The Expect-CT response header field is a new field defined in this specification. It is used by a server to indicate that UAs should evaluate connections to the host emitting the header field for CT compliance (
Section 2.4).
Figure 1 describes the syntax (Augmented Backus-Naur Form) of the header field, using the grammar defined in [
RFC 5234] and the rules defined in
Section 5 of
RFC 9110. The "#" ABNF extension is specified in
Section 5.6.1 of
RFC 9110.
Expect-CT = 1#expect-ct-directive
expect-ct-directive = directive-name [ "=" directive-value ]
directive-name = token
directive-value = token / quoted-string
The directives defined in this specification are described below. The overall requirements for directives are:
-
The order of appearance of directives is not significant.
-
A given directive MUST NOT appear more than once in a given header field. Directives are either optional or required, as stipulated in their definitions.
-
Directive names are case insensitive.
-
UAs MUST ignore any header fields containing directives, or other header field value data that does not conform to the syntax defined in this specification. In particular, UAs MUST NOT attempt to fix malformed header fields.
-
If a header field contains any directive(s) the UA does not recognize, the UA MUST ignore those directives.
-
If the Expect-CT header field otherwise satisfies the above requirements (1 through 5), and Expect-CT is not disabled for local policy reasons (as discussed in Section 2.4.1), the UA MUST process the directives it recognizes.
The
OPTIONAL report-uri directive indicates the URI to which the UA
SHOULD report Expect-CT failures (
Section 2.4). The UA POSTs the reports to the given URI as described in
Section 3.
The
report-uri directive is
REQUIRED to have a directive value, for which the syntax is defined in
Figure 2.
report-uri-value = (DQUOTE absolute-URI DQUOTE) / absolute-URI
The 'report-uri-value'
MUST be quoted if it contains any character not allowed in 'token'.
absolute-URI is defined in
Section 4.3 of
RFC 3986.
UAs
MUST ignore any
report-uri that does not use the HTTPS scheme. UAs
MUST check Expect-CT compliance when the host in the
report-uri is a Known Expect-CT Host; similarly, UAs
MUST apply HSTS [
RFC 6797] if the host in the
report-uri is a Known HSTS Host.
UAs
SHOULD make their best effort to report Expect-CT failures to the
report-uri, but they may fail to report in exceptional conditions. For example, if connecting to the
report-uri itself incurs an Expect-CT failure or other certificate validation failure, the UA
MUST cancel the connection. Similarly, if Expect-CT Host A sets a
report-uri referring to Expect-CT Host B, and if B sets a
report-uri referring to A, and if both hosts fail to comply to the UA's CT Policy, the UA
SHOULD detect and break the loop by failing to send reports to and about those hosts.
Note that the
report-uri need not necessarily be in the same Internet domain or web origin as the host being reported about. Hosts are in fact encouraged to use a separate host as the
report-uri so that CT failures on the Expect-CT Host do not prevent reports from being sent.
UAs
SHOULD limit the rate at which they send reports. For example, it is unnecessary to send the same report to the same
report-uri more than once in the same web-browsing session.
The
OPTIONAL enforce directive is a valueless directive that, if present (i.e., it is "asserted"), signals to the UA that compliance to the CT Policy should be enforced (rather than report-only) and that the UA should refuse future connections that violate its CT Policy. When both the
enforce directive and
report-uri directive (as defined in
Figure 2) are present, the configuration is referred to as an "enforce-and-report" configuration, signaling to the UA that both compliance to the CT Policy should be enforced and violations should be reported.
The
max-age directive specifies the number of seconds after the reception of the Expect-CT header field during which the UA
SHOULD regard the host from whom the message was received as a Known Expect-CT Host.
If a response contains an Expect-CT header field, then the response
MUST contain an Expect-CT header field with a
max-age directive. (A
max-age directive need not appear in every Expect-CT header field in the response.) The
max-age directive is
REQUIRED to have a directive value, for which the syntax (after quoted-string unescaping, if necessary) is defined in
Figure 3.
max-age-value = delta-seconds
delta-seconds = 1*DIGIT
delta-seconds is used as defined in
Section 1.3 of
RFC 9111.
