<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yusef-lamps-rfc7030-renewal-recommendation-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="est-renew">Certificate Renewal Recommendations for Enrollment over Secure Transport</title>
    <seriesInfo name="Internet-Draft" value="draft-yusef-lamps-rfc7030-renewal-recommendation-00"/>
    <author initials="R." surname="Shekh-Yusef" fullname="Rifaat Shekh-Yusef">
      <organization>Ciena</organization>
      <address>
        <email>rifaat.s.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="July" day="05"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 42?>

<t>This document describes an extension to RFC7030, Enrollment over Secure Transport to
give an indication to a end-entity device when it should start attempting to renew its certificates.</t>
      <t>Prior art is that client decides, with a typical recommmendation to start when the remaining lifetime of the certificate is at the 50% point.
As typical certificate lifetimes are reduced from years to fractions of a year, the 50% may be far too early, and this document provides a way to give alternate advice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-yusef-lamps-rfc7030-renewal-recommendation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        lamps Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/rfc7030-renewal-recommendation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="1" sectionFormat="comma" target="RFC9773"/> explains why certificate lifetimes and renewal times need more deterministic control in the ACME <xref target="RFC8555"/> ecosystem.
Similar arguments apply to the <xref target="RFC7030"/> ecosystem.</t>
      <t>(Do the ecosystems differ in significant ways?  Probably. How much to explain)</t>
      <t>Is this as much about client certificates and IoT certificates?</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>A new magic header will be returned during RFC7030 certificate enrollment, whether using simpleenroll, or fullcmc.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A very short certificate lifetime renewal time will cause clients to communicate with the EST Registrar more frequently.</t>
      <t>EST connections make use of mutually authenticated TLS, when the client certificate being an IDevID, or the last issued certificate, often an LDevID, there is potential to disclose identities during this connection.</t>
      <t>When using TLS 1.2, the client certificate details will be revealed.
TLS 1.3 does not suffer from this problem, and it's use is <bcp14>RECOMMENDED</bcp14> as per <xref target="I-D.ietf-uta-require-tls13"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Not sure what yet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Might need a header allocation</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9773" target="https://www.rfc-editor.org/info/rfc9773" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9773.xml">
          <front>
            <title>ACME Renewal Information (ARI) Extension</title>
            <author fullname="A. Gable" initials="A." surname="Gable"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies how an Automated Certificate Management Environment (ACME) server may provide suggestions to ACME clients as to when they should attempt to renew their certificates. This allows servers to mitigate load spikes and ensures that clients do not make false assumptions about appropriate certificate renewal periods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9773"/>
