Delay Tolerant Networking                                       B. Sipos
Internet-Draft                                           RKF Engineering
Intended status: Standards Track                            June 4, 2020
Expires: December 6, 2020


   Automated Certificate Management Environment (ACME) Delay-Tolerant
             Networking (DTN) Node ID Validation Extension
                     draft-sipos-acme-dtnnodeid-00

Abstract

   This document specifies an extension to the Automated Certificate
   Management Environment (ACME) protocol which allows validating the
   Delay-Tolerant Networking (DTN) Node ID for an ACME client.  The use
   of a Uniform Resource Identifier (URI) as ACME identifier is also
   specified.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on December 6, 2020.

Copyright Notice

   Copyright (c) 2020 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of




Sipos                   Expires December 6, 2020                [Page 1]


Internet-Draft              ACME DTN Node ID                   June 2020


   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  URI Identifier  . . . . . . . . . . . . . . . . . . . . . . .   4
   4.  DTN Node ID Validation  . . . . . . . . . . . . . . . . . . .   4
     4.1.  DTN Node ID Challenge Request Object  . . . . . . . . . .   6
     4.2.  DTN Node ID Challenge Response Object . . . . . . . . . .   7
     4.3.  ACME Node ID Validation Challenge Bundles . . . . . . . .   7
     4.4.  ACME Node ID Validation Response Bundles  . . . . . . . .   8
     4.5.  Response Bundle Checks  . . . . . . . . . . . . . . . . .   9
   5.  Implementation Status . . . . . . . . . . . . . . . . . . . .   9
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
     6.1.  Threat: Passive Leak of Bundle Data . . . . . . . . . . .  10
     6.2.  Threat: BP Node Impersonation . . . . . . . . . . . . . .  10
     6.3.  Threat: Denial of Service . . . . . . . . . . . . . . . .  10
     6.4.  Multiple Certificate Claims . . . . . . . . . . . . . . .  11
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
     7.1.  ACME Identifier Type  . . . . . . . . . . . . . . . . . .  11
     7.2.  ACME Validation Method  . . . . . . . . . . . . . . . . .  11
     7.3.  BP Bundle Administrative Record Types . . . . . . . . . .  12
   8.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  12
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  12
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  12
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  14
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Introduction

   Although the original purpose of the Automatic Certificate Management
   Environment (ACME) [RFC8555] was to allow PKI certificate authorities
   to validate network domain names of clients, the same mechanism can
   be used to validate any of the subject claims supported by the PKIX
   profile [RFC5280].  In the case of this specification, the claim
   being validated is a Subject Alternative Name (SAN) of type Uniform
   Resource Identifier (URI) used to represent the Node ID of a Delay-
   Tolerant Networking (DTN) Node.

   The basic unit of data exchange in a DTN is a Bundle
   [I-D.ietf-dtn-bpbis], which consists of a data payload with
   accompanying metadata.  A DTN Node ID is a URI with a specific set of
   allowed schemes [I-D.ietf-dtn-bpbis] which determines how bundles are
   routed within a DTN.  A Node ID is used to identify the source and
   destination of a Bundle and is used for routing through intermediate
   nodes.  More detailed descriptions of the rationale and capabilities



Sipos                   Expires December 6, 2020                [Page 2]


Internet-Draft              ACME DTN Node ID                   June 2020


   of these networks can be found in "Delay-Tolerant Network
   Architecture" [RFC4838].

   When a certificate request contains a SAN URI which could be used as
   a DTN Node ID, the ACME server offers a challenge type to validate
   that Node ID.  In order to validate a Node ID, the ACME server sends
   an ACME Node ID Validation Challenge Bundle with a destination of the
   Node ID being validated.  The BP agent on that node receives the
   Challenge Bundle, generates an ACME signature, and sends an ACME Node
   ID Validation Response Bundle with the signature.  Finally, the ACME
   server receives the Response Bundle and checks that the signature
   came from the client account key associated with the original
   request.

   Because the DTN Node ID is used both for routing bundles between BP
   agents and for multiplexing services within a BP agent, there is no
   possibility to separate the ACME validation of a Node ID from normal
   bundle handling on that same Node ID.  This leaves Bundle
   administrative records as a way to leave the Node ID unchanged while
   disambiguating from normal service data bundles.