The following three examples demonstrate valid Expect-CT response header fields (where the second splits the directives into two field instances):
Expect-CT: max-age=86400, enforce
Expect-CT: max-age=86400,enforce
Expect-CT: report-uri="https://foo.example/report"
Expect-CT: max-age=86400,report-uri="https://foo.example/report"
This section describes the processing model that Expect-CT Hosts implement. The model has 2 parts: (1) the processing rules for HTTP request messages received over a secure transport (e.g., authenticated, non-anonymous TLS); and (2) the processing rules for HTTP request messages received over non-secure transports, such as TCP.
An Expect-CT Host includes an Expect-CT header field in its response. The header field
MUST satisfy the grammar specified in
Section 2.1.
Establishing a given host as an Expect-CT Host, in the context of a given UA, is accomplished as follows:
-
Over the HTTP protocol running over secure transport, by correctly returning (per this specification) a valid Expect-CT header field to the UA.
-
Through other mechanisms such as a client-side preloaded Expect-CT Host list.
Expect-CT Hosts
SHOULD NOT include the Expect-CT header field in HTTP responses conveyed over non-secure transport.
The UA processing model relies on parsing domain names. Note that internationalized domain names
SHALL be canonicalized by the UA according to the scheme in
Section 10 of
RFC 6797.
The UA stores Known Expect-CT Hosts and their associated Expect-CT directives. This data is collectively known as a host's "Expect-CT metadata".
If an HTTP response does not include an Expect-CT header field that conforms to the grammar specified in
Section 2.1, then the UA
MUST NOT update any Expect-CT metadata.
If the UA receives an HTTP response over a secure transport that includes an Expect-CT header field conforming to the grammar specified in
Section 2.1, the UA
MUST evaluate the connection on which the header field was received for compliance with the UA's CT Policy, and then process the Expect-CT header field as follows. UAs
MUST ignore any Expect-CT header field received in an HTTP response conveyed over non-secure transport.
If the connection does not comply with the UA's CT Policy (i.e., the connection is not CT qualified), then the UA
MUST NOT update any Expect-CT metadata. If the header field includes a
report-uri directive, the UA
SHOULD send a report to the specified
report-uri (
Section 2.3.3).
If the connection complies with the UA's CT Policy (i.e., the connection is CT qualified), then the UA
MUST either:
-
Note the host as a Known Expect-CT Host if it is not already so noted (see Section 2.3.2.1) or
-
Update the UA's cached information for the Known Expect-CT Host if the enforce, max-age, or report-uri header field value directives convey information different from that already maintained by the UA. If the max-age directive has a value of 0, the UA MUST remove its cached Expect-CT information if the host was previously noted as a Known Expect-CT Host and MUST NOT note this host as a Known Expect-CT Host if it is not already noted.
If a UA receives an Expect-CT header field over a CT-compliant connection that uses a version of Certificate Transparency other than [
RFC 6962] or [
RFC 9162], the UA
MUST ignore the Expect-CT header field and clear any Expect-CT metadata associated with the host.
Upon receipt of the Expect-CT response header field over an error-free TLS connection (with X.509 certificate chain validation as described in [
RFC 5280], as well as the validation described in
Section 2.4 of this document), the UA
MUST note the host as a Known Expect-CT Host, storing the host's domain name and its associated Expect-CT directives in non-volatile storage.
To note a host as a Known Expect-CT Host, the UA
MUST set its Expect-CT metadata in its Known Expect-CT Host cache (as specified in
Section 2.3.2.2), using the metadata given in the most recently received valid Expect-CT header field.
For forward compatibility, the UA
MUST ignore any unrecognized Expect-CT header field directives while still processing those directives it does recognize.
Section 2.1 specifies the directives
enforce,
max-age, and
report-uri, but future specifications and implementations might use additional directives.
