The problem with saying "Tokens registered as ACME challenge types MUST NOT be used to identify non-ACME validation methods" is that ACME might want to come up with additional method names in the future, and those just might happen to conflict with methods that have been used by other organizations in the meantime. This is exactly the kind of mess that IANA is designed to prevent.

A simple way to go around this issue is if we changed the draft to use "acme-dns-01" instead of "dns-01" and similarly for all ACME methods. Then we COULD say that non-ACME CAs MUST not use "acme-*" methods.

To your second point, many enterprise users will want the extra security of "use this specific CA AND only with this method". There are probably other use cases though.

Thanks,

    Yaron


On 06/07/17 00:17, Richard Barnes wrote:
Just for context here: I think the original operating model for CAA was that the CA would tell the customer what values to put in there in order to authorize issuance. So it was safe to use arbitrary values because it was basically a closed loop CA -> Customer -> CAA -> CA.

Nonetheless, I sympathize with your point here. With ACME, we're moving things in a more standardized / automated direction, so we can automate out some of the CA interaction around CAA if we standardize some values.

Note that the ACME challenge type values are already registered. Would it be sufficient to say something like "Tokens registered as ACME challenge types MUST NOT be used to identify non-ACME validation methods"?

---

This reminds me a related point that I forgot in my initial review. It would be nice if it were possible to specify a validation method policy independent of CA. So I wouldn't have to authorize each CA I interact with individually, but I would be able to say "Only validate my domains using dns-01".

In fact, is there any reason to have different validation methods per CA? It's a property of the domain owner / certificate applicant, not the CA. Is there a reason you would trust CA X to do "http-01" but not CA Y? (I totally understand why "account-uri" is CA-specific, though.)

I would suggest pulling out "validation-methods" from being an attribute to being a "tag" / "property", parallel to "issue" and "issuewild".



On Wed, Jul 5, 2017 at 3:45 PM, Yaron Sheffer <yaronf.i...@gmail.com <mailto:yaronf.i...@gmail.com>> wrote:

    I support moving forward with the document.

    However I think the treatment of the acme-methods (or
    validation-methods) param is inconsistent, before and certainly
    after Richard's PR. The original draft only allows ACME methods
    and the special name "non-acme". This leaves the responsibility to
    ensure names are well defined with the IETF.

    If we allow mixing ACME methods with CA-defined methods per
    Richard's proposal, we should make sure that there is no overlap.
    And even if names are defined by individual CAs, the CA should
    provide a precise definition of each validation method. IMO there
    are two good options:

    - Define an IANA registry for the validation-methods values. (This
    is simple enough, and would be my preference).
    - Define an IANA registry for prefixes (such as "cabf" mentioned
    in Richard's text) and specify that everything else must be
    defined by ACME.

    Thanks,
        Yaron



        https://github.com/ietf-wg-acme/acme-caa/pull/2
        <https://github.com/ietf-wg-acme/acme-caa/pull/2>

        On Wed, Jul 5, 2017 at 11:47 AM, Salz, Rich <rs...@akamai.com
        <mailto:rs...@akamai.com>> wrote:

                There's no listing going on here, since there's no
                registry for the

            values.  CABF could put tokens in their documents if they
            like.

            Okay, please propose wording (or did you?  Sorry if so) to
            change for the
            CAA draft.




    _______________________________________________
    Acme mailing list
    Acme@ietf.org <mailto:Acme@ietf.org>
    https://www.ietf.org/mailman/listinfo/acme
    <https://www.ietf.org/mailman/listinfo/acme>



_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to