<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-httpbis-secondary-server-certs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="HTTP Server Secondary Cert Auth">Secondary Certificate Authentication of HTTP Servers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-secondary-server-certs-00"/>
    <author initials="E." surname="Gorbaty" fullname="Eric Gorbaty" role="editor">
      <organization>Apple</organization>
      <address>
        <email>e_gorbaty@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Bishop" fullname="Mike Bishop" role="editor">
      <organization>Akamai</organization>
      <address>
        <email>mbishop@evequefou.be</email>
      </address>
    </author>
    <date/>
    <area>art</area>
    <workgroup>HTTP</workgroup>
    <keyword>exported authenticators</keyword>
    <keyword>masque</keyword>
    <abstract>
      <?line 46?>

<t>This document defines a way for HTTP/2 and HTTP/3 servers to send additional
certificate-based credentials after a TLS connection is established, based
on TLS Exported Authenticators.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://httpwg.org/http-extensions/draft-ietf-httpbis-secondary-server-certs.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-httpbis-secondary-server-certs/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        HTTP Working Group mailing list (<eref target="mailto:ietf-http-wg@w3.org"/>),
        which is archived at <eref target="https://lists.w3.org/Archives/Public/ietf-http-wg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/httpwg/http-extensions/labels/secondary-server-certs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP <xref target="HTTP"/> clients need to know that the content they receive on a
connection comes from the origin from which they intended to retrieve it. The
traditional form of server authentication in HTTP has been in the form of a
single X.509 certificate provided during the TLS <xref target="TLS13"/> handshake.</t>
      <t>TLS supports one server and one client certificate on a connection. These
certificates may contain multiple identities, but only one certificate may be
provided.</t>
      <t>Many HTTP servers host content from several origins. HTTP/2 <xref target="H2"/> and
HTTP/3 <xref target="H3"/> permit clients to reuse an existing HTTP connection to a
server provided that the secondary origin is also in the certificate provided
during the TLS handshake. In many cases, servers choose to maintain separate
certificates for different origins but still desire the benefits of a shared
HTTP connection. This document defines a capability for servers to use and
to authenticate with those seperate certificates over a shared connection.</t>
      <t>The ability to maintain seperate certificates for different origins can also
allow proxies that cache content from secondary origins to communicate to
clients that they can service some of those origins directly, allowing the
proxy to behave as a TLS-terminating reverse proxy for those origins instead of
establishing a TLS encrypted tunnel through the proxy.</t>
      <section anchor="server-certificate-authentication">
        <name>Server Certificate Authentication</name>
        <t><xref section="9.1.1" sectionFormat="of" target="H2"/> and <xref section="3.3" sectionFormat="of" target="H3"/> describe how connections may
be used to make requests from multiple origins as long as the server is
authoritative for both. A server is considered authoritative for an origin if
DNS resolves the origin to the IP address of the server and (for TLS) if the
certificate presented by the server contains the origin in the Subject
Alternative Names field.</t>
        <t><xref target="ALTSVC"/> enables a step of abstraction from the DNS resolution. If
both hosts have provided an Alternative Service at hostnames which resolve to
the IP address of the server, they are considered authoritative just as if DNS
resolved the origin itself to that address. However, the server's one TLS
certificate is still required to contain the name of each origin in question.</t>
        <t><xref target="ORIGIN"/> relaxes the requirement to perform the DNS lookup if already
connected to a server with an appropriate certificate which claims support for
a particular origin.</t>
        <t>Servers which host many origins often would prefer to have separate certificates
for some sets of origins. This may be for ease of certificate management
(the ability to separately revoke or renew them), due to different sources of
certificates (a CDN acting on behalf of multiple origins), or other factors
which might drive this administrative decision. Clients connecting to such
origins cannot currently reuse connections, even if both client and server
would prefer to do so.</t>
        <t>Because the TLS SNI extension is exchanged in the clear, clients might also
prefer to retrieve certificates inside the encrypted context. When this
information is sensitive, it might be advantageous to request a general-purpose
certificate or anonymous ciphersuite at the TLS layer, while acquiring the
"real" certificate in HTTP after the connection is established.</t>
      </section>
      <section anchor="tls-exported-authenticators">
        <name>TLS Exported Authenticators</name>
        <t>TLS Exported Authenticators <xref target="EXPORTED-AUTH"/> are structured messages
that can be exported by either party of a TLS connection and validated by the
