Internet Architecture Board R. Housley Internet-Draft Vigil Security Intended status: Informational K. O'Donoghue Expires:November 13, 2016March 26, 2017 Internet SocietyMay 12,September 22, 2016 Problems with the Public Key Infrastructure (PKI) for the World Wide Webdraft-iab-web-pki-problems-02.txtdraft-iab-web-pki-problems-03.txt AbstractThis document describes some of the challenges facing the currentThe Public Key Infrastructure (PKI) used for the World Wide Web (Web PKI)and considers promising improvements to address these challenges. Technical, process, and policy improvements tois a vital component of trust in theWebPKI are considered.Internet. Inaddition, some technical considerations beyond WebPKI itself are considered. Hopefully the contentrecent years, there have been a number of improvements made to this infrastructure, including improved certificate status checking, automation, and transparency of governance. However, additional improvements necessary. This documentwill help driveidentifies continuing areas of concerns and provides recommendations to the Internet community for additional improvements, moving towardwide spread adoption of some of the highlighted recommendations.a more robust and secure Web PKI. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onNovember 13, 2016.March 26, 2017. Copyright Notice Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Very Brief Description of the Web PKI . . . . . . . . . . . .32 3.TechnicalImprovements to the Web PKI . . . . . . . . . . . .4. . . . . 3 3.1. Weak Cryptographic Algorithms or Short Public Keys . . .43 3.2.Certificate Status Checking . . . . . . . . . . . . . . . 5 3.2.1. Short-lived Certificates . . . . . . . . . . . . . . 6 3.2.2. CRL Distribution Points . . . . . . . . . . . . . . . 6 3.2.3. Proprietary Revocation Checks . . . . . . . . . . . . 6 3.2.4. OCSP Stapling . . . . .Support for Enterprise PKIs . . . . . . . . . . . . . . .74 3.3.Surprising Certificates . . . . . . . . . . . . . . . . . 8 3.3.1. Certificate Authority Authorization (CAA) . . . . . . 9 3.3.2. HTTP Public Key Pinning (HPKP) . . . . . . . . . . . 9 3.3.3. HTTP Strict Transport Security (HSTS) . . . . . . . . 10 3.3.4. DNS-Based Authentication of Named Entities (DANE) . . 10 3.3.5. Certificate Transparency . . . . . . . . . . . . . . 11 3.4. Automation for Server Administrators . . . . . . . . . . 12 4. Policy and Process Improvements to theWeb PKI. . . . . . . 13 4.1. Determination of the Trusted Certificate Authorities . . 13 4.2. Price for Certificates . . . . . . . . . . . . . . . . . 14 4.3. Governance Structures forin theWeb PKI .Home . . . . . . . . .15 5. Additional Technical Considerations . . .. . . . . . . . . .15 5.1.6 3.4. Browser Error Messages . . . . . . . . . . . . . . . . .15 5.2. Time Synchronization . . . . . . . . . . . . . . . . . . 16 6. Recommendations for Improving8 3.5. Governance Improvements to the Web PKI . . . . . . . . .. 16 7.8 4. Security Considerations . . . . . . . . . . . . . . . . . . .17 8.10 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . .17 9.10 6. References . . . . . . . . . . . . . . . . . . . . . . . . .18 9.1.11 6.1. Normative References . . . . . . . . . . . . . . . . . .18 9.2.11 6.2. Informative References . . . . . . . . . . . . . . . . .1811 Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . .2213 Appendix B. IAB Members at the Time of Approval . . . . . . . .2213 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .2213 1. Introduction There are many interrelated problems with the current Public Key Infrastructure (PKI) used for the World Wide Web (Web PKI). The Web PKI makes use of certificates as described in RFC 5280 [RFC5280]. These certificates are primarily used with Transport Layer Security (TLS) as described in RFC 5246 [RFC5246]. The economics of the Web PKI value chain are discussed in [VFBH], [AV], and [AVAV]. This document does not discuss the economic issues further, but these economic issues provide motivation for correcting the other problems that are discussed in this document. Over the years, many technical improvements have been made to the Web PKI, but several challenges remain. This documentdescribes technical, usability, process, and policy problems, considers some emerging technical improvements, discusses some evoling process and policy improvements, and provides some basicoffers a general set of recommendationsforto the Internetcommunity.community that might be helpful in addressing these remaining challenges. 2. Very Brief Description of the Web PKI Certificates are specified in RFC 5280 [RFC5280]. Certificates contain, among other things, a subject name, a public key, a limited valid lifetime, and the digital signature of the Certification Authority (CA). Certificate users require confidence that the private key associated with the certified public key is owned by the named subject. The architectural model used in the Web PKI includes: EE: End Entity -- the subject of a certificate -- certificates are issued to end entities including Web servers and clients that need mutual authentication. CA: Certification Authority -- the issuer of a certificate -- issues certificates for end entities including Web servers and clients. RA: Registration Authority -- an optional system to which a CA delegates some management functions such as identity validation or physical credential distribution. A valid certificate may be revoked for any number of reasons. CAs are responsible for indicating the revocation status of the certificates that they issue throughout the lifetime of the certificate. Revocation status information may be provided using the Online Certificate Status Protocol (OCSP)RFC 6960[RFC6960], certificate revocation lists (CRLs)RFC 5280[RFC5280], or some other mechanism. In general, when revocation status information is provided using CRLs, the CA is also the CRL issuer. However, a CA may delegate the responsibility for issuing CRLs to a different entity. The enrollment process used by a CA makes sure that the subject name in the certificate is appropriate and that the subject actually holds the private key. Proof of possession of the private key is often accomplished through a challenge-response protocol. 