectionFormat="of" derivedContent="Figure 1"/>. The steps are as follows.</t>
      <ol type="1" indent="adaptive" spacing="normal" start="1" pn="section-5-2">
<li pn="section-5-2.1" derivedCounter="1.">It is assumed that the uCDN has been provisioned and configured
with a certificate. 
   Note that it is out of scope of CDNI and the
   present document how and from where (e.g., which Content 
   Service Provider) the uCDN acquired its certificate.
</li>
        <li pn="section-5-2.2" derivedCounter="2.">The uCDN generates a set of delegated credentials 
(here it is assumed that public keys of the dCDN are known). 
Note that the uCDN may generate this material at different points in time, e.g., in advance to have a pool of delegated 
credentials or on demand when the dCDN announces its maximum number of supported delegated credentials.
</li>
        <li pn="section-5-2.3" derivedCounter="3.">Using the CDNI FCI <xref target="RFC8008" format="default" sectionFormat="of" derivedContent="RFC8008"/>, the 
dCDN advertises MI.DelegatedCredentials capabilities to the uCDN.
The dCDN further uses FCI.DelegatedCredentials to advertise the maximum number 
of supported delegated credentials.
</li>
        <li pn="section-5-2.4" derivedCounter="4.">Using the CDNI MI <xref target="RFC8006" format="default" sectionFormat="of" derivedContent="RFC8006"/>, the dCDN acquires 
the MI.DelegatedCredentials, retrieving an array of delegated
credentials.
</li>
        <li pn="section-5-2.5" derivedCounter="5.">The client establishes a TLS connection with an endpoint of 
the dCDN according to <xref target="RFC9345" format="default" sectionFormat="of" derivedContent="RFC9345"/> using the delegated 
credentials retrieved in step 4.
</li>
        <li pn="section-5-2.6" derivedCounter="6.">When some delegated credentials are about to expire, the uCDN uses the CDNI MI <xref target="RFC8006" format="default" sectionFormat="of" derivedContent="RFC8006"/> to provide new, valid delegated credentials.
</li>
      </ol>
      <figure anchor="call-flow" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-example-call-flow-of-delega">Example Call Flow of Delegated Credentials in CDNI</name>
        <artwork align="center" pn="section-5-3.1">
User-Agent                  dCDN                 uCDN                 
   |                     |                     |                  
   |                     |      [1. uCDN acquires its certificate
   |                     |            out of scope of CDNI]
   |                     |                     |    
   |                     |             [2. generation of 
   |                     |          delegated credentials]
   |                     |                     |
   |                  3. CDNI FCI used to
   |              advertise support of MI.DelegatedCredentials
   |              and announce number of delegated credentials
   |                 supported using FCI.DelegatedCredentials
   |                     |--------------------&gt;+          
   |                     |                     |                    
   |                 4. CDNI MI used to
   |             provide the MI.DelegatedCredentials object  
   |                     |&lt;--------------------+      
   |                     |                     |    
                         .
                         .
                         .                                                  
  [5. TLS handshake according                  |
          to [RFC9345]]  .                     | 
   |&lt;-------------------&gt;|                     |
   |                     |                     |
                         .
                         .
                         .                                               
   |              6. Some delegated credentials about to expire.
   |                    CDNI MI used to
   |             provide new MI.DelegatedCredentials object  
   |                     |&lt;--------------------+    
   |                     |                     |  
</artwork>
      </figure>
    </section>
    <section anchor="iana" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-6-1">
IANA has registered the following payload types in the "CDNI Payload Types"
registry in the "Content Delivery Network Interconnection (CDNI) Parameters"
registry group.
</t>
      <table align="center" pn="table-1">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Payload Type</th>
            <th align="left" colspan="1" rowspan="1">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">MI.DelegatedCredentials</td>
            <td align="left" colspan="1" rowspan="1">RFC 9677</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">FCI.DelegatedCredentials</td>
            <td align="left" colspan="1" rowspan="1">RFC 9677</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-6-3">
Sections <xref target="iana_MI" format="counter" sectionFormat="of" derivedContent="6.1"/> and <xref target="iana_FCI" format="counter" sectionFormat="of" derivedContent="6.2"/> provide additional necessary information for the
registration of those CDNI payload types (see <xref target="RFC7736" sectionFormat="of" section="2.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7736#section-2.2" derivedContent="RFC7736"/>).