other party. Given an established TLS connection, an authenticator message can
be constructed proving possession of a certificate and a corresponding private
key. The mechanisms that this document defines are primarily focused on the
server's ability to generate TLS Exported Authenticators.</t>
        <t>Each Authenticator is computed using a Handshake Context and Finished MAC Key
derived from the TLS session. The Handshake Context is identical for both
parties of the TLS connection, while the Finished MAC Key is dependent on
whether the Authenticator is created by the client or the server.</t>
        <t>Successfully verified Authenticators result in certificate chains, with verified
possession of the corresponding private key, which can be supplied into a
collection of available certificates. Likewise, descriptions of desired
certificates can also be supplied into these collections.</t>
      </section>
      <section anchor="http-layer-certificate-authentication">
        <name>HTTP-Layer Certificate Authentication</name>
        <t>This document defines HTTP/2 and HTTP/3 <tt>CERTIFICATE</tt> frames (<xref target="certs-http"/>) to
carry the relevant certificate messages, enabling certificate-based
authentication of servers independent of TLS version. This mechanism can be
implemented at the HTTP layer without breaking the existing interface between
HTTP and applications above it.</t>
        <t>TLS Exported Authenticators <xref target="EXPORTED-AUTH"/> allow the opportunity for an
HTTP/2 and HTTP/3 servers to send certificate frames which can be used to prove
the servers authenticity for multiple origins.</t>
        <t>This document additionally defines SETTINGS parameters for HTTP/2 and HTTP/3
(<xref target="settings"/>) that allow the client and server to indicate support for
HTTP-Layer certificate authentication.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="discovery">
      <name>Discovering Additional Certificates at the HTTP Layer</name>
      <t>A certificate chain with proof of possession of the private key corresponding to
the end-entity certificate is sent as a sequence of <tt>CERTIFICATE</tt> frames (see
<xref target="http2-cert"/>, <xref target="http3-cert"/>) to the client. Once the holder of a certificate
has sent the chain and proof, this certificate chain is cached by the recipient
and available for future use.</t>
      <section anchor="settings-usage">
        <name>Indicating Support for HTTP-Layer Certificate Authentication</name>
        <t>The <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> parameters for HTTP/2 and HTTP/3 are
defined in <xref target="settings"/> so that clients and servers can indicate support for
secondary certificate authentication of servers.</t>
        <t>HTTP/2 and HTTP/3 endpoints who wish to indicate support for HTTP-Layer
certificate authentication <bcp14>MUST</bcp14> send a <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>
parameter set to "1" in their SETTINGS frame. Endpoints <bcp14>MUST NOT</bcp14> use any of the
authentication functionality described in this document unless the parameter has
been negotiated by both sides.</t>
        <t>Endpoints <bcp14>MUST NOT</bcp14> send a <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> parameter with a
value of 0 after previously sending a value of 1.</t>
        <t><tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> indicates that servers are able to offer
additional certificates to demonstrate control over other origin hostnames, and
that clients are able to make requests for hostnames received in a TLS Exported
Authenticator that the server sends.</t>
      </section>
      <section anchor="cert-available">
        <name>Making Certificates Available</name>
        <t>When both peers have advertised support for HTTP-layer certificates in a given
direction as in <xref target="settings-usage"/>, the indicated endpoint can supply
additional certificates into the connection at any time. That is, if both
endpoints have sent <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> and validated the value
received from the peer, the server may send certificates spontaneously, at any
time, as described by the <tt>Spontaneous Server Authentication</tt> message sequence
in <xref section="3" sectionFormat="of" target="EXPORTED-AUTH"/>.</t>
        <t>This does mean that if a server knows it supports secondary certificate
authentication, and it receives <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> from the
client, that it can enqueue certificates immediately following the received
SETTINGS frame.</t>
        <t>Certificates supplied by servers can be considered by clients without further
action by the server. A server <bcp14>SHOULD NOT</bcp14> send certificates which do not cover
origins which it is prepared to service on the current connection, and <bcp14>SHOULD
NOT</bcp14> send them if the client has not indicated support with
<tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>.</t>
        <t>A client <bcp14>MUST NOT</bcp14> send certificates to the server. The server <bcp14>SHOULD</bcp14> close the
connection upon receipt of a CERTIFICATE frame from a client.</t>
        <figure anchor="ex-http-server-unprompted-basic">
          <name>Simple unprompted server authentication</name>
          <sourcecode type="drawing"><![CDATA[
Client                                        Server
   <-- (stream 0 / control stream) CERTIFICATE --
   ...