3.TechnicalImprovements to the Web PKI Over the years, many technical improvements have been made to the Web PKI. Despite this progress, several challenges remain. This section discusses severalproblemsunresolved problems, andthe technical improvements that have been made to address them. This history sets the stage for suggestionsit suggests general directions foradditional improvements in other sections of this document.tackling them. 3.1. Weak Cryptographic Algorithms or Short Public KeysOver the years, theSeveral digital signature algorithms, one-way hash functions, and public key sizes thatarewere once considered stronghave changed.are no longer considered adequate. This is not a surprise. Cryptographic algorithms age; they become weakerwithover time. As new cryptanalysis techniques are developed and computing capabilitiesimprove,increase, thework factoramount of time needed to break a particular cryptographic algorithm willreduce.decrease. For this reason, the algorithms and key sizes used in the Web PKI need to migrate over time.A reasonable choice of algorithm or key size needs to be reevaluated periodically, and a transition may be needed before the expected lifetime expires. The browserBrowser vendors have been trying to manage algorithm and key sizetransitions, buttransitions. It is along-lived trust anchor or intermediate CA certificate can havesignificant challenge to maintain ahuge numbervery high degree ofcertificates under it. So, removing one certificate because it uses a weakinteroperability across the world wide web while phasing out aged cryptographic algorithm ora short publictoo small keycan havesize. When these appear in asignificantlong-lived trust anchor or intermediate CA certificate, refusal to accept them can impactona very large certificate subtree. In addition, if a certificate for a web site with a huge amount of traffic is in that subtree,it will increase the difficulty in removing therejecting that certificatewith a weak cryptographic algorithm or a short public key. As a result, some valid trust anchors and certificates contain cryptographic algorithms long after weaknesses have been discovered and widely known. Similarly, valid trust anchors and certificates contain public keys after computational resources available to attackers have rendered themmay impact tooweak. We have seen a very successful migration away from certificates that usemany users. Despite this situation, theMD2 orMD5 and SHA-1 one-way hashfunctions. However, there are still a number of certificates that use SHA-1functions have been almost completely eliminated from the Web PKI, and 1024-bit RSA public keys are essentially gone [MB2015][MB2016], and these certificates should be replaced. Today, the algorithms and key sizes used by a CA to sign end-entity certificates with a traditional lifespan of[MB2016]. It took ayear should offer 112very long time to128 bits of security. SHA-256 is a widely studied one-way hash function that meets this requirement. RSA with a public key of at least 2048 bits or ECDSA with a public key of at least 256 bits are widely studied digital signature algorithms that meetmake thisrequirement. The algorithmshappen, and trust anchors andkey sizes used by a CA to sign long-lived intermediate CAcertificates thatoften have a lifespan of several decades should offer even greater security. SHA-384 is a widely studied one-way hash function that meets this requirement. RSA with a public key of at least 3072 bits or ECDSA with a public key of at least 384 bits are widely studied digital signatureused these cryptographic algorithmsthat meet this requirement.were considered valid long after they were widely known to be too weak. Obviously, additional algorithm transitions will be needed in thefuture as thesefuture. The algorithmsage. These algorithms, like the onesand key sizes thatwere used earlier,are acceptable today will become weaker with time.RFC 7696[RFC7696] offers some guidelines regarding cryptographic algorithm agility.3.2. Certificate Status Checking Several years ago, many browsers did not perform certificate status checks by default. That is, browsers did not check whether the issuing CA had revoked the certificate unless the user explicitly adjusted a setting to enable this feature. This check can be made by fetching the most recent certificate revocation list (CRL) RFC 5280 [RFC5280], or this check can use the Online Certificate Status Protocol (OCSP) RFC 6960 [RFC6960].Thelocation of the CRL orWeb PKI can prepare for theOCSP responder is usually found innext transition by: 1. Having experts periodically evaluate thecertificate itself. However, bothcurrent choices ofthese approaches add latency. The desire to provide a responsive user experience is a significant reason that this feature has not been turned on by default. Mobile browsers simply do not bother to check revocation status [IMC2015]. Certificate status checking needs to be used at all times. Several techniques have been tried by CAs and browsers to make certificate status checking more efficient. Many CAs are using Content Delivery Networks (CDNs) to deliver CRLs and OCSP responses, resulting in very high availabilityalgorithm andlow latency. Yet, browser vendors are still reluctant to perform standard-based status checking by default for every session. Certificate status checking by the browser can reveal the web sites that the browser userkey size. While it isvisitingnot possible tothe OCSP Responder or the server providing the CRL. This privacy concern canpredict when a new cryptanalysis technique will beeliminated by having the Web Server include the OCSP Response indiscovered, theTLS handshake. This is called OCSP Stapling, and it is discussed further in Section 3.2.4. Measurements in 2015 [IMC2015] show that a surprisingly large fractionend ofWeb PKI certicates have been revoked. Note that these measurements were taken aroundthetimeuseful lifetime ofthe Heartbleed incident [HEARTBLEED],most algorithms andthe revocation activity may have been unusually high due to this incident. In addition, this incident exacerbates the problem of incomplete Web PKI revocation checking. These measurements show that browsers are not obtaining current certificate revocation information because itkey sizes istoo expensiveknown many years interms of latency and bandwidth. Finally, onlyadvance. 2. Planning for asmall number of CRLsmooth andOCSP serversorderly transition from a weak algorithm or key size. Experience has shown that many years areavailable over IPv6,needed produce to specifications, develop implementations, andas more ofthen deploy replacements. 3. Reducing theWeb moveslifetime of certificates, especially intermediate CA certificates, toIPv6 [ABLOG] this is expectedcreate frequent opportunities tobecome an increasingly significant issue. The following subsections identify some approaches for reducing the perceived and actual cost of revocation status checks. 3.2.1. Short-lived Certificates Short-lived certificates arechange anexcellent way to reduce the need for certificate status checking. The shorter the life of the certificate, the less time there isalgorithm or key size. 3.2. Support foranythingEnterprise PKIs Many enterprises operate their own PKI. These enterprises do not want togo wrong. If the lifetime is short enough, policy might allow certificate status checking canbeskipped altogether. In practice, implementation of short-lived certificates requires automation to assist web server administrators, which is a topic that is discussed elsewhere in this document. 