Trimming recipients due to moderation.

 

-Tim

 

From: Tim Hollebeek 
Sent: Thursday, August 30, 2018 8:12 AM
To: 'Richard Barnes' <r...@ipv.sx>; Salz, Rich <rs...@akamai.com>
Cc: Alexey Melnikov <aamelni...@fastmail.fm>; draft-ietf-acme-a...@ietf.org; 
IETF ACME <acme@ietf.org>; Daniel McCarney <c...@letsencrypt.org>; Yoav Nir 
<ynir.i...@gmail.com>; The IESG <i...@ietf.org>; <acme-cha...@ietf.org> 
<acme-cha...@ietf.org>; Alexey Melnikov <alexey.melni...@isode.com>
Subject: RE: [Acme] Alexey Melnikov's No Objection on draft-ietf-acme-acme-14: 
(with COMMENT)

 

For what it’s worth, there’s a discussion going on in the validation working 
group right now about how redirects should be handled.  The most likely outcome 
is either pretty severe restrictions around redirects, or completely 
disallowing them.  

 

In the interest of openness, CAs were asked to disclose their current redirect 
behavior as a basis for a discussion about what the requirements should be.  
Two CAs have done so.  Others are strongly encouraged to do so.

 

There is no explicit text allowing them, so it could be argued that the BRs 
currently don’t allow following redirects.  On the other hand, redirects are 
part of HTTP, so the argument can also be made that “retrieving a web page” can 
involve arbitrary redirects, including potentially things like meta refresh and 
javascript.  The fact that such a diverse range of interpretations are possible 
is something we’d love to fix.

 

In particular, non-HTTP redirects that involve parsing page content introduce a 
great deal of complexity and risk into the validation process, and I’d like to 
clarify that that definitely isn’t allowed.

 

Redirects to a location outside of the domain being validated are viewed with 
particular suspicion by many, including me.  Redirects within the same domain 
seem less problematic, and indeed useful for handling large numbers of domains. 
 Though it’s not clear this solves a use case that is not already handled by 
the ability to validate and Authorization Domain Name and use it for subdomains.

 

The main reason to allow redirects within a domain is if there is a unilateral 
redirect from example.com to www.example.com <http://www.example.com> , which 
is of course incredibly common.  It seems one should be able to validate 
example.com using that redirect.

 

At least one large CA supports the “no redirects at all” position.

 

-Tim

 

From: Acme <acme-boun...@ietf.org <mailto:acme-boun...@ietf.org> > On Behalf Of 
Richard Barnes
Sent: Wednesday, August 29, 2018 7:10 PM
To: Salz, Rich <rs...@akamai.com <mailto:rs...@akamai.com> >
Cc: Alexey Melnikov <aamelni...@fastmail.fm <mailto:aamelni...@fastmail.fm> >; 
draft-ietf-acme-a...@ietf.org <mailto:draft-ietf-acme-a...@ietf.org> ; IETF 
ACME <acme@ietf.org <mailto:acme@ietf.org> >; Daniel McCarney 
<c...@letsencrypt.org <mailto:c...@letsencrypt.org> >; Yoav Nir 
<ynir.i...@gmail.com <mailto:ynir.i...@gmail.com> >; The IESG <i...@ietf.org 
<mailto:i...@ietf.org> >; <acme-cha...@ietf.org <mailto:acme-cha...@ietf.org> > 
<acme-cha...@ietf.org <mailto:acme-cha...@ietf.org> >; Alexey Melnikov 
<alexey.melni...@isode.com <mailto:alexey.melni...@isode.com> >
Subject: Re: [Acme] Alexey Melnikov's No Objection on draft-ietf-acme-acme-14: 
(with COMMENT)

 

I noticed that we already had some text in the security considerations about 
redirects, so I reverted to SHOULD and added a forward pointer.

 

> More limited forms of delegation can also lead to an unintended
> party gaining the ability to successfully complete a validation
> transaction. For example, suppose an ACME server follows HTTP
> redirects in HTTP validation and a website operator provisions a
> catch-all redirect rule that redirects requests for unknown
> resources to a different domain. Then the target of the redirect
> could use that to get a certificate through HTTP validation since
> the validation path will not be known to the primary server.

 

https://github.com/ietf-wg-acme/acme/pull/442/files#diff-8430e2aa241beb4ac49b252db20d4ee8R2492

 

Alexey: Can you live with this solution?  There is some residual interop risk, 
but (1) that's kind of unavoidable given the uncertainty here, and (2) 
redirects are an easy-ish thing to debug and adapt if there's a mismatch.  And 
at least the reasoning is pretty well documented now.

 

--Richard

 

On Wed, Aug 29, 2018 at 12:55 PM Salz, Rich <rs...@akamai.com 
<mailto:rs...@akamai.com> > wrote:

I read the link you posted, thanks.

 

As long as we’re not breaking the HTTP spec, I agree that SHOULD seems to get 
the most interop.  As long as we’re getting signed reponses back, I don’t think 
it matters much where the redirect sends you.

 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to