   -- (stream N) GET /from-new-origin ---------->
   <----------------------- (stream N) 200 OK ---
]]></sourcecode>
        </figure>
        <t>A server <bcp14>MAY</bcp14> send a <tt>CERTIFICATE</tt> immediately after sending its <tt>SETTINGS</tt>.
However, it <bcp14>MAY</bcp14> also send certificates at any time later. For example, a proxy
might discover that a client is interested in an origin that it can reverse
proxy at the time that a client sends a <tt>CONNECT</tt> request. It can then send
certificates for those origins to allow for TLS-terminated reverse proxying to
those origins for the remainder of the connection lifetime.
<xref target="ex-http-server-unprompted-reverse"/> illustrates this behavior.</t>
        <figure anchor="ex-http-server-unprompted-reverse">
          <name>Reverse proxy server authentication</name>
          <sourcecode type="drawing"><![CDATA[
Client                                        Server
   -- (stream N) CONNECT /to-new-origin -------->
   <-- (stream 0 / control stream) CERTIFICATE --
   <-- (stream 0 / control stream) 200 OK -------
   ...
   -- (stream M) GET /to-new-origin ------------>
   <--- (stream M, direct from server) 200 OK ---
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="settings">
      <name>SETTINGS_HTTP_SERVER_CERT_AUTH</name>
      <t>SETTINGS parameters for HTTP/2 and HTTP/3 seperately are defined below.</t>
      <section anchor="the-settingshttpservercertauth-http2-settings-parameterhttp2-setting">
        <name>The SETTINGS_HTTP_SERVER_CERT_AUTH HTTP/2 SETTINGS Parameter{#http2-setting}</name>
        <t>This document adds a new HTTP/2 SETTINGS(0xTBD) parameter to those defined by
<xref section="6.5.2" sectionFormat="of" target="H2"/>.</t>
        <t>The new parameter name is <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>. The value of the
parameter <bcp14>MUST</bcp14> be 0 or 1.</t>
        <t>The usage of this parameter is described in <xref target="settings-usage"/>.</t>
      </section>
      <section anchor="the-settingshttpservercertauth-http3-settings-parameterhttp3-setting">
        <name>The SETTINGS_HTTP_SERVER_CERT_AUTH HTTP/3 SETTINGS Parameter{#http3-setting}</name>
        <t>This document adds a new HTTP/3 SETTINGS(0xTBD) parameter to those defined by
<xref section="7.2.4.1" sectionFormat="of" target="H3"/>.</t>
        <t>The new parameter name is <tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt>. The value of the
parameter <bcp14>MUST</bcp14> be 0 or 1.</t>
        <t>The usage of this parameter is described in <xref target="settings-usage"/>.</t>
      </section>
    </section>
    <section anchor="certs-http">
      <name>CERTIFICATE frame</name>
      <t>The CERTIFICATE frame contains an exported authenticator message from the TLS
layer that provides a chain of certificates and associated extensions, proving
possession of the private key corresponding to the end-entity certificate.</t>
      <t>A server sends a CERTIFICATE frame on stream 0 for HTTP/2 and on the control
stream for HTTP/3. The client is permitted to make subsequent requests for
resources upon receipt of a CERTIFICATE frame without further action from the
server.</t>
      <t>Upon receiving a complete series of CERTIFICATE frames, the receiver may
validate the Exported Authenticator value by using the exported authenticator
API. This returns either an error indicating that the message was invalid or
the certificate chain and extensions used to create the message.</t>
      <section anchor="http2-cert">
        <name>HTTP/2 CERTIFICATE frame</name>
        <t>A CERTIFICATE frame in HTTP/2 (type=0xTBD) carrries a TLS Exported authenticator
that clients can use to authenticate secondary origins from a sending server.</t>
        <t>The CERTIFICATE frame <bcp14>MUST</bcp14> be sent on stream 0. A CERTIFICATE frame received on
any other stream <bcp14>MUST</bcp14> not be used for server authentication.</t>
        <figure>
          <name>HTTP/2 CERTIFICATE Frame</name>
          <artwork type="ascii-art"><![CDATA[