3.2.2. CRL Distribution Points The certificate revocation list distribution point (CRLDP) certificate extension RFC 5280 [RFC5280] allows a CA to control the maximum sizepart of theCRLs thattraditional Web PKI, but theyissue. This helpsface many challenges intwo ways. First, the amount of storage needed by the browserorder tocache CRLs is reduced. Second,achieve a similar user experience andmore importantly, the amountlevel oftime it takes to download a CRL can be scoped, so thatsecurity. Users must install theamount of time needed to fetch any single CRL is reasonable. Few CAs take advantage oftrust anchor or trust anchors for theCRLDP certificate extensionenterprise PKI in their browser. There is not a standard way tolimit the size of CRLs. In fact, thereaccomplish trust anchor installation, and users areseveral CAs that publish extremely large CRLs. Browsers never want to suffer the latency associatedoften faced withlarge CRLs, and some ignore the CRLDP extension when it is present. Browsers tend to avoidscary warnings in theuseprocess ofCRLs altogether. 3.2.3. Proprietary Revocation Checksthe installation. Enterprise PKI users often experience greater latency than tradition Web PKI users. Some browser vendors provide a proprietarymechanism forrevocationchecking. These mechanisms obtainchecking mechanism that obtains revocation statusinformation once per dayfor the entire Web PKI in a very compact form.NoThis mechanism eliminates latency since no network traffic is generated at the time that a certificate is beingvalidated, so there is no latency associated with revocation status checking. The browser vendor infrastructure performs daily checks of the Web PKI, and then the results are assembled in a proprietary format and made available to the browser. These checks onlyvalidated. However, these mechanisms cover only the trust anchor store for that browser vendor,so any trust anchors added by the user cannot be checked in this manner. Measurementsexcluding all enterprise PKIs. In addition, measurements in 2015 [IMC2015] show thatproprietary status checking isthese mechanisms do not currentlyprovidingprovide adequate coverage of the Web PKI.3.2.4. OCSP Stapling Browsers can avoid transmission of CRLs altogether by using the Online Certificate Status Protocol (OCSP) RFC 6960 [RFC6960] to check the validity of web server certificates. The TLS Certificate Status Request extension is defined in Section 8 of RFC 6066 [RFC6066]. In addition,RFC 6961 [RFC6961] defines the TLS Multiple Certificate Status Request extension, which allows the web server to provide status information about its own certificate and also the status of intermediate certificates in the certification path. By including this extension in the TLS handshake, the browser asks the web server to provideanOCSPresponseresponses in addition toitsthe server certificate. This approach greatly reduces thenumber of round trips bylatency since the browser does not need tocheck the status of each certificate in the path. In addition, the web server can cache thegenerate any OCSPresponserequests or wait fora period of time, avoiding additional latency. Even in the cases where the web server needs to contact theany OCSPresponder, the web server usually has a higher bandwidth connection than the browser to do so.responses. The provision of the time-stamped OCSP response in the TLS handshake is referred to as "stapling" the OCSP response to the TLS handshake. If the browser does not receive a stapled OCSP response, it can contact the OCSP responder directly. In addition, the MUST_STAPLE feature [TLSFEATURE] can be used to insist that OCSP stapling be used. When every browser that connects to a high volume website performs its own OCSP lookup, the OCSP responder must handle areal-time response to every browser.large volume of OCSP requests in real-time. OCSP stapling can avoid enormous volumes of OCSP requests for certificates of popular websites, so stapling can significantly reduce the cost of providing an OCSP service. OCSP stapling can also improve user privacy, since the web server, not the browser, contacts the OCSP responder. In this way, the OCSP responder is not able to determine which browsers are checking the validity of certificate for particular websites.Many web site are taking advantage of OCSP stapling. At the time of this writing, browser venders report that about 12% the the transactions use OCSP stapling, and the number is on the rise. 3.3. Surprising Certificates All of the CAs in the trust store are equally trusted for the entire domain name space, so any CA canSeveral enterprises issuefor any domain name. In fact, there have beencertificatesissued by CAs that are surprisingtothe legitimate ownerall ofa domain. The domain name ownertheir employees, and among other uses, these certificates are used in TLS client authentication. There issurprised because they didnotrequest the certificates. They are initially unaware that a CA has issuedacertificate that contains their domain name,common way to import the private key andoncethesurprisingclient certificateis discovered, itinto browsers. In fact, the private key can bevery difficult for the legitimate domain name owner to get it revoked. Further, browsers and other relying parties cannot distinguish a certificate that the legitimate domain name owner requested from a surprising one. Since all of the CAsstored in many different formats depending on thetrust store are equally trusted, any CA can issue a certificate for any domain name. There are known cases where attackers have thwarted the CA protections and issued certificates that were thensoftware used tomount attacks againstgenerate theusers of that web site [FOXIT]. For this reason, all of the CAs listed in the trust store mustpublic/private key pair. PKCS#12 [RFC7292] seems to bevery well protected. The Baseline Requirements produced bytheCA/Browser Forum [CAB2014] tell CAsmost popular format at thechecks that needmoment. A standard way tobe performed before a certificate is issued. In addition, WebTrust [WEBTRUST] providesimport theaudit requirements for CAs,needed keying material andbrowser vendors will remove a CA from the trust anchor store if successful audit reports are not made available. WhenaCA issues a certificate to a subordinate CA,standard format will make this task much easier, and theinclusion of widely supported certificate extensionsWorld Wide Web might enjoy an increase in mutual authentication. Enterprise PKIs canreduce the set of privileges given to the sub-CA. This alignsbe better supported if: 1. Each enterprise PKI offers an OCSP Responder, and web sites withthe traditional security practice of least privilege, where only the privileges needed to perform the envisioned tasks are provided. However, many sub-CAs havecertificatesthat pass alongfrom thefull powersenterprise PKI make use of OCSP Stapling. 2. Browser vendors support a standard way for theCA, creating additional high-pay-off targetstrust anchors forattackers, and these sub-CAs may notthe enterprise PKI to beheldinstalled. 3. Browser vendors support a standard way tothe same certificate issuance requirementsinstall private keys andaudit requirement as the parent CA. Some major implementations have not fully implementedcertificates for use in client authentication. 