<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-acme-profiles-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACME Profiles">Automated Certificate Management Environment (ACME) Profiles Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-acme-profiles-01"/>
    <author fullname="Aaron Gable">
      <organization>Internet Security Research Group</organization>
      <address>
        <email>aaron@letsencrypt.org</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <abstract>
      <?line 31?>

<t>This document defines how an ACME Server may offer a selection of different certificate profiles to ACME Clients, and how those clients may indicate which profile they want.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://aarongable.github.io/draft-acme-profiles/draft-ietf-acme-profiles.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-acme-profiles/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Automated Certificate Management Environment Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/acme/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aarongable/draft-acme-profiles"/>.</t>
    </note>
    <note>
      <name>Current Implementations</name>
      <?line 35?>

<t>This note is to be removed before publishing as an RFC.</t>
      <t>This document is implemented by at least two ACME Servers (<eref target="https://github.com/letsencrypt/boulder/issues/7309">Boulder</eref> and <eref target="https://github.com/letsencrypt/pebble/pull/473">Pebble</eref>), and at least seven ACME Clients (<eref target="https://github.com/certbot/certbot/issues/10194">Certbot</eref>, <eref target="https://github.com/go-acme/lego/pull/2415">Lego</eref>, <eref target="https://github.com/eggsampler/acme/pull/25">eggsampler/acme</eref>, <eref target="https://github.com/caddyserver/caddy/commit/2c4295ee48f494bc8dda5fa09b37612d520c8b3b">caddy</eref>, <eref target="https://docs.certifytheweb.com/blog/acme-profiles-draft/">certifytheweb</eref>, <eref target="https://github.com/rmbolger/Posh-ACME/releases/tag/v4.28.0">poshacme</eref>, and <eref target="https://github.com/dehydrated-io/dehydrated/pull/956">dehydrated</eref>). It is deployed by the <eref target="https://letsencrypt.org/docs/profiles/">Let's Encrypt CA</eref>, and is being actively used to manage migrations <eref target="https://letsencrypt.org/2025/05/14/ending-tls-client-authentication">away from the tlsClientAuth EKU</eref> and <eref target="https://letsencrypt.org/2025/12/02/from-90-to-45">towards shorter-lived certificates</eref>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Throughout the history of the WebPKI, Certificate Authorities have used "profiles" to describe the kinds of certificates they issue. For example, an "S/MIME" profile might indicate that the resulting certificate will contain the <tt>id-kp-emailProtection</tt> Extended Key Usage and use a Certificate Policy OID to assert compliance with the CA/Browser Forum S/MIME Baseline Requirements; or a "Constrained Sub-CA" profile might indicate the inclusion of the Basic Constraints extension, the keyCertSign Key Usage, and a Name Constraints extension. Subscribers generally select a profile as part of their certificate ordering process or negotiations with the CA, depending on their needs (and sometimes their budget).</t>
      <t>The ACME protocol only allows clients to customize their certificate in two ways: the newOrder request allows selection of the identifiers (generally Subject Alternative Names) and validity period; and the finalize request contains a CSR in which the client can theoretically include any combination of fields and extensions that they desire. But requesting certificate features via the CSR is onerous, error-prone, and dangerous. Numerous compliance incidents across the WebPKI have been caused by CAs trusting values included in a CSR and copying them directly into the issued certificate. It requires clients to know how to construct a valid CSR, provides no mechanism for servers to advertise what CSR fields they're willing to accept, and means that CAs have to evaluate on a case-by-case basis which combinations of requested features they're willing to issue.</t>
      <t>This document provides a mechanism for ACME Servers to advertise what certificate profiles they offer, and for ACME Clients to select a profile when creating a new Order. This allows site operators to make informed decisions about the kind of certificate they request, without placing an undue burden on ACME Clients or Servers to transmit such information in the form of a CSR. It also encourages the evolution of the WebPKI by allowing CAs to more easily offer new and improved profiles while maintaining backwards compatibility for old subscribers.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="extensions-to-the-directory-resource">
      <name>Extensions to the Directory Resource</name>
      <t>An ACME Server which wishes to allow Clients to select profiles <bcp14>MUST</bcp14> include a new field, <tt>profiles</tt>, in the <tt>meta</tt> field of its Directory object.</t>
      <t><tt>profiles</tt> (optional, object):  A map of profile names to human-readable descriptions of those profiles.</t>
      <t>The contents of these human-readable descriptions are up to the CA; for example, they might be prose descriptions of the properties of the profile, or the might be URLs pointing at a documentation site. ACME Clients <bcp14>SHOULD</bcp14> present these profile names and descriptions to their operator during initial setup and at appropriate times thereafter.</t>
      <sourcecode type="text"><![CDATA[
    HTTP/1.1 200 OK
    Content-Type: application/json

    {
      "newNonce": "https://acme.example.com/new-nonce",
      "newAccount": "https://acme.example.com/new-account",
      "newOrder": "https://acme.example.com/new-order",
      "newAuthz": "https://acme.example.com/new-authz",
      "revokeCert": "https://acme.example.com/revoke-cert",
      "keyChange": "https://acme.example.com/key-change",
      "meta": {
        "termsOfService": "https://example.com/acme/terms",
        "website": "https://example.com/acme/docs",
        "caaIdentities": ["example.com"],
        "externalAccountRequired": false,
        "profiles": {
          "profile1": "https://example.com/acme/docs/profiles#profile1",
          "profile2": "https://example.com/acme/docs/profiles#profile2",
        }
      }
    }
]]></sourcecode>
    </section>
    <section anchor="extensions-to-the-order-resource">
      <name>Extensions to the Order Resource</name>
      <t>In order to convey information about the profile associated with an Order, a new field is added to the Order object:</t>
      <t><tt>profile</tt> (string, optional): A string uniquely identifying the profile which will be used to affect issuance of the certificate requested by this Order.</t>
      <t>To select a profile, the client includes the desired profile name in the <tt>profile</tt> field of the Order object they supply to the newOrder request. The client <bcp14>SHOULD NOT</bcp14> request a profile name that is not advertised in the server's Directory metadata object.</t>
      <sourcecode type="text"><![CDATA[
    POST /acme/new-order HTTP/1.1
    Host: acme.example.com
    Content-Type: application/jose+json