</t>
      <section anchor="iana_MI" numbered="true" removeInRFC="false" toc="include" pn="section-6.1">
        <name slugifiedName="name-cdni-midelegatedcredentials">CDNI MI.DelegatedCredentials Payload Type</name>
        <dl indent="3" newline="false" spacing="normal" pn="section-6.1-1">
          <dt pn="section-6.1-1.1">Purpose:</dt>
          <dd pn="section-6.1-1.2">The purpose of this payload type is to distinguish delegated
credentials MI objects.
</dd>
          <dt pn="section-6.1-1.3">Interface:</dt>
          <dd pn="section-6.1-1.4">MI/FCI</dd>
          <dt pn="section-6.1-1.5">Encoding:</dt>
          <dd pn="section-6.1-1.6">See <xref target="MI" format="default" sectionFormat="of" derivedContent="Section 4"/>.</dd>
        </dl>
      </section>
      <section anchor="iana_FCI" numbered="true" removeInRFC="false" toc="include" pn="section-6.2">
        <name slugifiedName="name-cdni-fcidelegatedcredential">CDNI FCI.DelegatedCredentials Payload Type</name>
        <dl indent="3" newline="false" spacing="normal" pn="section-6.2-1">
          <dt pn="section-6.2-1.1">Purpose:</dt>
          <dd pn="section-6.2-1.2">The purpose of this payload type is to advertise the number 
of delegated credentials needed (and any associated capability
advertisement).
</dd>
          <dt pn="section-6.2-1.3">Interface:</dt>
          <dd pn="section-6.2-1.4">FCI</dd>
          <dt pn="section-6.2-1.5">Encoding:</dt>
          <dd pn="section-6.2-1.6">See <xref target="FCI_DelegatedCredentials" format="default" sectionFormat="of" derivedContent="Section 3.1"/>.</dd>
        </dl>
      </section>
    </section>
    <section anchor="security" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">
The extensions defined enable providing delegated credentials to dCDNs. 
A delegated credential can only be used by a dCDN if it is in possession of the associated private key.
Similarly, an attacker requires access to the private key in order to exploit a delegated credential and impersonate dCDN nodes.
Thus, leakage of only the delegated credential without the private key represents a limited security risk.
</t>
      <t indent="0" pn="section-7-2">
Delegated credentials and associated private keys are short-lived (per default, the maximum validity period is set to 7 days in <xref target="RFC9345" format="default" sectionFormat="of" derivedContent="RFC9345"/>) and as such a single leaked delegated credential with its private key represents a limited security risk.
Still, it is <bcp14>NOT RECOMMENDED</bcp14> to send private keys through the MI. 
Omitting the private key further limits the possible ways an attacker could exploits the delegated credential.
</t>
      <t indent="0" pn="section-7-3">
If this recommendation is not followed, i.e., the private key is communicated via the MI, the transported private key <bcp14>MUST</bcp14> be encrypted within a JWE envelope using the encryption key (PrivateKeyEncryptionKey) provided within the FCI.DelegatedCredentials by the dCDN. 
The JWE encryption key (PrivateKeyEncryptionKey) <bcp14>MUST</bcp14> have a strength equal to or larger than the private key it is encrypting for transport.
Note that the specified encryption method does not offer forward secrecy. If the dCDN's encryption key becomes compromised in the future, then all encrypted JWEs will become compromised. Due to the short-lived nature of delegated credentials, the impact is limited.
</t>
      <t indent="0" pn="section-7-4">
It is also important to ensure that an attacker is not able to systematically retrieve a consecutive or consistent set of delegated credentials and associated private keys.
Such an attack would allow the attacker to systematically impersonate dCDN nodes. 