4. In the event that browser vendors continue to offer latency-free proprietary revocation status checking mechanisms, then these mechanismsnecessaryneed toreduce sub-CA privileges. For example, RFC 5280 [RFC5280] includesexpand thespecificationcoverage to all ofname constraints, andtheCA/ Browser Forum guidelines [CAB2014] encourageWeb PKI and offer a means to include enterprise PKIs in theuse of dNSNamescoverage. 3.3. Web PKI inpermittedSubtrees withinthename constraints extension. Despite this situation, one major browser does not support name constraints,Home More andas a result, CAsmore, web protocols arereluctantbeing used touse them. When they are used, the name constraints extensionmanage devices innot marked critical so thatthe home. For example, homeowners can use a web browserthat does not support this extension is freetoignore the extension. This situation leads to enforcement of the name constraint by some browsers and not others. Further, global CAs are preparedconnect toissue certificates within every top-level domain, including onesa web site thatare newly-approved. Itisnot practical for these global CAs to use name constraintsembedded in theirsub-CA certificates. As a result of procedural failures or attacks, surprising certificates are being issued. Several mechanisms have been definedhome router toavoid the issuance of surprising certificates or prevent browsers from accepting them. 3.3.1. Certificate Authority Authorization (CAA)adjust various settings. TheCertificate Authority Authorization (CAA) [RFC6844] DNS resource recordrouter allowsa domain administrator to specify one or more CAs authorizedthe browser toissue certificates that include that domain name. Then, a trustworthy CA will refuseaccess web pages toissue a certificate for a domain name that has a CAA resource record that does not explicitly nameadjust these setting as long as theCA. To date, only one major CA performs this check,connection originates from the home network and the proper password is provided. However, there is noindication that other CAs are planning to add this check inway for thenear future. 3.3.2. HTTP Public Key Pinning (HPKP) HTTP Public Key Pinning (HPKP) [RFC7469] allows a web serverbrowser toinstruct browsersauthenticate toremember the server's public key fingerprints for a period of time. The fingerprint is a one-way hash of the subject public key information inthecertificate. The Public-Key- Pins header provides a maximum retention period, fingerprintsembedded web site. Authentication of the webserver certificate, and optionally fingerprints for backup certificates. The act of savingsite is normally performed during thefingerprintsTLS handshake, but the Web PKI isreferrednot equipped toas "pinning". Duringissue certificates to home routers or thepin lifetime, browsers requiremany other home devices thatthe sameemploy embedded webserver present a certificate chainsites for homeowner management. A solution in this environment must not depend on the homeowner to perform duties thatincludesare normally associated with apublic key that matches one ofweb site administrator. However, some straightforward tasks could be done at theretained fingerprints. This prevents impersonation oftime thewebsite with a surprising certificate. A website can choose to pindevice is installed in theCA certificate sohome. These task cannot be more complex that thebrowserinitial setup of a new printer in the home, otherwise they willaccept only validbe skipped or done incorrectly. There are two very different approaches to certificates forthe website domain that are issued byhome devices thatCA. Alternatively,have been discussed over thewebsite can choose to pin their own certificateyears. In the first approach, a private key andat least one backupcertificate are installed incasethecurrentdevice at the factory. The certificateneeds to be replaced due to a compromised server. Some browser vendors also pin certificates by hardcoding fingerprints of very well known websites. When HPKPhas an unlimited lifetime. Since it never expires, no homeowner action isused, browsers may be ableneeded todetect a man-in-the- middle. Sometimesrenew it. Also, since theman-in-the-middle is an attacker, and other times a service provider purposefully terminatescertificate never changes, theTLS at a location other thanalgorithms are selected by theweb server. One example became very public in February 2012 when Trustwave admitted that it had issued a subordinate CA certificatefactory foruse by a company to inspect corporate network traffic [LC2012]. When HPKP is used,thebrowser user will be notified iflifetime of thekey-pining is violated, unlessdevice. The subject name in theviolatingcertificatecan be validated to a locally installed trust anchor. In this situation, the browserisassumingquite generic, as it must be comprised of information thatthe user intended to explicitly trust the certificate. 3.3.3. HTTP Strict Transport Security (HSTS) HTTP Strict Transport Security (HSTS) [RFC6797]isa security policy mechanism that protects secure websites against downgrade attacks, and it greatly simplifies protection against cookie hijacking.known in the factory. Thepresencesubject name is often based on some combination of theStrict-Transport-Security header tells browsers that all interactions with this web server should never use HTTP without TLS, providing protection against both eavesdroppingmanufacturer, model, serial number, andactive network attacks. The protections can be tiedMAC address. While these do uniquely identify the device, they have little meaning to the homeowner. In the second approach, like the first one, adomain or a domainprivate key andall of its sub-domains. Whenaweb server includescertificate that are installed in theStrict-Transport-Security header,device at thebrowserfactory, but the homeowner is unaware of them. This factory-installed certificate isexpectedused only todo two things. First, the browser automatically turns any insecure links into secure ones. For instance, "http://mysite.example.com/mypage/" will be changedauthenticate to"https://mysite.example.com/mypage/". Second, ifa CA operated by theTLS Handshake results in some failure, such asmanufacturer. At thecertificate cannot be validated, then an error message is displayed andtime theuserdevice isdenied access toinstalled, theweb application. Any web server misconfiguration, such ashomeowner can provide acertificate expiration, will result no one being able to access the web site until the configuration is corrected. To date, HSTS ha seen very little deployment, and there is no indication thatportion of thebrowser vendors intend to add supportsubject name forit. 