<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc compact="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>

<rfc ipr="trust200902" docName="draft-nygren-tls-ip-in-sni-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IP in SNI">Representing IP addresses in TLS Server Name Indication (SNI)</title>

    <author initials="E." surname="Nygren" fullname="Erik Nygren">
      <organization>Akamai Technologies</organization>
      <address>
        <email>erik+ietf@nygren.org</email>
        <uri>http://erik.nygren.org/</uri>
      </address>
    </author>
    <author initials="R." surname="Salz" fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>

    <date year="2022" month="July" day="27"/>

    <area>General</area>
    <workgroup>TLS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This specification provides a mechanism for clients to send IP
addresses in a TLS Server Name Indication (SNI) extension as part of
TLS handshakes, allowing servers to return a certificate containing
that subjectAltName.  This is done by converting the IP address to a
special-use domain name.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>TLS <xref target="RFC8446"/> clients often need to send a Server Name Indication
(SNI) extension <xref section="3" sectionFormat="comma" target="RFC6066"/> as part of their ClientHello
message.  This helps servers select a certificate to return that
includes a subjectAltName which includes the SNI value.  Without SNI,
multi-tenant services need need as many IP addresses as server
certificates, which is not generally a problem with IPv6, but is
complicated by, as well as contributes to, address scarcity in IPv4.</t>

<t>Certificate subjectAltName (SAN) <xref section="4.2.1.6" sectionFormat="comma" target="RFC5280"/> values
can encode IP addresses (with a defined form for "iPAddress" that
encodes both IPv4 and IPv6 addresses as a sequence of octets).
However, the ServerName structure for SNI only defines "host_name" as
a "name_type" and encoding the hostname in Hostname, and it does not
specify a way to encode IP addresses.</t>

<t>The lack of support for IP addresses in SNI values is less problematic
in the case where a client is connecting to the IP address that it expects
to see in the certificate.  However, some specifications such
as <xref target="I-D.draft-ietf-add-ddr"/> have clients require that
a particular IP address is present in the SNI while connecting
to a different IP address.</t>

<t>This specification does NOT change any behaviors for how clients
to validate certificates.</t>

</section>
<section anchor="notational-conventions"><name>Notational Conventions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="indicating-ip-addresses-in-sni"><name>Indicating IP Addresses in SNI</name>

<t>TLS clients connecting to a server and expecting to find
a given IP address in a certificate subjectAltName MUST
encode the iPAddress they expect to find in the certificate
into the SNI HostName field.  This encoding is done by
converting the IP address into its reverse DNS address,
as also done in <xref target="RFC8738"/>.</t>

<t><em>Note that this encoding only applies to how IP addresses are
represented in SNI and does *NOT* change how IP addresses are
represented in certificate SANs.</em></t>

<t>Clients encode IPv6 "ip6.arpa" <xref target="RFC3596"/> names, using a reverse
mapping of the IP address as the HostName field.  For example, if the
IP address being validated is 2001:db8::1, the SNI HostName field
whould contain
"1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa".</t>

<t>Clients encode IPv4 addresses as "in-addr.arpa" <xref target="RFC1034"/> names,
using a reverse mapping of the address octets.  For example,
if the IPv4 address being validated is 192.0.2.7, the SNI HostName
field would contain "7.2.0.192.in-addr.arpa".</t>

<t>Servers receiving a SNI HostName field with one of these ".arpa" names
implement this specification by returning a certificate with a
subjectAltName containing the corresponding IP address as an
iPAddress, when such a certificate is available.  Servers MUST ignore
malformed ip6.arpa and in-addr.arpa SNI values, such as those which do
not contain 34 or 6 labels, respectively.  In the corner-case where a
server has both a certificate with an iPAddress SAN matching the
supplied SNI as well as a dNSName SAN that matches the .arpa SNI
string, the server SHOULD return the former (the cert corresponding to
the iPAddress SAN).</t>

<t>Note that there is no way to represent IP address prefixes
in certificates subjectAltNames.</t>

</section>
<section anchor="rejected-alternatives"><name>Rejected Alternatives</name>

<t>(Note to editor: this section is to be removed moved to an
appendix or removed prior to publication.)</t>

<t>Two other approaches have been considered but rejected.</t>

<section anchor="alternative-new-nametype"><name>Alternative: New NameType</name>

<t>One approach would be to introduce ip_address as a new name_type (or
perhaps one for each of IPv6 and IPv4).  For example, something
like:</t>