The MI objects defined in the present document are transferred via the interfaces defined in CDNI <xref target="RFC8006" format="default" sectionFormat="of" derivedContent="RFC8006"/>. 
<xref target="RFC8006" format="default" sectionFormat="of" derivedContent="RFC8006"/> describes how to secure these interfaces, protecting the integrity and confidentiality, as well as ensuring the
authenticity of the dCDN and uCDN, which should prevent an attacker from systematically retrieving delegated credentials and associated private keys.
</t>
    </section>
    <section anchor="privacy" numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
      <t indent="0" pn="section-8-1">
The FCI and MI objects and the information defined in the present document do not contain any personally identifiable information (PII).
   As such, this document does not change or alter the confidentiality and
   privacy considerations outlined in <xref target="RFC8006" section="8.2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8006#section-8.2" derivedContent="RFC8006"/> and 
   <xref target="RFC8008" section="7" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc8008#section-7" derivedContent="RFC8008"/>.
      </t>
      <t indent="0" pn="section-8-2">
A single or systematic retrieval of delegated credentials and associated private keys would allow the attacker to decrypt any data sent by the end user intended for the end service, which may include PII.</t>
    </section>
  </middle>
  <back>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648" quoteTitle="true" derivedAnchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t indent="0">This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC7516" target="https://www.rfc-editor.org/info/rfc7516" quoteTitle="true" derivedAnchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t indent="0">JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC7517" target="https://www.rfc-editor.org/info/rfc7517" quoteTitle="true" derivedAnchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t indent="0">A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC8006" target="https://www.rfc-editor.org/info/rfc8006" quoteTitle="true" derivedAnchor="RFC8006">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Metadata</title>
            <author fullname="B. Niven-Jenkins" initials="B." surname="Niven-Jenkins"/>
            <author fullname="R. Murray" initials="R." surname="Murray"/>
            <author fullname="M. Caulfield" initials="M." surname="Caulfield"/>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2016"/>
            <abstract>
              <t indent="0">The Content Delivery Network Interconnection (CDNI) Metadata interface enables interconnected Content Delivery Networks (CDNs) to exchange content distribution metadata in order to enable content acquisition and delivery. The CDNI Metadata associated with a piece of content provides a downstream CDN with sufficient information for the downstream CDN to service content requests on behalf of an upstream CDN. This document describes both a base set of CDNI Metadata and the protocol for exchanging that metadata.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8006"/>
          <seriesInfo name="DOI" value="10.17487/RFC8006"/>
        </reference>
        <reference anchor="RFC8008" target="https://www.rfc-editor.org/info/rfc8008" quoteTitle="true" derivedAnchor="RFC8008">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics</title>
            <author fullname="J. Seedorf" initials="J." surname="Seedorf"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="R. van Brandenburg" initials="R." surname="van Brandenburg"/>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2016"/>
            <abstract>
              <t indent="0">&lt;p&gt;This document captures the semantics of the "Footprint and Capabilities Advertisement" part of the Content Delivery Network Interconnection (CDNI) Request Routing interface, i.e., the desired meaning of "Footprint" and "Capabilities" in the CDNI context and what the "Footprint &amp; Capabilities Advertisement interface (FCI)" offers within CDNI. The document also provides guidelines for the CDNI FCI protocol. It further defines a Base Advertisement Object, the necessary registries for capabilities and footprints, and guidelines on how these registries can be extended in the future.&lt;/p&gt;</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8008"/>
          <seriesInfo name="DOI" value="10.17487/RFC8008"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9345" target="https://www.rfc-editor.org/info/rfc9345" quoteTitle="true" derivedAnchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t indent="0">The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC7336" target="https://www.rfc-editor.org/info/rfc7336" quoteTitle="true" derivedAnchor="RFC7336">
          <front>
            <title>Framework for Content Distribution Network Interconnection (CDNI)</title>
            <author fullname="L. Peterson" initials="L." surname="Peterson"/>