3.3.4. DNS-Based Authentication of Named Entities (DANE) The DNS-Based Authentication of Named Entities (DANE) [RFC6698] allows domain administrators to specifytheraw public keys or certificates that are used by web servers in their domain. DANE leveragesdevice, and theDNS Security Extensions (DNSSEC) [RFC4034][RFC4035], which provides digital signatures over DNS zones that are validated with keysmanufacturer CA can issue a certificate thatare bound to the domainincludes a subject nameofthat thesigned zone.homeowner will recognize. Thekeys associated with a domain namecertificate canonlybesignedrenewed without any action by the homeowner at appropriate intervals. Also, following akey associated withsoftware update, theparent of that domain name. For example,algorithms used in theDNSSEC keys for "www.example.com" can only be signed byTLS handshake and theDNSSEC keys for "example.com". Therefore, a malicious actorcertificate canonly compromise the keysbe updated. Section 3.1 oftheir own subdomains. Likethis document calls for theWeb PKI, DNSSEC relies on public keys usedability tovalidate chains of signatures, but DNSSEC has a single root domain as opposedtransition from weak cryptographic algorithms over time. For this reason, and the ability to use amultiplicity of trusted CAs. DANE binds raw public keys or certificates to DNS names. The domain administrator is the onesubject name thatvouches forthebinding ofhomeowner will recognize, thepublic key orsecond approach is preferred. One potential problem with thecertificate tosecond approach is continuity of operations of thedomain name by addingmanufacturer CA. After theTSLA records todevice is deployed, thezonemanufacturer might go out of business, and thensigning the zone. In this way, the same administrator is responsiblecome time formanaging the DNS names themselves and associated public keys or certificates with those names. DANE restricts the scoperenewal ofassertions that canthe certificate, there will not bemade, forcing thema CA tobe consistent withissue theDNS naming hierarchy. In addition, DNSSEC reduces opportunities for redirection attacks by bindingnew certificate. One possible solution might be modeled on the domain name business, where other parties will continue to provide needed services if thepublic key or certificate. Someoriginal provider goes out of business. The Web PKI can prepare for the vast number of home devices that need certificatesare being posted in TLSA records, but browsers expect to receiveby: 1. Building upon theserver certificatework being done in theTLS handshake, and there is little incentive for browsersIETF ACME Working Group [ACMEWG] toconfirm thatfacilitate thereceived certificate matchesautomatic renewal of certificates for home devices without any actions by theone posted inhomeowner beyond theDNS. For this reason, work has begun on a TLS extensioninitial device setup. 2. Working with device manufacturers to establish scalable CAs that willallow the DNSSEC- protected informationcontinue tobe provided in the handshake, which will eliminateissue certificates for theadded latency [TLSCHAIN]. 3.3.5. Certificate Transparency Certificate Transparency (CT) [RFC6962] offers a mechanism to detect surprising certificates, and once detected, administrators and CAs can takedeployed devices even if thenecessary actionsmanufacture goes out of business. 3. Working with device manufacturers torevoke the surprising certificates. When requesting a certificate, the administrator can requestestablish OCSP Responders so that theCA to include anweb sites that are embeddedSigned Certificate Timestamp (SCT)in thecertificate to ensure that their legitimate certificate is logged with one or more CT logs. An administrator, or another party acting on behalf of the administrator, is able to monitor one or more CT logs to which a pre- certificate or certificate is submitted,devices can provide robust authentication anddetect the logging ofOCSP stapling in apre-certificate or certificatemanner thatcontains their domain name. When such a pre-certificate or certificateisdetected, the CA can be contacted to to get the surprising certificate revoked. In the future, acompatible with traditional web sites. 3.4. Browser Error Messages Many users find browsermay chooseerror messages related torejectcertificatesthat do not contain an SCT, and potentially notify the website administrator or CA when they encounter such a certificate. Such reporting will help detect mis-issuance of certificates and lead to their revocation. The IETF Certificate Transparency Working Group isconfusing. Good man-machine interfaces are always difficult, but inthe process of updating RFC 6962. Many data structuresthis situation users arechanging, and CT logs will have to pick a format, choosing version 1 (v1) that conforms to RFC 6962 or version 2 (v2) that conformsunable to fully understand thenew specification. Since the data structuresrisks that they areincompatible,accepting, and as av2 log willresult they do notbe ablemake informed decisions about when toissue a valid v1 SCT. A CT client can support both v1proceed andv2 SCTs for the same certificate, simultaneously, since a v1 SCT willwhen to stop. This aspect of browser usability needs to becarried in different extension than a v2 SCT. 3.4. Automation for Server Administrators The IETF has developed several protocolsimproved forcertificate management, including the Certificate Management Protocol (CMP) [RFC4210], Certificate Management over CMS (CMC) [RFC5272], and Enrollment over Secure Transport (EST) [RFC7030]. There are also some proprietary certificate management protocols. None of these protocols enjoys a dominate position in the market. Thereusers to make better security choices. Browser users have beenseveral attempts to provide automation for routine tasks that are performed by web server administrators, such as certificate renewal. For example, some commercial tools offer automated certificate renewal and installation [DCEI][SSLM]. Also, at least one proposal was broughttrained to ignore warnings, making them ineffective. Further, solving theIETF that allows a web server to automate obtaining and renewing certificates [PHBOB]. Without automation, there are many manual steps involvederror message situation ingetting a certificate from a CA, andisolation is probably not possible; instead, it needs todate none of these attempts at automation have enjoyed widespread interoperability and adoption. There are at least two ways thatbe considered along side the other issues raised in thisimpacts web security. First, many web sites do notdocument. Browser users have been trained to find acertificate at all. The cost, time,way around any error, andeffort are too great forvery often, thesystem administrator. Thiserror isespecially true ifthe result of website isserver misconfiguration, and it does notinvolved in financial transactions or some other critical activity. Second, once a certificate is obtained,actually present areplacement is not obtained untilrisk to thecurrent one expires. Automation can reducebrowser user. If theamount of time that an administrator needs to dedicate to certificate management, and it can make certificate renewal timely and automatic. Both of these should leadrisk tomore widespread deployment and improved web security. The IETF ACME working group [ACMEWG]the user isworking on protocols that will provide system administratorshigh, then the session should be closed withan automated way to enroll and renew their certificates. The expectation isa clear description of the problem thatthese