<figure><artwork><![CDATA[
  struct {
      NameType name_type;
      select (name_type) {
          case host_name: HostName;
          case ip_address: IPAddress;
      } name;
  } ServerName;
  enum {
      host_name(0), ip_address(1), (255)
  } NameType;
  opaque HostName<1..2^16-1>;
  opaque IPAddress<1..2^8-1>;
]]></artwork></figure>

<t>While the cleanest approach, discussions with TLS library
implementation maintainers indicate that this would be disruptive and
have wide-reaching impact to long-stable APIs.  It is likely that this
extension point ossified long ago, and that middle-boxes and other
software would also have problems here, as the SNI value is visible
in-the-clear and some devices are known to inspect it.</t>

</section>
<section anchor="alternative-shove-an-ip-into-hostname"><name>Alternative: Shove an IP into Hostname</name>

<t>Serializing an IP address into a string and shoving it into
the HostName value (eg, just putting in "192.0.2.7"
or "2001:db8::1") might work, but those are not valid
host names.  Just because they can be serialized on the wire
doesn't mean they won't result in unforseen breakage when abused
in this manner.</t>

</section>
</section>
<section anchor="iana"><name>IANA Considerations</name>

<t>No IANA registry changes are needed with this approach?</t>

<t>(TODO: Do we need to update anything to indicate this
special use of in-addr.arpa and ip6.arpa?)</t>

<t>(The first other alternative might need a new registry
if we decided to take that approach.)</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<t>Overloading the in-addr.arpa and ip6.arpa names has potential for
confusion if there are implementations that have odd behaviors
here, or which try and use certificates with dNSName subjectAltNames
containing those as hostnames.</t>

<t>As an example, some middleboxes (such as security appliances) may use
the SNI value as a hostname to resolve and direct connections towards
and this may have odd results when it is a .arpa address.</t>

<t>CAB Forum is considering updating their guidance to clarify that the
issuance of certificates on those names is prohibited
<xref target="cabforum.servercert.153"/>.</t>

<t>General issues may exist with using IP addresses in certificate
subjectAltNames, but a detailed analysis of this is outside the scope
of this specification.  Beyond not supporting IP addresses in SNI
fields, there may be issues in other areas:</t>

<t><list style="symbols">
  <t>The lifespan of IP addresses may be highly variable.  While the
ownership of some IP addresses (such as well-known DNS public
resolvers) may be quite static, many service providers issue
IP addresses with very short lifetimes.  Clients may rotate their
IPv6 privacy addresses <xref target="RFC8981"/> every few hours, as a very
widespread example.</t>
  <t>There is no way to use CAA records <xref target="RFC8659"/> to constrain
certificates on IP addresses.  While it may be wortth considering
supporting CAA records within the in-addr.arpa and ip6.arpa name
spaces to allow network operators to constrain certificate issuance
on IP addresses under their control, that is outside of the scope of
this specification.</t>
</list></t>

<t>Note that certificate Name Constraints <xref section="4.2.1.10" sectionFormat="comma" target="RFC5280"/> do
support IP addresses, but it is unclear how widely this is implemented
by client validators.  Private certificate authorities may wish to
consider using Name Constraints to only allow issuance of IP address
certificates to organizational IP space.</t>

</section>
<section anchor="privacy"><name>Privacy Considerations</name>

<t>The SNI extension is sent in cleartext on the network,
and thus visible to a passive observer.
Using <xref target="I-D.draft-ietf-tls-esni"/> Encrypted Client Hello
to protect the SNI may help.</t>

<t>Similar issues that exist with hostname based SNI values
(with being able to perform tracking and correlation)
may exist with IP addresses in SNI as well.</t>

<t>There may also be protocol-specific risks when desired IP addresses
are sent in-the-clear as SNI.</t>

<t>Note that in many cases, observers will also be able to see
the IP address as the destination endpoint of connections.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>Thank you to Kyle Rose, Jon Reed, Ben Kaduk, and others who provided
valuable input towards this draft.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC6066' target='https://www.rfc-editor.org/info/rfc6066'>
<front>
<title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<date month='January' year='2011'/>
<abstract><t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, &quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;.  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6066'/>
<seriesInfo name='DOI' value='10.17487/RFC6066'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC3596' target='https://www.rfc-editor.org/info/rfc3596'>
<front>
<title>DNS Extensions to Support IP Version 6</title>
<author fullname='S. Thomson' initials='S.' surname='Thomson'><organization/></author>
<author fullname='C. Huitema' initials='C.' surname='Huitema'><organization/></author>
<author fullname='V. Ksinant' initials='V.' surname='Ksinant'><organization/></author>
<author fullname='M. Souissi' initials='M.' surname='Souissi'><organization/></author>
<date month='October' year='2003'/>
<abstract><t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6).  The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing.  The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='88'/>
<seriesInfo name='RFC' value='3596'/>
<seriesInfo name='DOI' value='10.17487/RFC3596'/>
</reference>