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   In this document, several terms are shortened for the sake of
   terseness.  These terms are:

   Challenge Request:  This is a shortened form of the full "DTN Node ID
      Challenge Request Object".  It is a JSON object created by the
      ACME server for challenge type "dtn-nodeid-01".

   Challenge Response:  This is a shortened form of the full "DTN Node
      ID Challenge Response Object".  It is a JSON object created by the
      ACME client to authorize a challenge type "dtn-nodeid-01".

   Challenge Bundle:  This is a shortened form of the full "ACME Node ID
      Validation Challenge Bundle".  It is a Bundle created by the ACME
      server to challenge a Node ID claim.

   Response Bundle:  This is a shortened form of the full "ACME Node ID
      Validation Response Bundle".  It is a Bundle created by the BP
      agent managed by the ACME client to validate a Node ID claim.




Sipos                   Expires December 6, 2020                [Page 3]


Internet-Draft              ACME DTN Node ID                   June 2020


3.  URI Identifier

   This specification is the first to make use of a URI to identify a
   service for a certificate request in ACME.  The URI-type identifier
   is general purpose, and validating ownership of a URI requires a
   specific purpose related to its "scheme" component.  In this
   document, the only purpose for which a URI identifier is validated is
   as a DTN Node ID (see Section 4), but other specifications can define
   challenge types for other URI uses.

   Identifiers of type "uri" MUST appear in an extensionRequest
   attribute [RFC2985] requesting a subjectAltName extension of type
   uniformResourceIdentifier having a value consistent with the
   requirements of [RFC3986].

   If an ACME server wishes to request proof that a user controls a URI,
   it SHALL create an authorization with the identifier type "uri".  The
   value field of the identifier SHALL contain the textual form of the
   URI as defined in Section 3 of [RFC3986].  The ACME server SHALL NOT
   decode or attempt to dereference the URI value on its own.  It is the
   responsibility of a validation method to ensure the URI ownership via
   scheme-specific means authorized by the ACME client.

   An identifier for the URL "dtn://example/service" would be formatted
   as:

   {"type": "uri", "value": "dtn://example/service"}

4.  DTN Node ID Validation

   The DTN Node ID validation method proves control over a Node ID by
   requiring the ACME client to configure a BP agent to respond to
   specific Challenge Bundles sent from the ACME server.  The ACME
   server validates control of the Node ID URI by verifying that
   received Response Bundles correspond with the BP Node and client
   account key being validated.

   The DTN Node ID Challenge SHALL only be allowed for URIs usable as a
   DTN Node ID, which are currently the schemes "dtn" and "ipn" as
   defined in [I-D.ietf-dtn-bpbis].  When an ACME server supports Node
   ID validation, the ACME server SHALL define a challenge object in
   accordance with Section 4.1.

   To authorize a Node ID validation, the ACME client performs the
   following steps:






Sipos                   Expires December 6, 2020                [Page 4]


Internet-Draft              ACME DTN Node ID                   June 2020


   1.  The ACME client computes the Key Authorization in accordance with
       Section 8.1 of [RFC8555] using the challenge token and client
       account key.

   2.  The ACME client indicates to the BP agent the validation token
       and the key authorization used for the validation.

   3.  The ACME client POSTs a challenge response to the challenge URL
       on the ACME server accordance with Section 7.5.1 of [RFC8555].
       The payload object is constructed in accordance with Section 4.2.

   4.  The ACME client waits for the authorization to be finalized on
       the ACME server in accordance with Section 7.5.1 of [RFC8555].

   5.  Once the challenge is completed (successfully or not), the ACME
       client indicates to the BP agent that the validation token is no
       longer usable.

   Upon receiving a challenge response from an ACME client, the ACME
   server verifies the client's control over the Node ID by performing
   the following steps:

   1.  The ACME server computes the expected Key Authorization in
       accordance with Section 8.1 of [RFC8555] using the challenge
       token and client account key.

   2.  The ACME server sends one or more Challenge Bundles in accordance
       with Section 4.3.

   3.  The ACME server waits for Response Bundle(s) for a limited
       interval of time.  A default response interval, used when the
       challenge does not contain an RTT, SHOULD be a configurable
       parameter of the ACME server.  If the ACME client indicated an
       RTT value in the challenge object, the response interval SHOULD
       be twice the RTT (with limiting logic applied as described
       below).  The lower limit on response waiting time is network-
       specific, but SHOULD be no shorter than one second.  The upper
       limit on response waiting time is network-specific, but SHOULD be
       no longer than one minute (60 seconds) for a terrestrial-only
       DTN.  Responses are encoded in accordance with Section 4.4.

