<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosomakho-tls-wimse-cert-hint-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Workload Identifier Scope Hint for TLS ClientHello">Workload Identifier Scope Hint for TLS ClientHello</title>
    <seriesInfo name="Internet-Draft" value="draft-rosomakho-tls-wimse-cert-hint-01"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
      <organization>Cloudflare</organization>
      <address>
        <email>jonathan.hoyland@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="07"/>
    <area/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>tls</keyword>
    <keyword>wimse</keyword>
    <keyword>identifier</keyword>
    <keyword>workload</keyword>
    <keyword>hint</keyword>
    <abstract>
      <?line 45?>

<t>This document defines a TLS extension that allows clients to indicate one or more workload identifier scopes in the ClientHello message. Each scope consists of a URI scheme and trust domain component, representing the administrative domain and identifier namespace in which the client operates. These identifier scopes serve as hints to enable the server to determine whether client authentication is required and which policies or trust anchors should apply. This mechanism improves efficiency in mutual TLS deployments while minimising the exposure of sensitive identifier information. To protect confidentiality, this extension can be used in conjunction with Encrypted Client Hello (ECH).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaroslavros.github.io/tls-wimse-cert-hint/draft-rosomakho-tls-wimse-cert-hint.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rosomakho-tls-wimse-cert-hint/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security  mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaroslavros/tls-wimse-cert-hint"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Mutual TLS (mTLS) is commonly used to authenticate both endpoints of a <xref target="TLS"/> connection, especially in service-to-service communication within distributed systems. In many deployments, client authentication is conditional: only certain clients are required to present a certificate, and the decision is based on the nature of the client.</t>
      <t>This document defines a TLS extension that allows clients to indicate one or more workload identifier scopes in the <tt>ClientHello</tt> message (<xref section="4.1.2" sectionFormat="of" target="TLS"/>). As defined in <xref section="4.5" sectionFormat="of" target="WIMSE-IDENTIFIER"/>, workload identifier scope is a subset of workload identifier and consists of a URI scheme and a trust domain (e.g., <tt>spiffe://example.org</tt> or <tt>wimse://botfarm.example.com</tt>). It indicates a namespace under which the client may present an authenticated identifier. Workload identifier scopes act as hints that inform the server of the client intended identifier before the TLS handshake is completed. Based on this information, the server can determine whether client certificate authentication is desirable and, if so, what policy or certificate validation rules should apply.</t>
      <t>This approach enables more flexible and efficient authentication strategies in environments where different clients may be subject to different requirements. For example:</t>
      <ul spacing="normal">
        <li>
          <t>A server may enforce mTLS only for clients of specific workload identifier scope and allow others to connect without client certificate authentication on TLS layer.</t>
        </li>
        <li>
          <t>A server may use the provided workload identifier scopes to generate an appropriate list of Certificate Authorities extension (<xref section="4.2.4" sectionFormat="of" target="TLS"/>) in <tt>CertificateRequest</tt> message (<xref section="4.3.2" sectionFormat="of" target="TLS"/>).</t>
        </li>
        <li>
          <t>The server may reject the connection early if none of the advertised workload identifier scopes are authorized.</t>
        </li>
      </ul>
      <t>By only sending scheme and trust domain (omitting the path), this extension limits exposure of cleartext information. Where further confidentiality is desired, clients are encouraged to include this extension only in <tt>ClientHelloInner</tt> of Encrypted Client Hello (<xref target="ECH"/>) to ensure confidentiality of the workload identifier scopes.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="tls-extension-format">
      <name>TLS Extension Format</name>
      <t>This document defines a new TLS extension named <tt>workload_identifier_scope_hint</tt>, which is carried in the <tt>ClientHello</tt> message. The extension provides the server with one or more workload identifier scopes that the client associates with itself. This allows the server to evaluate authentication requirements prior to sending a <tt>CertificateRequest</tt> message.</t>
      <t>The <tt>workload_identifier_scope_hint</tt> extension is structured as follows:</t>
      <artwork><![CDATA[
   opaque WorkloadIdentifierScope<1..2^16-1>;

   struct {
       WorkloadIdentifierScope identifierscopes<3..2^16-1>;
   } WorkloadIdentifierScopeHintExtension;
]]></artwork>
      <dl>
        <dt><tt>identifierscopes</tt>:</dt>
        <dd>
          <t>A list of UTF-8 encoded absolute URI strings as defined in <xref target="URI"/> containing only the scheme and trust domain components of Workload Identifiers as defined in <xref section="4.5" sectionFormat="of" target="WIMSE-IDENTIFIER"/>.</t>
        </dd>
      </dl>
      <t>Clients <bcp14>MAY</bcp14> include multiple identity scopes if they operate within more than one trust domain or namespace.</t>
      <t>The extension <bcp14>MUST</bcp14> appear only in the ClientHello. Servers <bcp14>MUST</bcp14> abort TLS handshake with an <tt>illegal_parameter</tt> alert if this extension appears in any other handshake message. Similarly, clients <bcp14>MUST</bcp14> abort TLS handshake if this extension appears in any message from the server.</t>
      <section anchor="server-processing-rules">
        <name>Server Processing Rules</name>
        <t>Upon receiving the extension, the server:</t>
        <ul spacing="normal">
          <li>