<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8738' target='https://www.rfc-editor.org/info/rfc8738'>
<front>
<title>Automated Certificate Management Environment (ACME) IP Identifier Validation Extension</title>
<author fullname='R.B. Shoemaker' initials='R.B.' surname='Shoemaker'><organization/></author>
<date month='February' year='2020'/>
<abstract><t>This document specifies identifiers and challenges required to enable the Automated Certificate Management Environment (ACME) to issue certificates for IP addresses.</t></abstract>
</front>
<seriesInfo name='RFC' value='8738'/>
<seriesInfo name='DOI' value='10.17487/RFC8738'/>
</reference>


<reference anchor='I-D.draft-ietf-add-ddr'>
   <front>
      <title>Discovery of Designated Resolvers</title>
      <author fullname='Tommy Pauly'>
	 <organization>Apple Inc.</organization>
      </author>
      <author fullname='Eric Kinnear'>
	 <organization>Apple Inc.</organization>
      </author>
      <author fullname='Christopher A. Wood'>
	 <organization>Cloudflare</organization>
      </author>
      <author fullname='Patrick McManus'>
	 <organization>Fastly</organization>
      </author>
      <author fullname='Tommy Jensen'>
	 <organization>Microsoft</organization>
      </author>
      <date day='5' month='July' year='2022'/>
      <abstract>
	 <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver&#39;s
   encrypted DNS configuration.  An encrypted resolver discovered in
   this manner is referred to as a &quot;Designated Resolver&quot;.  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted resolvers and their
   designated resolvers are operated by the same entity or cooperating
   entities.  It can also be used to discover support for encrypted DNS
   protocols when the name of an encrypted resolver is known.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-add-ddr-08'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-add-ddr-08.txt' type='TXT'/>
</reference>


<reference anchor="cabforum.servercert.153" target="https://github.com/cabforum/servercert/issues/153">
  <front>
    <title>Clarify validation requirements for .arpa #153</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC8981' target='https://www.rfc-editor.org/info/rfc8981'>
<front>
<title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
<author fullname='F. Gont' initials='F.' surname='Gont'><organization/></author>
<author fullname='S. Krishnan' initials='S.' surname='Krishnan'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<author fullname='R. Draves' initials='R.' surname='Draves'><organization/></author>
<date month='February' year='2021'/>
<abstract><t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t></abstract>
</front>
<seriesInfo name='RFC' value='8981'/>
<seriesInfo name='DOI' value='10.17487/RFC8981'/>
</reference>



<reference anchor='RFC8659' target='https://www.rfc-editor.org/info/rfc8659'>
<front>
<title>DNS Certification Authority Authorization (CAA) Resource Record</title>
<author fullname='P. Hallam-Baker' initials='P.' surname='Hallam-Baker'><organization/></author>
<author fullname='R. Stradling' initials='R.' surname='Stradling'><organization/></author>
<author fullname='J. Hoffman-Andrews' initials='J.' surname='Hoffman-Andrews'><organization/></author>
<date month='November' year='2019'/>
<abstract><t>The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain name. CAA Resource Records allow a public CA to implement additional controls to reduce the risk of unintended certificate mis-issue.  This document defines the syntax of the CAA record and rules for processing CAA records by CAs.</t><t>This document obsoletes RFC 6844.</t></abstract>
</front>
<seriesInfo name='RFC' value='8659'/>
<seriesInfo name='DOI' value='10.17487/RFC8659'/>
</reference>


<reference anchor='I-D.draft-ietf-tls-esni'>
   <front>
      <title>TLS Encrypted Client Hello</title>
      <author fullname='Eric Rescorla'>
	 <organization>RTFM, Inc.</organization>
      </author>
      <author fullname='Kazuho Oku'>
	 <organization>Fastly</organization>
      </author>
      <author fullname='Nick Sullivan'>
	 <organization>Cloudflare</organization>
      </author>
      <author fullname='Christopher A. Wood'>
	 <organization>Cloudflare</organization>
      </author>
      <date day='13' month='February' year='2022'/>
      <abstract>
	 <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-esni-14'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-tls-esni-14.txt' type='TXT'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