   4.  Once received and decoded, the ACME server checks the contents of
       each Response Bundle in accordance with Section 4.5.  After all
       Challenge Bundles have either been responded to or timed-out, the
       validation procedure is successful only if all responses are
       successful.





Sipos                   Expires December 6, 2020                [Page 5]


Internet-Draft              ACME DTN Node ID                   June 2020


   An ACME server MAY send multiple challenges from different origins in
   the DTN network to avoid possible man-in-the-middle (MitM) attacks,
   as recommended in Section 10.2 of [RFC8555].  If responses are
   received from multiple challenges, any response failure SHALL cause a
   failure of the overall validation.  Each response failure MAY be
   indicated to the ACME client as a validation subproblem.

   When responding to a Challenge Bundle, a BP agent SHALL send a single
   Response Bundle in accordance with Section 4.4.  A BP agent SHALL
   respond to ACME challenges only within the interval of time, only for
   the Node ID, and only for the validation token indicated by the ACME
   client.  A BP agent SHALL respond to multiple challenges with the
   same parameters.  These correspond with the ACME server validating
   via multiple routing paths.

4.1.  DTN Node ID Challenge Request Object

   The DTN Node ID Challenge request object is defined by the ACME
   server when it supports validating Node IDs.

   The DTN Node ID Challenge request object has the following content:

   type (required, string):  The string "dtn-nodeid-01".

   token (required, string):  A random value that uniquely identifies
      the challenge.  This value MUST have at least 128 bits of entropy.
      It MUST NOT contain any characters outside the base64url alphabet
      as described in Section 5 of [RFC4648].  Trailing '=' padding
      characters MUST be stripped.  See [RFC4086] for additional
      information on randomness requirements.

   {
     "type": "dtn-nodeid-01",
     "url": "https://example.com/acme/chall/prV_B7yEyA4",
     "status": "pending",
     "token": "LoqXcYV8q5ONbJQxbmR7SCTNo3tiAXDfowyjxAjEuX0"
   }

   The only over-the-wire data required by ACME for a Challenge Bundle
   is a nonce token, but the response data needs a client account key to
   generate the Key Authorization.  The client account key is kept
   within the ACME client, the BP agent needs only the derived Key
   Authorization for its Response Bundle.








Sipos                   Expires December 6, 2020                [Page 6]


Internet-Draft              ACME DTN Node ID                   June 2020


4.2.  DTN Node ID Challenge Response Object

   The DTN Node ID Challenge response object is defined by the ACME
   client when it authorizes validation of a Node ID.  Because a DTN has
   the potential for significantly longer delays than a non-DTN network,
   the ACME client is able to inform the ACME server if a particular
   validation round-trip is expected to take longer than normal network
   delays (on the order of seconds).

   The DTN Node ID Challenge response object has the following content:

   rtt (optional, number):  An expected round-trip time (RTT), in
      seconds, between sending a Challenge Bundle and receiving a
      Response Bundle.  This value is a hint to the ACME server for how
      long to wait for responses but is not authoritative.  The minimum
      RTT value SHALL be zero.  There is no special significance to
      zero-value RTT, it simply indicates the response is expected in
      less than the least significant unit used by the ACME client.

   {
     "rtt": 300.0
   }

   A challenge response is not sent until the BP agent has been
   configured to properly respond to the challenge, so the RTT value is
   meant to indicate any node-specific path delays expected to
   encountered from the ACME server.  Because there is no requirement on
   the path (or paths) which bundles may traverse between the ACME
   server and the BP agent, and the ACME server is likely to attempt
   some path diversity, the RTT value SHOULD be pessimistic.

4.3.  ACME Node ID Validation Challenge Bundles

   Each ACME Node ID Validation Challenge Bundle has parameters as
   listed here:

   Bundle Processing Control Flags:  The payload SHALL be indicated as
      an administrative record.

   Destination EID:  The Destination EID SHALL be identical to the Node
      ID being validated.  The ACME server SHOULD NOT perform URI
      normalization on the Node ID given by the ACME client.

   Source Node EID:  The Source Node EID SHALL indicate the Endpoint ID
      of the ACME server performing the challenge.