specificationswas encountered. Doing so will lead towidely available and interoperableimproved management of the overall Web infrastructure over time, especially as the toolsfor system administrators. The expectation isthatthese protocols and tools will be supported by allare being developed for web serverenvironments and CAs, which will greatly reduce complexity and cost.administrators are rolled out. Inaddition,some enterprises, avoiding these errors requires theeasier renewal process provided by automation can be usedaddition of enterprise-specific trust anchors toreduce certificate lifetimes, which in turn will reducethetime requiredbrowser. Additional tools are needed toflush old algorithms outallow administrations to easily add appropriate trust anchors, especially browsers on consumer devices as more and more enterprises are embracing bring-your-own-device policies. The Web PKI can simplify user choice and improve user actions by: 1. Browser vendors providing additional intelligence to eliminate the majority of certificate warnings, only prompting thesystemuser whenitthere isdecidedlikely totransitionbe a risk. 2. Browser vendors improving error messages tonewer more secure algorithms. 4. Policy and Processclearly indicate the risk that the user is accepting if they proceed. 3.5. Governance Improvements to the Web PKI As with many other technologies,the issues and complexities associated withWeb PKIuse and deploymenttechnical issues arejust as muchtangled up with policy and processas technical. Theseissues. Policy and process issues have evolved overtime as well. This section discusses the ways that business models and operational policiestime, sometimes eroding confidence andprocesses impacttrust in the Web PKI.4.1. Determination of the Trusted Certificate Authorities A very basic question for users of theGovernance structures are needed that increase transparency and trust. Web PKIis "Whousers are by definition asked to trust CAs. This includes what CAs are trusted to doyou trust?"properly, and what they are trusted not to do. The system for determining which CAs are added to or removed from the trust anchor store in browsershas been perceived by some asis opaque andconfusing. As mentioned earlier, theconfusing to most Web PKI users. The CA/Browser Forum has developed baseline requirements for the management and issuance of certificates [CAB2014] for individual CAs. However, the process by which an individual CA gets added to the trust anchor storeforby each of themajorbrowsers vendors is not straightforward. The individual browser vendors determine what should and should not be trusted by includingthose trusted CAsthe CA certificate in their trust anchor store. They do this by leveraging the AICPA/CICA WebTrust Program for Certification Authorities [WEBTRUST]. This program provides auditing requirements and a trust mark forCAs.CAs that meet them. Failure to pass an audit can result in the CA being removed from the trust store. Once the browser has shipped, how does a user know which CAs are trusted or what has changed recently? For an informed user, information about which CAs have been added to or deleted from the browser trust anchor store can be found in the browser release notes. Users can also examine the policies of the various CAswhich wouldthat have been developed and posted for the WebTrust Program. However, this is a very high barrier for the average user. There are options to make local modifications by educated users, but there is little understanding about the implications of these choices. How does an individual, organization, or enterprise really determine if a particular CA is trustworthy? Do the default choices inherited from the browser vendors truly represent the organization's trust model? What constitutes sufficiently bad behavior by a CA to cause removal from the trust anchor store? In addition, it can be hazardous for users to remove CAs from the browser trust anchor store. If a user removes a CA from the browser trust anchor store, some web sites may become completely inaccessible or require the user to take explicit action to accept warnings or bypass browser protections related to untrusted certificates.One form of bad behavior by CAs is the mis-issuance of certificates. This mis-issuance can be either an honest mistake by the CA, malicious behavior by the CA, or a case where an external party has duped the CA into the mis-issuance. When a CA has delegated authority to a sub-CA, and then the sub-CA issued bad certificates either unintentionally or maliciously, the CA is able to deny responsibility for the actions of the sub-CA. However, the CA may be the only party that can revoke the sub-CA certificate to protect the overall Web PKI. Another complication with CAs and the trust store maintained by the browser vendor is an enterprise managed PKI. For example, the US Department of Defense operates its own PKI. In this case, the enterprise maintains its own PKI for the exclusive use of the enterprise itself. A bridge CA may be used to connect related enterprises. The complication in this approach is that the revocation mechanisms don't work with any additions that have been made by the enterprise. See Section 3.2.3 on proprietary revocation checks.The guidelines provided by the WebTrust program [WEBTRUST] provide a framework for removing a CA from the trust anchor store.However, the implications of removing a CA can be significant.There may be a few very large CAs that are critical to significant portions ofInternetWorld Wide Web infrastructure. Removing one of thesetrustedCAs can have a significant impact on alarge cross sectionhuge number ofInternet users resultingwebsites. As discussed inpotentially large numbers of websites no longer being trusted. UsersSection 3.4, users are already struggling to understand the implications of untrustedwebsites andcertificates, so they often ignorethe currentwarningsas discussed below. 4.2. Price for Certificates Many CAs charge for each of the certificates that they issue. This business model creates a hurdle for proper deployment. In some cases, the cost causes people to deploy self-signed certificates that cannot be validated against the browser trust store. In other cases, the cost is an incentive to use the same certificate and the associate private key on many different servers within a domain. This leads to greater exposure of the private key, and coordination is needed among the server administrators when it is time to renew the certificate. At least one CA is moving away from the charging-per-certificate business model. The Let's Encrypt CA [LE] is offering free web server certificates. This zero-cost business model will significantly change the Web PKI, removing the cost concerns that leaded to insecure deployment. 