            <author fullname="B. Davie" initials="B." surname="Davie"/>
            <author fullname="R. van Brandenburg" initials="R." role="editor" surname="van Brandenburg"/>
            <date month="August" year="2014"/>
            <abstract>
              <t indent="0">This document presents a framework for Content Distribution Network Interconnection (CDNI). The purpose of the framework is to provide an overall picture of the problem space of CDNI and to describe the relationships among the various components necessary to interconnect CDNs. CDNI requires the specification of interfaces and mechanisms to address issues such as request routing, distribution metadata exchange, and logging information exchange across CDNs. The intent of this document is to outline what each interface needs to accomplish and to describe how these interfaces and mechanisms fit together, while leaving their detailed specification to other documents. This document, in combination with RFC 6707, obsoletes RFC 3466.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7336"/>
          <seriesInfo name="DOI" value="10.17487/RFC7336"/>
        </reference>
        <reference anchor="RFC7337" target="https://www.rfc-editor.org/info/rfc7337" quoteTitle="true" derivedAnchor="RFC7337">
          <front>
            <title>Content Distribution Network Interconnection (CDNI) Requirements</title>
            <author fullname="K. Leung" initials="K." role="editor" surname="Leung"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2014"/>
            <abstract>
              <t indent="0">Content delivery is frequently provided by specifically architected and provisioned Content Delivery Networks (CDNs). As a result of significant growth in content delivered over IP networks, existing CDN providers are scaling up their infrastructure. Many Network Service Providers (NSPs) and Enterprise Service Providers (ESPs) are also deploying their own CDNs. To deliver contents from the Content Service Provider (CSP) to end users, the contents may traverse across multiple CDNs. This creates a need for interconnecting (previously) standalone CDNs so that they can collectively act as a single delivery platform from the CSP to the end users.</t>
              <t indent="0">The goal of the present document is to outline the requirements for the solution and interfaces to be specified by the CDNI working group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7337"/>
          <seriesInfo name="DOI" value="10.17487/RFC7337"/>
        </reference>
        <reference anchor="RFC7736" target="https://www.rfc-editor.org/info/rfc7736" quoteTitle="true" derivedAnchor="RFC7736">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Media Type Registration</title>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2015"/>
            <abstract>
              <t indent="0">This document defines the standard media type used by the Content Delivery Network Interconnection (CDNI) protocol suite, including the registration procedure and recommended usage of the required payload- type parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7736"/>
          <seriesInfo name="DOI" value="10.17487/RFC7736"/>
        </reference>
      </references>
    </references>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="F." surname="Fieau" fullname="Frédéric Fieau">
        <organization showOnFrontPage="true">Orange</organization>
        <address>
          <postal>
            <street>40-48, avenue de la République</street>
            <city>Châtillon</city>
            <code>92320</code>
            <country>France</country>
          </postal>
          <email>frederic.fieau@orange.com</email>
        </address>
      </author>
      <author initials="E." surname="Stephan" fullname="Emile Stephan">
        <organization showOnFrontPage="true">Orange</organization>
        <address>
          <postal>
            <street>2, avenue Pierre Marzin</street>
            <city>Lannion</city>
            <code>22300</code>
            <country>France</country>
          </postal>
          <email>emile.stephan@orange.com</email>
        </address>
      </author>
      <author initials="G." surname="Bichot" fullname="Guillaume Bichot">
        <organization showOnFrontPage="true">Broadpeak</organization>
        <address>
          <postal>
            <street>3771 Boulevard des Alliés</street>
            <city>Cesson-Sévigné</city>
            <code>35510</code>
            <country>France</country>
          </postal>
          <email>guillaume.bichot@broadpeak.tv</email>
        </address>
      </author>
      <author initials="C." surname="Neumann" fullname="Christoph Neumann">
        <organization showOnFrontPage="true">Broadpeak</organization>
        <address>
          <postal>
            <street>3771 Boulevard des Alliés</street>
            <city>Cesson-Sévigné</city>
            <code>35510</code>
            <country>France</country>
          </postal>
          <email>christoph.neumann@broadpeak.tv</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
