On Thu, Aug 31, 2023 at 2:09 AM Ilari Liusvaara <ilariliusva...@welho.com>
wrote:

> 1) There may be a number of orthogonal properties, causing the total
>    number of possible profiles be very large (the CA-side code is
>    NOT complex).
>

I'm not super concerned with combinatorial explosions of profiles. A CA
could offer many profiles that differ in small ways, but
a) It would be their responsibility to ensure that all profiles abide by
their PKI's requirements; and
b) It would be their responsibility to clearly communicate what each of
those profiles means to their subscribers.
Honestly, doing both of those is difficult. So I think CAs will be
incentivized to limit themselves to a small number of well-curated
profiles, just like they limit themselves to a single profile today.


> I think the server should reject the order creation if "profile" field
> is present, but contains some unknown or disallowed value. The default
> only appiles if there is no "profile" specified.
>

I considered this, because as you say it certainly makes sense to simply
reject orders which request a non-existent profile. However, I think that
it breaks down in practice: we know that there will be clients which are
set up once, configured with a profile name once, and then never updated
ever again. The CA needs the ability to evolve and deprecate profiles
without causing those clients to permanently fail. Therefore I think it is
best that the ACME server SHOULD reject such requests but MAY ignore the
unrecognized profile and select a default instead, or something like that.


> The reason why TLS 1.3 changed the algorithm negotiation to be more
> pick-and-choose is because the TLS 1.2 way would have been completely
> unworkable.
>

I was specifically referring to the combinatorial explosion of four-part
cipher suites available in TLS 1.2, versus the much smaller list of
two-part cipher suites available in TLS 1.3. Allowing clients to
mix-and-match key exchange algorithms with bulk cipher and hashing
algorithms led to significant problems.

Aaron
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to