   Creation Timestamp and Lifetime:  The Creation Timestamp SHALL be set
      to the time at which the challenge was generated.  The Lifetime



Sipos                   Expires December 6, 2020                [Page 7]


Internet-Draft              ACME DTN Node ID                   June 2020


      SHALL indicate the response interval for which ACME server will
      accept responses to this challenge.

   Administrative Record Type Code:  Set to the ACME Node ID Validation
      type code defined by this specification.

   Administrative Record Content:  The ACME challenge administrative
      record content SHALL consist of a CBOR array with two elements.
      The first element SHALL be a challenge indicator value 1,
      represented as a CBOR unsigned integer.  The second element SHALL
      be the ACME challenge token as specified in the challenge object,
      represented as a CBOR text string.

   Challenge Bundles SHOULD be BIB-signed in accordance with
   [I-D.ietf-dtn-bpsec] if the ACME server is capable of signing
   bundles.  BP agents MAY refuse to respond to a Challenge Bundle which
   is signed by a known ACME server but has an invalid signature.
   Challenge Bundles SHOULD NOT be BCB-encrypted in accordance with
   [I-D.ietf-dtn-bpsec].

4.4.  ACME Node ID Validation Response Bundles

   Each ACME Node ID Validation Response Bundle has parameters as listed
   here:

   Bundle Processing Control Flags:  The payload SHALL be indicated as
      an administrative record.

   Destination EID:  The Destination EID SHALL be identical to the
      Source Node EID of the Challenge Bundle to which this response
      corresponds.

   Source Node EID:  The Source Node EID SHALL be identical to the the
      Destination EID of the Challenge Bundle to which this response
      corresponds.

   Creation Timestamp and Lifetime:  The Creation Timestamp SHALL be set
      to the time at which the response was generated.  The response
      Lifetime SHALL indicate the response interval remaining if the
      Challenge Bundle indicated a limited Lifetime.

   Administrative Record Type Code:  Set to the ACME Node ID Validation
      type code defined by this specification.

   Administrative Record Content:  The ACME response administrative
      record content SHALL consist of a CBOR array with two elements.
      The first element SHALL be a response indicator value 2,
      represented as a CBOR unsigned integer.  The second element SHALL



Sipos                   Expires December 6, 2020                [Page 8]


Internet-Draft              ACME DTN Node ID                   June 2020


      be the ACME Key Authorization in accordance with Section 8.1 of
      [RFC8555], represented as a CBOR text string.

   Response Bundles MAY be BIB-signed in accordance with
   [I-D.ietf-dtn-bpsec].  A BIB on the bundle gives no more security
   than the Key Authorization itself.  Response Bundles SHOULD NOT be
   BCB-encrypted in accordance with [I-D.ietf-dtn-bpsec].

4.5.  Response Bundle Checks

   A proper Response Bundle meets all of the following criteria:

      The Response Bundle was received within the time interval allowed
      for the challenge.

      The Response Bundle Source Node ID is identical to the Node ID
      being validated.  The comparison of Node IDs SHALL use the
      comparison logic of [RFC3986] and scheme-based normalization of
      those schemes specified in [I-D.ietf-dtn-bpbis].

      The response payload contains the expected Key Authorization
      computed by the ACME server.

   Any of the failures above SHALL cause the validation to fail.  Any of
   the failures above SHOULD be indicated as subproblems to the ACME
   client.

5.  Implementation Status

   [NOTE to the RFC Editor: please remove this section before
   publication, as well as the reference to [RFC7942] and
   [github-acme-dtnnodeid].]

   This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft, and is based on a proposal described in [RFC7942].
   The description of implementations in this section is intended to
   assist the IETF in its decision processes in progressing drafts to
   RFCs.  Please note that the listing of any individual implementation
   here does not imply endorsement by the IETF.  Furthermore, no effort
   has been spent to verify the information presented here that was
   supplied by IETF contributors.  This is not intended as, and must not
   be construed to be, a catalog of available implementations or their
   features.  Readers are advised to note that other implementations can
   exist.

   An example implementation of the this draft of ACME has been created
   as a GitHub project [github-acme-dtnnodeid] and is intended to use as



Sipos                   Expires December 6, 2020                [Page 9]


Internet-Draft              ACME DTN Node ID                   June 2020


   a proof-of-concept and as a possible source of interoperability
   testing.  This example implementation only constructs encoded bundles
   and does not attempt to provide a full BP Agent interface.