4.3. Governance Structures forpresented by theWeb PKIbrowser. There are a number of organizations that play significant roles in the operation of the Web PKI, including theCABCA/Browser Forum, the WebTrust Program, and the browser vendors. These organizations act on behalf of the entire Internetcommunity. Transparencycommunity; therefore, transparency in these operations isvitalfundamental tobasicconfidence and trust in the Web PKI.As one example, in the pastRecently theCABCA/Browser Forumwas perceived as being a closed forum; however,made some changeswere madetothetheir operational procedures toallow moremake it easier for people to participate and to improve visibilityif not actual participation in theinto their process [CAB1.2].How do we ensure thatThis is a significant improvement, but these processes need to continue to evolve in an open, inclusive, and transparentmanner?manner. Currently, as the name implies, theCABCA/Browser Forum members primarily represent CAs and browser vendors.How do we ensure thatIt would be better if relying parties also have a voice in thisforum?forum. Since the Web PKI is widespread, applications beyond the World Wide Web are making use of the Web PKI. For example, the Web PKI is used to securetheconnections between SMTP servers. In these environments, the browser-centric capabilities are unavailable.For example, see Section 3.2.3 on proprietary revocation checks.The current governance structure does not provide a way for the relying parties in theseotherapplications to participate.How do we ensure that these other applications get a voice in this forum? 5. Additional Technical Considerations Beyond the technical mechanisms that constitute theThe Web PKIitself, there are additional technical considerations that impact the success of the Web PKI. 5.1. Browser Error Messages Many people find browser error messages related to certificates confusing. Good man-machine interfaces are always difficult, but in this situation users are unable to understand the risks that they being asked to accept. Even experts do not have the time or inclination to make an assessment of the situation that caused the error message. As a result, browser users have learned to largely ignore the warning messages. Many different situationsgovernance structures cancause an error message, where blocking the communication would not be in the interest of the browser user. There are many examples, including web sites that use self-signed certificates, captive portals that redirect intercepted HTTPS connections, and certificates that appear expired because the local computer clock is wrong. Too often the warnings are due to web server misconfiguration. Further, solving the error message situation in isolation is probably not possible; instead, it needs to be considered along side the other issues raised in this document. If the risk to the user is high, then the session shouldbeclosed with a clear description of the problem that was encountered. Doing so will lead to improved management of the overall infrastructure over time, especially as the tools that are being developed for web server administrators are rolled out. In some enterprises, avoiding these errors requires the addition of enterprise-specific trust anchors to the browser. Additional tools are needed to allow administrations to easily add appropriate trust anchors, especially browsers on consumer-grade devices as more andmade moreenterprises are embracing bring-your-own-device policies. 5.2. Time Synchronization Time synchronization is another factor that impacts the securityopen andreliability of the Web PKI. Reasonably accurate time is needed to check certificate expirationtransparent by: 1. Browser vendors providing additional visibility and tools todetermine whether cached revocation status information is fresh. There is ongoing work to improvesupport thesecuritymanagement of thetime synchronization infrastructure, and it will use certificates to authenticate time servers. Since the certificate infrastructure relies on quality time synchronization, this dependency creates a boot strapping issue. 6. Recommendations for Improving the Web PKI To make the Web PKI more secure and more robust, the following priorities have been identified and are recommended for further development and deployment: Improve certificate status checking. Develop and deploy a standard solution for all relying parties is needed. OCSP stapling seems to betrust anchor store. 2. Governance organizations providing asignificant part of this solution. Automation for certificate enrollment and renewal. Develop and deploy standard protocols that provide system administrators with an automatedwayto enroll and renew their certificates. This work is currently underway in the IETF. In addition, solutions to these procedural and policy challenges are needed: Smooth transition between cryptographic algorithms. Develop best practicesforsmooth and timely transition between cryptographic algorithms. Eliminate surprising certificates. Develop best practices that use one or more of the several mechanisms that have been defined throughout the Web PKI to eliminate surprising certificates. Confidence in CA actions. Develop best practices for identifying and dealing with bad behavior by a CA that can be followed byallbrowser vendors. Open and transparent Web PKI governance. Develop a governance structure that allowsrelyingpartiesparties, including ones associated with non-browser applications, tohave a voice resulting in open and transparent governance. 7.participate. 4. Security ConsiderationsNot just the Web depends on the Web PKI. For example, mail servers often use certificates that are validated using the trust store from a browser. In addition, applications written in scripting languages that run in the browser environment do not have access to any alternative infrastructures. The Web PKI is being leveraged to avoid the time and expense to establish an independent PKI. More and more Internet applications depend on the Web PKI. For the most part, leveraging the Web PKI is improving the security of the Internet. However, the Web PKI is being used in ways that were not envisaged in its design. Care is needed to ensure that applications are not expecting security properties that cannot be delivered by the Web PKI.This document considers the weaknesses of the current Web PKI system and provides recommendations for improvements. Some of the risks associated with doing nothing or continuing down the current path are articulated. The Web PKI is a vital component of a trustedInternetInternet, and as such needs to be improved to sustain continued growth of the Internet.8.5. IANA Considerations None. {{{ RFC Editor: Please remove this section prior to publication. }}}9.6. References9.1.6.1. Normative References [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, <http://www.rfc-editor.org/info/rfc5280>. [RFC6960] Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., and C. Adams, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", RFC 6960, DOI 10.17487/RFC6960, June 2013, <http://www.rfc-editor.org/info/rfc6960>.9.2.6.2. Informative References[ABLOG] Nygren, E., "Three years since World IPv6 Launch: strong IPv6 growth continues", June 2015, <https://blogs.akamai.com/2015/06/three-years-since-world- ipv6-launch-strong-ipv6-growth-continues.html>.