    {
      "protected": base64url({
        "alg": "ES256",
        "kid": "https://acme.example.com/acct/evOfKhNU60wg",
        "nonce": "5XJ1L3lEkMG7tR6pA00clA",
        "url": "https://acme.example.com/new-order"
      }),
      "payload": base64url({
        "identifiers": [{"type": "dns", "value": "example.org"}],
        "profile": "profile1"
      }),
      "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
    }
]]></sourcecode>
      <t>The server <bcp14>MUST</bcp14> reject all newOrder requests which specify a profile that is incompatible with the rest of the contents of the request (e.g. a "tls-server-auth" profile alongside an identifier of type "email", or a "super-special" profile requested by an account which is not on the appropriate allowlist). In such cases, the server <bcp14>MUST</bcp14> respond with a problem document of type "invalidProfile" (see Section 6.3).</t>
      <t>The server <bcp14>SHOULD</bcp14> reject all newOrder requests which specify a profile that the server is not advertising, but <bcp14>MAY</bcp14> accept them in extenuating circumstances. For example, when a private profile name has been agreed upon with the client via out-of-band mechanisms, or when replacing a certificate during a mass revocation event that was originally issued under a now-deprecated profile.</t>
      <t>If it accepts the request, the server responds with an Order object including the selected profile.</t>
      <sourcecode type="text"><![CDATA[
    HTTP/1.1 201 Created
    Replay-Nonce: MYAuvOpaoIiywTezizk5vw
    Link: <https://acme.example.com/directory>;rel="index"
    Location: https://acme.example.com/order/TOlocE8rfgo

    {
      "status": "valid",
      "expires": "2025-01-01T12:00:00Z",
      "identifiers": [{"type": "dns", "value": "example.org"}],
      "profile": "profile1",
      "authorizations": ["https://acme.example.com/authz/PAniVnsZcis"],
      "finalize": "https://acme.example.com/order/TOlocE8rfgo/finalize",
    }
]]></sourcecode>
      <t>If the server is advertizing profiles and receives a newOrder request which does not identify a specific profile, it is <bcp14>RECOMMENDED</bcp14> that the server select a profile and associate it with the new Order object.</t>
      <t>If a server receives a request to finalize an Order whose profile the CA is no longer willing to issue under, it <bcp14>MUST</bcp14> respond with a problem document of type "invalidProfile". The server <bcp14>SHOULD</bcp14> attempt to avoid this situation, e.g. by ensuring that all Orders for a profile have expired before it stops issuing under that profile.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The extensions to the ACME protocol described in this document build upon the Security Considerations and threat model defined in <xref section="10.1" sectionFormat="of" target="RFC8555"/>. It does not change the account management or identifier validation flows, so the security considerations are largely unchanged.</t>
      <t>The one exception is in regards to CA Policy Considerations. RFC 8555 did not address how a server should determine whether it is willing to issue the certificate as requested by the finalize CSR. This document greatly simplifies this determination by making the contents of the CSR (beyond the Subject Alternative Names and Subject Public Key) irrelevant to the decision-making process.</t>
      <t>Additionally, by moving profile selection out of the finalize CSR and into the Order resource itself, this document reduces the need for ACME Clients and Servers to parse and process x509 ASN.1. This increases the security and stability of the WebPKI as a whole by reducing the incidence of parsing errors and the likelihood of values being copied directly from the CSR into the resulting certificate.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="acme-directory-metadata-fields">
        <name>ACME Directory Metadata Fields</name>
        <t>IANA will add the following entry to the "ACME Directory Metadata Fields" registry within the "Automated Certificate Management Environment (ACME) Protocol" registry group at <eref target="https://www.iana.org/assignments/acme">https://www.iana.org/assignments/acme</eref>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Field Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">profiles</td>
              <td align="left">object</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-order-object-fields">
        <name>ACME Order Object Fields</name>
        <t>IANA will add the following entry to the "ACME Order Object Fields" registry within the "Automated Certificate Management Environment (ACME) Protocol" registry group at <eref target="https://www.iana.org/assignments/acme">https://www.iana.org/assignments/acme</eref>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Field Type</th>
              <th align="left">Configurable</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">profile</td>
              <td align="left">string</td>
              <td align="left">true</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="acme-error-types">
        <name>ACME Error Types</name>
        <t>IANA will add the following entry to the "ACME Error Types" registry within the "Automated Certificate Management Environment (ACME) Protocol" registry group at <eref target="https://www.iana.org/assignments/acme">https://www.iana.org/assignments/acme</eref>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">invalidProfile</td>
              <td align="left">The request specified a profile which this server does not support</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8555">
        <front>
          <title>Automatic Certificate Management Environment (ACME)</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <author fullname="D. McCarney" initials="D." surname="McCarney"/>
          <author fullname="J. Kasten" initials="J." surname="Kasten"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8555"/>
        <seriesInfo name="DOI" value="10.17487/RFC8555"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 193?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>My thanks to Phil Porada for spearheading the implementation of this protocol in the Boulder software. Thanks also to Jacob Hoffman-Andrews, Samantha Frank, James Kasten, and Jason Baker for discussions and brainstorming on what this protocol should look like.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