6.  Security Considerations

   This section separates security considerations into threat categories
   based on guidance of BCP 72 [RFC3552].

6.1.  Threat: Passive Leak of Bundle Data

   Because this challenge mechanism is used to bootstrap security
   between DTN Nodes, the challenge and its response are likely to be
   transferred in plaintext.  The ACME data itself is a random token
   (nonce) and a cryptographic signature, so there is no sensitive data
   to be leaked within the Node ID Validation bundle exchange.

   Under certain circumstances, when BPSEC key material is available to
   the BP agent managed by the ACME client, the use of a BCB for the
   Request Bundle and/or Response Bundle can give additional
   confidentiality to the bundle metadata.  This is not expected to be a
   general use case, as the whole point of ACME is to validate
   identifiers of untrusted client services.

6.2.  Threat: BP Node Impersonation

   As described in Section 8.1 of [RFC8555], it is possible for an
   active attacker to alter data on both ACME client channel and the DTN
   validation channel.

   One way to mitigate single-path MitM attacks is to attempt validation
   of the same Node ID via multiple bundle routing paths, as recommended
   in Section 4.  It is not a trivial task to guarantee bundle routing
   though, so more advanced techniques such as onion routing (using
   bundle-in-bundle encapsulation [I-D.ietf-dtn-bibect]) could be
   employed.

   Under certain circumstances, when BPSEC key material is available to
   the BP agent managed by the ACME client, the use of a BIB signature
   on the Response Bundle can give additional assurance that the
   response is coming from a valid BP agent.

6.3.  Threat: Denial of Service

   The behaviors described in this section all amount to a potential
   denial-of-service to a BP agent.





Sipos                   Expires December 6, 2020               [Page 10]


Internet-Draft              ACME DTN Node ID                   June 2020


   A malicious entity can continually send ACME Node ID challenges to a
   BP agent.  The victim BP agent can ignore ACME challenges which do
   not conform to the specific time interval and challenge token for
   which the ACME client has informed the BP agent that challenges are
   expected.  The victim BP agent can require all Challenge Bundles to
   be BIB-signed to ensure authenticity of the challenge.

   Similar to other validation methods, an ACME server validating a DTN
   Node ID could be used as a denial of service amplifier.  For this
   reason any ACME server can rate-limit validation activities for
   individual clients and individual certificate requests.

6.4.  Multiple Certificate Claims

   A single certificate request can contain a mixed set of SAN claims,
   including combinations of "dns" and "uri" claims.  There is no
   restriction on how a certificate combines these claims, but each
   claim needs to be validated to issue such a certificate.  This is no
   different than the existing behavior of [RFC8555] but is mentioned
   here to make sure that CA policy handles such situations.  The
   specific use case of [I-D.ietf-dtn-tcpclv4] allows, and for some
   network policies requires, that a certificate authenticate both the
   DNS name of an entity as well as the Node ID of the entity.

7.  IANA Considerations

   This specification adds to the ACME registry and BP registry for this
   behavior.

7.1.  ACME Identifier Type

   Within the "Automated Certificate Management Environment (ACME)
   Protocol" registry [IANA-ACME], the following entry has been added to
   the "ACME Identifier Types" sub-registry.

                      +-------+--------------------+
                      | Label | Reference          |
                      +-------+--------------------+
                      | uri   | This specification |
                      +-------+--------------------+

7.2.  ACME Validation Method

   Within the "Automated Certificate Management Environment (ACME)
   Protocol" registry [IANA-ACME], the following entry has been added to
   the "ACME Validation Methods" sub-registry.





Sipos                   Expires December 6, 2020               [Page 11]


Internet-Draft              ACME DTN Node ID                   June 2020


      +---------------+-----------------+------+--------------------+
      | Label         | Identifier Type | ACME | Reference          |
      +---------------+-----------------+------+--------------------+
      | dtn-nodeid-01 | uri             | Y    | This specification |
      +---------------+-----------------+------+--------------------+

7.3.  BP Bundle Administrative Record Types

   Within the "Bundle Protocol" registry [IANA-BP], the following entry
   has been added to the "Bundle Administrative Record Types" sub-
   registry.  [NOTE to the RFC Editor: For RFC5050 compatibility this
   value needs to be no larger than 15, but such compatibility is not
   needed.  BPbis has no upper limit on this code point value.]