            <t><bcp14>MAY</bcp14> use the identifier scopes to determine whether to send a <tt>CertificateRequest</tt> message.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> use the identifier scopes to construct Certificate Authorities extension in the <tt>CertificateRequest</tt> message.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> use the identifier scopes to select a trust anchor or policy.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> reject the handshake early with <tt>handshake_failure</tt> alert if none of the identifier scopes are acceptable.</t>
          </li>
          <li>
            <t><bcp14>MUST NOT</bcp14> treat inclusion of the extension as proof of identity. The identifier scopes are advisory and unauthenticated until verified during client authentication.</t>
          </li>
        </ul>
        <t>If the extension is absent, the server proceeds with the default client authentication behavior.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This extension is intended to improve the flexibility of client authentication policies in TLS. However, because it introduces unauthenticated identity hints early in the handshake, several security considerations apply.</t>
      <section anchor="confidentiality-of-workload-identifier-scopes">
        <name>Confidentiality of Workload Identifier Scopes</name>
        <t>Workload identifier scopes may contain sensitive information, such as deployment structure or tenant-specific data. Since this extension is sent in the clear as part of the ClientHello, exposure of these identifier scopes may allow passive observers to infer client roles, access patterns, or security posture.</t>
        <t>To mitigate this risk, clients <bcp14>SHOULD</bcp14> include this extension only in ClinetHelloInner if <xref target="ECH"/> is available. ECH encrypts the ClinetHelloInner and its extensions under the server's public key, preventing visibility of the identifier scopes to on-path observers.</t>
        <t>If ECH is not in use, clients <bcp14>SHOULD</bcp14> avoid including sensitive or detailed identifier scopes in this extension unless required by policy.</t>
      </section>
      <section anchor="unauthenticated-hints">
        <name>Unauthenticated Hints</name>
        <t>The workload identifier scopes conveyed in this extension are not authenticated. They are advisory in nature and <bcp14>MUST NOT</bcp14> be treated by the server as a proof of identity. Servers <bcp14>MUST</bcp14> perform full cryptographic verification of the client certificate before relying on any identity claim.</t>
        <t>Servers <bcp14>MAY</bcp14> enforce policies based on the presence or absence of expected identifier scopes in the <tt>ClientHello</tt>. However, this enforcement must be restricted to access control decisions prior to authentication, such astriggering client authentication or rejecting the handshake.</t>
      </section>
      <section anchor="identifier-scopes-enumeration">
        <name>Identifier Scopes Enumeration</name>
        <t>If ECH is not deployed, an attacker with network visibility may collect workload identifier scopes by observing repeated TLS handshakes. This could aid in reconnaissance or allow inference of infrastructure details. To reduce this risk, clients may:</t>
        <ul spacing="normal">
          <li>
            <t>Use generic or opaque identifier scopes when full disclosure is not required.</t>
          </li>
          <li>
            <t>Limit use of the extension to trusted networks or peers.</t>
          </li>
          <li>
            <t>Use ECH to encrypt the extension contents.</t>
          </li>
        </ul>
      </section>
      <section anchor="server-response-behaviour">
        <name>Server Response Behaviour</name>
        <t>Servers receiving unknown or malformed identifier scopes <bcp14>SHOULD</bcp14> ignore them and proceed with the default authentication policy. Servers <bcp14>SHOULD NOT</bcp14> terminate connections solely due to unrecognised identifier scopes unless explicitly configured to do so.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value from the TLS ExtensionType Values registry:</t>
      <ul spacing="normal">
        <li>
          <t>The Extension Name should be workload_identifier_scope_hint</t>
        </li>
        <li>
          <t>The TLS 1.3 value should be CH</t>
        </li>
        <li>
          <t>The DTLS-Only value should be N</t>
        </li>
        <li>
          <t>The Recommended value should be Y</t>
        </li>
        <li>
          <t>The Reference should be this document</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="TLS">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="WIMSE-IDENTIFIER">
        <front>
          <title>Workload Identifier</title>
          <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
            <organization>Zscaler</organization>
          </author>
          <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
            <organization>CyberArk</organization>
          </author>
          <date day="29" month="December" year="2025"/>
          <abstract>
            <t>   This document defines a canonical identifier for workloads, referred
   to as the Workload Identifier.  A Workload Identifier is a URI that
   uniquely identifies a workload within the context of a specific trust
   domain.  This identifier can be embedded in digital credentials,
   including X.509 certificates and security tokens, to support
   authentication, authorization, and policy enforcement across diverse
   systems.  The Workload Identifier format ensures interoperability,
   facilitates secure identity federation, and enables consistent
   identity semantics.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-identifier-01"/>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cryptography Consulting LLC</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="14" month="June" year="2025"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="URI">
        <front>
          <title>Uniform Resource Identifier (URI): Generic Syntax</title>
          <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
          <author fullname="R. Fielding" initials="R." surname="Fielding"/>
          <author fullname="L. Masinter" initials="L." surname="Masinter"/>
          <date month="January" year="2005"/>
          <abstract>
            <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="66"/>
        <seriesInfo name="RFC" value="3986"/>
        <seriesInfo name="DOI" value="10.17487/RFC3986"/>
      </reference>
    </references>
    <?line 163?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