          <seriesInfo name="DOI" value="10.17487/RFC9773"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.ietf-uta-require-tls13" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-require-tls13-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-require-tls13.xml">
          <front>
            <title>New Protocols Using TLS Must Require TLS 1.3</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram"/>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>TLS 1.3 use is widespread, it has had comprehensive security proofs, and it improves both security and privacy over TLS 1.2. Therefore, new protocols that use TLS must require TLS 1.3. As DTLS 1.3 is not widely available or deployed, this prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only. This document updates RFC9325 and discusses post-quantum cryptography and the security and privacy improvements over TLS 1.2 as a rationale for that update.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-12"/>
        </reference>
      </references>
    </references>
    <?line 111?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA4VW7W7bNhT9z6fgUgxrN8uzkwZpjaKpZ2eLgTjJ4hRFMQwD
LVEWEUrUSMqeEORd9ix7sp1L2o6dtJv/WCLv57nn3qskSZhXXssBH0nrVa5S
4SW/kZVcCY3/1JSlrDLhlakcz43lZ5U1WuPQc7OUls9k2ljJb62oXG2sZ2I+
t3I54NL5xJIhlpm0EiV8ZFbkPmkbJ/NEi7J2ic3Tk95RLwoKjf9dj0mvx9gL
7ryosj+ENhVseNtIxlRtw6Pzh73e294hE1aKAZ9UXtpKerZaDPjFcHo945+M
vVPVgv9iTVOzu9WjUDKmcBgyHsBFxlhqMkgOeOPz5A2r1YDj94KnouIImQtr
RctfqpwLrXkr3SsOPArhCl5IKxnn3qQDusCjAxRW5m4QTGQyF432DhKb+7aM
1/TKROMLYwcs4arC2U2Xzwp5VySfCSpIR/huVC6Ef3JlLCIeKVkJvMhSKD3g
Ngh2XVdJn39Y0GEXuLKN/WkXttJC2MyZamt+SkdS718F8zPgL3UJHGYm9ytg
HWB1jx7L1P4QnLmNaDcVjFXGlqjkUg4gevPziGo9QPWq/MnF25OTI1wsZdWE
owVVa8ADSfAanbhauPIDuekiLJJSvmjmwfuP/80kpJ4kXMydtyL1jN0WynHw
sglEzqRLrZpLx5Gi/MvLykGHirWOufO/tIcwWyAfsqCqjPpobUJwBJFAUfkW
npYqlXxVSIh57grT6IwIDgvCe1nWnsgKtZAHZBxPHzvTdRm7tgq0IwWk4AsQ
ItUqZpEqZNLhK8ACt76toaR5RGILBRmPDkMUvpCQAMAVOdYql16Vkps83Oz4
JndwRqfHvW95bVTlu2zotn52ZTd2oGLJftakMuO5NSUIL2xohJxKEeYKnIlw
3tmaL9Fqc8lzYSFqOO502wG4GSR2S1dbs6SsYWAFFZiNVdDU4xSJyAjxbiRA
qbJMS5opGALWIKpIjvv7NQc7VNiAUv/hAVSoNYBxQKr9WnqIaE05Hk8qiUxL
g7QziSBKAOu8SnlqyKUGO0KSw9H0jN/fn8Lxm+PjY/KWGtc6cKDLZqpUWlCV
FyFN+KlrHdIj3RAu8XJfi70cx/vtGYBSeQ66wqlTiyrED9QAlTvl/NqauZjr
tsvPzYqXTVqQh3XWrxibuIi2cPFSzE2zpdsuLQMME3O7d3hKON8GBIw2i5a6
TvI72fKVwXjhB9OPs9uDTvznl1fh+ebs14+Tm7MxPc/OhxcX2we2lpidX328
GD8+PWqOrqbTs8txVMYp3ztiB9Ph54PIoYOr69vJ1eXw4iCWY5dRRFigAPIp
WhS1RRUzQMA2UyIjnZ9G1//83X+NUnyDWhz2+29Ri/jypn/yGi/UXdGbqVC6
+IrqtAy1BJ/JCi2SVNTKC42+BcwYCKsqrBOU8/vfCJnfB/zdPK37r9+vDyjh
vcMNZnuHAbPnJ8+UI4hfOPqCmy2ae+dPkN6Pd/h5732D+87hu1OtKsmT/pvT
94woA1ZikaJTxtJj7mM9DjnNwlIs0EaFFBkIvVKAbk6jxTdY5hnPGksDbN0Y
e90qt7O7Q2VADSwWOkk7VdZaxvsObfO80Tot026MQy1F2vIRRhRGjI0fQRQN
FkBLpbL+i1NhbyDESFNBXxCxc8Lwo5HcVFEvzGvq2zMU90YuFG0pG2dIbuWf
DZTQpIzRPcZIJddzsxR3MnyaYICWjW9Ap5bTtwRtGzKd8duLWedx0D9vXWBI
QGBrTcZyORkHFEhUC0cbxjUwsiOP+xz7kRQu1gqEZ9gOtfHkmBI3GDwu1Qax
ATrafQpTYl2j0G+PeSCxTxRgLAkC5v3uYedr8WaRFDsEWEqhZdZlUfMInUxT
2GC7NmH2ha0TfGJZzLUsY1cq/50L4OFih77UhTW0MJonyTh8QSWNFwnVQVmZ
eO36Rw8PRJDwDUBb/SlDLoNzS3seG7OVPvBpMrwcPhOdqkXh484QG26jjCZd
f7a84MP0rjIrZLiQYRUwdi4hEEyOClEtJIYri/ttLtI7xv4FCLOqXtYLAAA=

-->

</rfc>
