Think it should limit to authz with valid or pending state, and for same 
account. Finalized auths are still exsit on server; and other accounts may have 
auth for it

On 2024년 1월 3일 오후 8시 36분 37초 GMT+09:00, Deb Cooley <debcool...@gmail.com> 작성함:
>Happy New Year!
>
>I'm going through acme's errata.  This one was reported, but crickets on
>any responses from the authors (or others).  It looks like a sensible
>addition to me, but I'd like confirmation.
>
>Thanks
>Deb
>
>On Mon, Sep 23, 2019 at 8:50 AM RFC Errata System <rfc-edi...@rfc-editor.org>
>wrote:
>
>> The following errata report has been submitted for RFC8555,
>> "Automatic Certificate Management Environment (ACME)".
>>
>> --------------------------------------
>> You may review the report below and at:
>> https://www.rfc-editor.org/errata/eid5861
>>
>> --------------------------------------
>> Type: Technical
>> Reported by: owen friel <ofr...@cisco.com>
>>
>> Section: 7.4.1
>>
>> Original Text
>> -------------
>>
>>
>> Corrected Text
>> --------------
>> If a server receives a newAuthz request for an identifier where the
>> authorization object already exists, whether created by CA provisioning on
>> the ACME server or by the ACME server handling a previous newAuthz request
>> from a client, the server returns a 200 (OK) response with the existing
>> authorization URL in the Location header field and the existing JSON
>> authorization object in the body.
>>
>> Notes
>> -----
>> The above text (or similar) should be appended to the end of section 7.4.1
>>
>> Instructions:
>> -------------
>> This erratum is currently posted as "Reported". If necessary, please
>> use "Reply All" to discuss whether it should be verified or
>> rejected. When a decision is reached, the verifying party
>> can log in to change the status and edit the report, if necessary.
>>
>> --------------------------------------
>> RFC8555 (draft-ietf-acme-acme-18)
>> --------------------------------------
>> Title               : Automatic Certificate Management Environment (ACME)
>> Publication Date    : March 2019
>> Author(s)           : R. Barnes, J. Hoffman-Andrews, D. McCarney, J. Kasten
>> Category            : PROPOSED STANDARD
>> Source              : Automated Certificate Management Environment
>> Area                : Security
>> Stream              : IETF
>> Verifying Party     : IESG
>>
>> _______________________________________________
>> Acme mailing list
>> Acme@ietf.org
>> https://www.ietf.org/mailman/listinfo/acme
>>
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to