CERTIFICATE Frame {
  Length (24),
  Type (8) = 0xTBD,

  Unused Flags (8),

  Reserved (1),
  Stream Identifier (31) = 0,

  Authenticator (..),
}
]]></artwork>
        </figure>
        <t>The Length, Type, Unused Flag(s), Reserved, and Stream Identifier fields are
described in <xref section="4" sectionFormat="of" target="H2"/>.</t>
        <t>The CERTIFICATE frame does not define any flags.</t>
        <t>The authenticator field is a portion of the opaque data returned from the TLS
connection exported authenticator authenticate API. See <xref target="exp-auth"/> for more
details on the input to this API.</t>
        <t>The CERTIFICATE frame applies to the connection, not a specific stream. An
endpoint <bcp14>MUST</bcp14> treat a CERTIFICATE frame with a stream identifier other than
0x00 as a connection error.</t>
      </section>
      <section anchor="http3-cert">
        <name>HTTP/3 CERTIFICATE frame</name>
        <t>A CERTIFICATE frame in HTTP/3 (type=0xTBD) carrries a TLS Exported authenticator
that clients can use to authenticate secondary origins from a sending server.</t>
        <t>The CERTIFICATE frame <bcp14>MUST</bcp14> be sent on the control stream. A CERTIFICATE frame
received on any other stream <bcp14>MUST</bcp14> not be used for server authentication.</t>
        <figure>
          <name>HTTP/3 CERTIFICATE Frame</name>
          <artwork type="ascii-art"><![CDATA[
CERTIFICATE Frame {
  Type (i) = 0xTBD,
  Length (i),
  Authenticator (...),
}
]]></artwork>
        </figure>
        <t>The Type and Length fields are described in <xref section="7.1" sectionFormat="of" target="H3"/>.</t>
        <t>The authenticator field is a portion of the opaque data returned from the TLS
connection exported authenticator authenticate API. See <xref target="exp-auth"/> for more
details on the input to this API.</t>
        <t>The CERTIFICATE frame applies to the connection, not a specific stream. An
endpoint <bcp14>MUST</bcp14> treat a CERTIFICATE frame received on any stream other than the
control stream as a connection error.</t>
      </section>
      <section anchor="exp-auth">
        <name>Exported Authenticator Characteristics</name>
        <t>The Exported Authenticator API defined in <xref target="EXPORTED-AUTH"/> takes as input a
request, a set of certificates, and supporting information about the
certificate (OCSP, SCT, etc.). The result is an opaque token which is used
when generating the <tt>CERTIFICATE</tt> frame.</t>
        <t>Upon receipt of a <tt>CERTIFICATE</tt> frame, an endpoint which has negotiated support
for secondary certfiicates <bcp14>MUST</bcp14> perform the following steps to validate the
token it contains:</t>
        <ul spacing="normal">
          <li>
            <t>Using the <tt>get context</tt> API, retrieve the <tt>certificate_request_context</tt> used
to generate the authenticator, if any. Because the <tt>certificate_request_context</tt>
for spontaneous server certificates is chosen by the server, the usage of
the <tt>certificate_request_context</tt> is implementation-dependent. For details,
see <xref section="5" sectionFormat="of" target="EXPORTED-AUTH"/>.</t>
          </li>
          <li>
            <t>Use the <tt>validate</tt> API to confirm the validity of the authenticator with
regard to the generated request, if any.</t>
          </li>
        </ul>
        <t>If the authenticator cannot be validated, this <bcp14>SHOULD</bcp14> be treated as a connection
error.</t>
        <t>Once the authenticator is accepted, the endpoint can perform any other checks
for the acceptability of the certificate itself.</t>
      </section>
    </section>
    <section anchor="errors">
      <name>Indicating Failures During HTTP-Layer Certificate Authentication</name>
      <t>Because this document permits certificates to be exchanged at the HTTP framing
layer instead of the TLS layer, several certificate-related errors which are
defined at the TLS layer might now occur at the HTTP framing layer.</t>
      <t>There are two classes of errors which might be encountered, and they are handled