If the substring matching the host production from the Request-URI (of the message to which the host responded) does not exactly match an existing Known Expect-CT Host's domain name, per the matching procedure for a Congruent Match specified in
Section 8.2 of
RFC 6797, then the UA
MUST add this host to the Known Expect-CT Host cache. The UA caches:
-
the Expect-CT Host's domain name.
-
whether the enforce directive is present.
-
the Effective Expiration Date, which is the Effective Expect-CT Date plus the value of the max-age directive. Alternatively, the UA MAY cache enough information to calculate the Effective Expiration Date. The Effective Expiration Date is calculated from when the UA observed the Expect-CT header field and is independent of when the response was generated.
-
the value of the report-uri directive, if present.
If any other metadata from optional or future Expect-CT header directives are present in the Expect-CT header field, and the UA understands them, the UA
MAY note them as well.
UAs
MAY set an upper limit on the value of
max-age so that UAs that have noted erroneous Expect-CT Hosts (whether by accident or due to attack) have some chance of recovering over time. If the server sets a
max-age greater than the UA's upper limit, the UA may behave as if the server set the
max-age to the UA's upper limit. For example, if the UA caps
max-age at 5,184,000 seconds (60 days), and an Expect-CT Host sets a
max-age directive of 90 days in its Expect-CT header field, the UA may behave as if the
max-age were effectively 60 days. (One way to achieve this behavior is for the UA to simply store a value of 60 days instead of the 90-day value provided by the Expect-CT Host.)
If the UA receives, over a secure transport, an HTTP response that includes an Expect-CT header field with a
report-uri directive, and the connection does not comply with the UA's CT Policy (i.e., the connection is not CT qualified), and the UA has not already sent an Expect-CT report for this connection, then the UA
SHOULD send a report to the specified
report-uri as specified in
Section 3.
When a UA sets up a TLS connection, the UA determines whether the host is a Known Expect-CT Host according to its Known Expect-CT Host cache. An Expect-CT Host is "expired" if the Effective Expiration Date refers to a date in the past. The UA
MUST ignore any expired Expect-CT Hosts in its cache and not treat such hosts as Known Expect-CT Hosts.
When a UA connects to a Known Expect-CT Host using a TLS connection, if the TLS connection has no errors, then the UA will apply an additional correctness check: compliance with a CT Policy. A UA should evaluate compliance with its CT Policy whenever connecting to a Known Expect-CT Host. However, the check can be skipped for local policy reasons (as discussed in
Section 2.4.1) or in the event that other checks cause the UA to terminate the connection before CT compliance is evaluated. For example, a Public Key Pinning failure [
RFC 7469] could cause the UA to terminate the connection before CT compliance is checked. Similarly, if the UA terminates the connection due to an Expect-CT failure, this could cause the UA to skip subsequent correctness checks. When the CT compliance check is skipped or bypassed, Expect-CT reports (
Section 3) will not be sent.
When CT compliance is evaluated for a Known Expect-CT Host, the UA
MUST evaluate compliance when setting up the TLS session, before beginning an HTTP conversation over the TLS channel.
If a connection to a Known Expect-CT Host violates the UA's CT Policy (i.e., the connection is not CT qualified), and if the Known Expect-CT Host's Expect-CT metadata indicates an
enforce configuration, the UA
MUST treat the CT compliance failure as an error. The UA
MAY allow the user to bypass the error unless connection errors should have no user recourse due to other policies in effect (such as HSTS, as described in
Section 12.1 of
RFC 6797).
If a connection to a Known Expect-CT Host violates the UA's CT Policy, and if the Known Expect-CT Host's Expect-CT metadata includes a
report-uri, the UA
SHOULD send an Expect-CT report to that
report-uri (
Section 3).
It is acceptable for a UA to skip CT compliance checks for some hosts according to local policy. For example, a UA
MAY disable CT compliance checks for hosts whose validated certificate chain terminates at a user-defined trust anchor rather than a trust anchor built in to the UA (or underlying platform).
If the UA does not evaluate CT compliance, e.g., because the user has elected to disable it, or because a presented certificate chain chains up to a user-defined trust anchor, UAs
SHOULD NOT send Expect-CT reports.