         +-------+-------------------------+--------------------+
         | Value | Description             | Reference          |
         +-------+-------------------------+--------------------+
         | TBD   | ACME Node ID Validation | This specification |
         +-------+-------------------------+--------------------+

8.  Acknowledgments

   This specification is based on DTN use cases related to PKIX
   certificate generation.

9.  References

9.1.  Normative References

   [I-D.ietf-dtn-bpbis]
              Burleigh, S., Fall, K., and E. Birrane, "Bundle Protocol
              Version 7", draft-ietf-dtn-bpbis-25 (work in progress),
              May 2020.

   [I-D.ietf-dtn-bpsec]
              Birrane, E. and K. McKeever, "Bundle Protocol Security
              Specification", draft-ietf-dtn-bpsec-22 (work in
              progress), March 2020.

   [IANA-ACME]
              IANA, "Automated Certificate Management Environment (ACME)
              Protocol", <https://www.iana.org/assignments/acme/>.

   [IANA-BP]  IANA, "Bundle Protocol",
              <https://www.iana.org/assignments/bundle/>.






Sipos                   Expires December 6, 2020               [Page 12]


Internet-Draft              ACME DTN Node ID                   June 2020


   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC2985]  Nystrom, M. and B. Kaliski, "PKCS #9: Selected Object
              Classes and Attribute Types Version 2.0", RFC 2985,
              DOI 10.17487/RFC2985, November 2000,
              <https://www.rfc-editor.org/info/rfc2985>.

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552,
              DOI 10.17487/RFC3552, July 2003,
              <https://www.rfc-editor.org/info/rfc3552>.

   [RFC3986]  Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
              Resource Identifier (URI): Generic Syntax", STD 66,
              RFC 3986, DOI 10.17487/RFC3986, January 2005,
              <https://www.rfc-editor.org/info/rfc3986>.

   [RFC4086]  Eastlake 3rd, D., Schiller, J., and S. Crocker,
              "Randomness Requirements for Security", BCP 106, RFC 4086,
              DOI 10.17487/RFC4086, June 2005,
              <https://www.rfc-editor.org/info/rfc4086>.

   [RFC4648]  Josefsson, S., "The Base16, Base32, and Base64 Data
              Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006,
              <https://www.rfc-editor.org/info/rfc4648>.

   [RFC4838]  Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst,
              R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant
              Networking Architecture", RFC 4838, DOI 10.17487/RFC4838,
              April 2007, <https://www.rfc-editor.org/info/rfc4838>.

   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
              Housley, R., and W. Polk, "Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
              <https://www.rfc-editor.org/info/rfc5280>.

   [RFC7942]  Sheffer, Y. and A. Farrel, "Improving Awareness of Running
              Code: The Implementation Status Section", BCP 205,
              RFC 7942, DOI 10.17487/RFC7942, July 2016,
              <https://www.rfc-editor.org/info/rfc7942>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.



Sipos                   Expires December 6, 2020               [Page 13]


Internet-Draft              ACME DTN Node ID                   June 2020


   [RFC8555]  Barnes, R., Hoffman-Andrews, J., McCarney, D., and J.
              Kasten, "Automatic Certificate Management Environment
              (ACME)", RFC 8555, DOI 10.17487/RFC8555, March 2019,
              <https://www.rfc-editor.org/info/rfc8555>.

9.2.  Informative References

   [github-acme-dtnnodeid]
              Sipos, B., "ACME Node ID Example Implementation",
              <https://github.com/BSipos-RKF/acme-dtnnodeid/>.

   [I-D.ietf-dtn-bibect]
              Burleigh, S., "Bundle-in-Bundle Encapsulation", draft-
              ietf-dtn-bibect-03 (work in progress), February 2020.

   [I-D.ietf-dtn-tcpclv4]
              Sipos, B., Demmer, M., Ott, J., and S. Perreault, "Delay-
              Tolerant Networking TCP Convergence Layer Protocol Version
              4", draft-ietf-dtn-tcpclv4-20 (work in progress), May
              2020.

Author's Address

   Brian Sipos
   RKF Engineering Solutions, LLC
   7500 Old Georgetown Road
   Suite 1275
   Bethesda, MD  20814-6198
   United States of America

   Email: BSipos@rkf-eng.com




















Sipos                   Expires December 6, 2020               [Page 14]