differently.</t>
      <section anchor="misbehavior">
        <name>Misbehavior</name>
        <t>This category of errors could indicate a peer failing to follow requirements in
this document or might indicate that the connection is not fully secure. These
errors are fatal to stream or connection, as appropriate.</t>
        <dl>
          <dt>CERTIFICATE_UNREADABLE (0xERROR-TBD):</dt>
          <dd>
            <t>An exported authenticator could not be validated.</t>
          </dd>
        </dl>
      </section>
      <section anchor="invalid-certificates">
        <name>Invalid Certificates</name>
        <t>Unacceptable certificates (expired, revoked, or insufficient to satisfy the
request) are not treated as stream or connection errors. This is typically not
an indication of a protocol failure. Clients <bcp14>SHOULD</bcp14> establish a new connection
in an attempt to reach an authoritative server if they deem a
certificate from the server unacceptable.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This mechanism defines an alternate way to obtain server and client certificates
other than in the initial TLS handshake. While the signature of exported
authenticator values is expected to be equally secure, it is important to
recognize that a vulnerability in this code path is at least equal to a
vulnerability in the TLS handshake.</t>
      <section anchor="impersonation">
        <name>Impersonation</name>
        <t>This mechanism could increase the impact of a key compromise. Rather than
needing to subvert DNS or IP routing in order to use a compromised certificate,
a malicious server now only needs a client to connect to <em>some</em> HTTPS site
under its control in order to present the compromised certificate. Clients
<bcp14>SHOULD</bcp14> consult DNS for hostnames presented in secondary certificates if they
would have done so for the same hostname if it were present in the primary
certificate.</t>
        <t>As recommended in <xref target="ORIGIN"/>, clients opting not to consult DNS ought to employ
some alternative means to increase confidence that the certificate is
legitimate, such as an <tt>ORIGIN</tt> frame.</t>
        <t>As noted in the Security Considerations of <xref target="EXPORTED-AUTH"/>, it is difficult to
formally prove that an endpoint is jointly authoritative over multiple
certificates, rather than individually authoritative on each certificate. As a
result, clients <bcp14>MUST NOT</bcp14> assume that because one origin was previously
colocated with another, those origins will be reachable via the same endpoints
in the future. Clients <bcp14>MUST NOT</bcp14> consider previous secondary certificates to be
validated after TLS session resumption. Servers <bcp14>MAY</bcp14> re-present certificates
if a TLS Session is resumed.</t>
      </section>
      <section anchor="fingerprinting">
        <name>Fingerprinting</name>
        <t>This document defines a mechanism which could be used to probe servers for origins
they support, but it opens no new attack that was not already possible by
making repeat TLS connections with different SNI values.</t>
      </section>
      <section anchor="persistence-of-service">
        <name>Persistence of Service</name>
        <t>CNAME records in the DNS are frequently used to delegate authority for an origin
to a third-party provider. This delegation can be changed without notice, even
to the third-party provider, simply by modifying the CNAME record in question.</t>
        <t>After the owner of the domain has redirected traffic elsewhere by changing the
CNAME, new connections will not arrive for that origin, but connections which
are properly directed to this provider for other origins would continue to
claim control of this origin (via Secondary Certificates). This is proper
behavior based on the third-party provider's configuration, but would likely
not be what is intended by the owner of the origin.</t>
        <t>This is not an issue which can be mitigated by the protocol, but something about