[ACMEWG] IETF, "Charter for Automated Certificate Management Environment (acme) Working Group", June 2015, <https://datatracker.ietf.org/doc/charter-ietf-acme/>. [AV] Arnbak, A. and N. van Eijk, "Certificate Authority Collapse: Regulating Systemic Vulnerabilities in the HTTPS Value Chain", 2012 TRPC , August 2012, <http://dx.doi.org/10.2139/ssrn.2031409>. [AVAV] Asghari, H., van Eeten, M., Arnbak, A., and N. van Eijk, "Security Economics in the HTTPS Value Chain", Workshop on Economics of Information Security (WEIS) 2013 , 2013, <http://www.econinfosec.org/archive/weis2013/papers/ AsghariWEIS2013.pdf>. [CAB1.2] CA/Browser Forum, "Bylaws of the CA/Browser Forum", October 2014, <https://cabforum.org/wp-content/uploads/CA- Browser-Forum-Bylaws-v.1.2.pdf>. [CAB2014] CA/Browser Forum, "CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.2.2", October 2014, <https://cabforum.org/wp-content/uploads/BRv1.2.2.pdf>.[DCEI] DigiCert Inc, "Express Install(TM): Automate SSL Certificate Installation and HTTPS Configuration", August 2015, <https://www.digicert.com/express-install/>. [FOXIT] Prins, J., "DigiNotar Certificate Authority breach: "Operation Black Tulip"", September 2011, <http://www.rijksoverheid.nl/bestanden/documenten-en- publicaties/rapporten/2011/09/05/ diginotar-public-report-version-1/ rapport-fox-it-operation-black-tulip-v1-0.pdf>. [HEARTBLEED] Wikipedia, "Heartbleed", 2016, <https://en.wikipedia.org/wiki/Heartbleed>.[IMC2015] Liu, Y., Tome, W., Zhang, L., Choffnes, D., Levin, D., Maggs, B., Mislove, A., Schulman, A., and C. Wilson, "An End-to-End Measurement of Certificate Revocation in the Web's PKI", October 2015, <http://conferences2.sigcomm.org/imc/2015/papers/ p183.pdf>.[LC2012] Constantin, L., "Trustwave admits issuing man-in-the- middle digital certificate; Mozilla debates punishment", February 2012, <http://www.computerworld.com/article/2501291/internet/ trustwave-admits-issuing-man-in-the-middle-digital- certificate--mozilla-debates-punishment.html>. [LE] Internet Security Research Group, "Let's Encrypt", July 2015, <https://letsencrypt.org/>.[MB2015] Wilson, K., "Phase 2: Phasing out Certificates with 1024-bit RSA Keys", January 2015, <https://blog.mozilla.org/security/2015/01/28/phase-2- phasing-out-certificates-with-1024-bit-rsa-keys/>. [MB2016] Barnes, R., "Payment Processors Still Using Weak Crypto", February 2016, <https://blog.mozilla.org/security/2016/02/24/payment- processors-still-using-weak-crypto/>.[PHBOB] Hallam-Baker, P., "OmniBroker Publication Protocol", draft-hallambaker-omnipublish-00 (work in progress), May 2014. [RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Resource Records for the DNS Security Extensions", RFC 4034, DOI 10.17487/RFC4034, March 2005, <http://www.rfc-editor.org/info/rfc4034>. [RFC4035] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Protocol Modifications for the DNS Security Extensions", RFC 4035, DOI 10.17487/RFC4035, March 2005, <http://www.rfc-editor.org/info/rfc4035>. [RFC4210] Adams, C., Farrell, S., Kause, T., and T. Mononen, "Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)", RFC 4210, DOI 10.17487/RFC4210, September 2005, <http://www.rfc-editor.org/info/rfc4210>.[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, DOI 10.17487/RFC5246, August 2008, <http://www.rfc-editor.org/info/rfc5246>.[RFC5272] Schaad, J. and M. Myers, "Certificate Management over CMS (CMC)", RFC 5272, DOI 10.17487/RFC5272, June 2008, <http://www.rfc-editor.org/info/rfc5272>. [RFC6066] Eastlake 3rd, D., "Transport Layer Security (TLS) Extensions: Extension Definitions", RFC 6066, DOI 10.17487/RFC6066, January 2011, <http://www.rfc-editor.org/info/rfc6066>. [RFC6698] Hoffman, P. and J. Schlyter, "The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA", RFC 6698, DOI 10.17487/RFC6698, August 2012, <http://www.rfc-editor.org/info/rfc6698>. [RFC6797] Hodges, J., Jackson, C., and A. Barth, "HTTP Strict Transport Security (HSTS)", RFC 6797, DOI 10.17487/RFC6797, November 2012, <http://www.rfc-editor.org/info/rfc6797>. [RFC6844] Hallam-Baker, P. and R. Stradling, "DNS Certification Authority Authorization (CAA) Resource Record", RFC 6844, DOI 10.17487/RFC6844, January 2013, <http://www.rfc-editor.org/info/rfc6844>.[RFC6961] Pettersen, Y., "The Transport Layer Security (TLS) Multiple Certificate Status Request Extension", RFC 6961, DOI 10.17487/RFC6961, June 2013, <http://www.rfc-editor.org/info/rfc6961>.[RFC6962] Laurie, B., Langley, A., and E. Kasper, "Certificate Transparency", RFC 6962, DOI 10.17487/RFC6962, June 2013, <http://www.rfc-editor.org/info/rfc6962>. [RFC7030] Pritikin, M., Ed., Yee, P.,[RFC7292] Moriarty, K., Ed., Nystrom, M., Parkinson, S., Rusch, A., andD. Harkins, Ed., "Enrollment over Secure Transport", RFC 7030, DOI 10.17487/RFC7030, October 2013, <http://www.rfc-editor.org/info/rfc7030>. [RFC7469] Evans, C., Palmer, C., and R. Sleevi, "Public Key Pinning Extension for HTTP",M. Scott, "PKCS #12: Personal Information Exchange Syntax v1.1", RFC7469,7292, DOI10.17487/RFC7469, April 2015, <http://www.rfc-editor.org/info/rfc7469>.10.17487/RFC7292, July 2014, <http://www.rfc-editor.org/info/rfc7292>. [RFC7696] Housley, R., "Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms", BCP 201, RFC 7696, DOI 10.17487/RFC7696, November 2015, <http://www.rfc-editor.org/info/rfc7696>.[SSLM] Opsmate, Inc., "SSLMate: Secure your website the easy way", August 2015, <https://sslmate.com/>. [TLSCHAIN] Shore, M., Barnes, R., Huque, S., and W. Toorop, "X.509v3 TLS Feature Extension", draft-shore-tls-dnssec-chain- extension-01 (work in progress), July 2015.[TLSFEATURE] Hallam-Baker, P., "X.509v3 TLS Feature Extension", draft- hallambaker-tlsfeature-10 (work in progress), July 2015. [VFBH] Vratonjic, N., Freudiger, J., Bindschaedler, V., and J. Hubaux, "The Inconvenient Truth About Web Certificates", Workshop on Economics of Information Security (WEIS) 2011 , 2011, <http://www.econinfosec.org/archive/weis2011/papers/The%20 Inconvenient%20Truth%20about%20Web%20Certificates.pdf>. [WEBTRUST] CPA Canada, "WebTrust Program for Certification Authorities", August 2015, <http://www.webtrust.org/ homepage-documents/item27839.aspx>. Appendix A. Acknowledgements This document has been developed within the IAB Privacy and Security Program. The authors greatly appreciate the review and suggestions provided by Rick Andrews, Mary Barnes, Richard Barnes, Marc Blanchet, Alissa Cooper, Nick Doty, Stephen Farrell, Joe Hall, Ted Hardie, Ralph Holz, Lee Howard, Christian Huitema, Eliot Lear, Xing Li, Lucy Lynch, Gervase Markham, Andrei Robachevsky, Thomas Roessler, Jeremy Rowley, Christine Runnegar, Jakob Schlyter, Wendy Seltzer,Martin Thomson,Brian Trammell, and Juan Carlos Zuniga. Appendix B. IAB Members at the Time of Approval {{{ RFC Editor: Please add the names to the IAB members at the time that this document is put into the RFC Editor queue. }}} Authors' Addresses Russ Housley Vigil Security 918 Spring Knoll Drive Herndon, VA 20170 USA Email: housley@vigilsec.com Karen O'Donoghue Internet Society 1775 Wiehle Ave #201 Reston, VA 20190 USA Email: odonoghue@isoc.org