which third-party providers <bcp14>SHOULD</bcp14> educate their customers before using the
features described in this document.</t>
      </section>
      <section anchor="confusion-about-state">
        <name>Confusion About State</name>
        <t>Implementations need to be aware of the potential for confusion about the state
of a connection. The presence or absence of a validated certificate can change
during the processing of a request, potentially multiple times, as
<tt>CERTIFICATE</tt> frames are received. A client that uses certificate
authentication needs to be prepared to reevaluate the authorization state of a
request as the set of certificates changes.</t>
        <t>Behavior for TLS-Terminated reverse proxies is also worth considering. If a
server which situationally reverse-proxies wishes for the client to view a
request made prior to receipt of certificates as TLS-Terminated, or wishes for
the client to start a new tunnel alternatively, this document does not currently
define formal mechanisms to facilitate that intention.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the <tt>CERTIFICATE</tt> frame type and
<tt>SETTINGS_HTTP_SERVER_CERT_AUTH</tt> setting for both <xref target="H2"/> and <xref target="H3"/>.</t>
      <section anchor="frame-types">
        <name>Frame Types</name>
        <t>This specification registers the following entry in the "HTTP/2 Frame Type"
registry defined in <xref target="H2"/>:</t>
        <t>Code: : TBD</t>
        <t>Frame Type: : CERTIFICATE</t>
        <t>Reference: : This document</t>
        <t>This specification registers the following entry in the "HTTP/3 Frame Types"
registry established by <xref target="H3"/>:</t>
        <t>Value: : TBD</t>
        <t>Frame Type: : CERTIFICATE</t>
        <t>Status: : permanent</t>
        <t>Reference: : This document</t>
        <t>Change Controller: : IETF</t>
        <t>Contact: : ietf-http-wg@w3.org</t>
      </section>
      <section anchor="settings-parameters">
        <name>Settings Parameters</name>
        <t>This specification registers the following entry in the "HTTP/2 Settings"
registry defined in <xref target="H2"/>:</t>
        <t>Code: : TBD</t>
        <t>Name: : SETTINGS_HTTP_SERVER_CERT_AUTH</t>
        <t>Initial Value: : 0</t>
        <t>Reference: : This document</t>
        <t>This specification registers the following entry in the "HTTP/3 Settings"
registry defined in <xref target="H3"/>:</t>
        <t>Code: : TBD</t>
        <t>Name: : SETTINGS_HTTP_SERVER_CERT_AUTH</t>
        <t>Default: : 0</t>
        <t>Reference: : This document</t>
        <t>Change Controller: : IETF</t>
        <t>Contact: : ietf-http-wg@w3.org</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="H2">
          <front>
            <title>HTTP/2</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
              <t>This document obsoletes RFCs 7540 and 8740.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9113"/>
          <seriesInfo name="DOI" value="10.17487/RFC9113"/>
        </reference>
        <reference anchor="H3">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="EXPORTED-AUTH">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ALTSVC">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="ORIGIN">
          <front>
            <title>The ORIGIN HTTP/2 Frame</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document specifies the ORIGIN frame for HTTP/2, to indicate what origins are available on a given connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8336"/>
          <seriesInfo name="DOI" value="10.17487/RFC8336"/>
        </reference>
      </references>
    </references>
    <?line 526?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Mike Bishop, Nick Sullivan, Martin Thomson and other
contributors for their work on the document that this is based on.</t>
      <t>And thanks to Eric Kinnear, Tommy Pauly, and Lucas Pardue for their guidance and
editorial contributions to this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
