Hello Mike,

Thank you for taking the time to review my draft and for your thoughtful response.

I'd like to clarify an important point: this proposal is not a workaround to obtain certificates for domains one isn't authorized for. Rather, it's about enabling properly-scoped authorization that reflects the actual delegation patterns used in modern service architectures.

While SRV-ID certificates likely won't be used for email (which uses MX records rather than SRV records), let me use mail delegation as an example since many are familiar with how it works. Consider the IETF's own domain:

$ dig +short ietf.org
104.16.44.99
104.16.45.99

$ dig +short MX ietf.org
0 mail2.ietf.org.

$ dig +short mail2.ietf.org
166.84.6.31

The IETF domain demonstrates a common pattern: the web service (A records) and mail service (MX record) point to completely different infrastructure. In many organizations, these services are operated by different teams or even different providers. While mail is just an analogy here, the same pattern applies to many SRV-based services where the service operator has legitimate need for a certificate to secure connections, but giving them a certificate for the entire domain would be an over-broad authorization that violates the principle of least privilege.

SRV-ID certificates solve this by providing service-scoped authorization. A certificate for "_myservice.example.com" would allow the service provider to secure their specific service without gaining the ability to impersonate the web service or other services under the domain. This isn't bypassing authorization - it's implementing more granular, appropriate authorization that matches the actual trust boundaries in multi-service deployments.

The current situation forces organizations into suboptimal choices: either share private keys across service boundaries (a security anti-pattern), grant overly broad certificates to service providers, or forgo proper certificate coverage for delegated services. This draft addresses a real operational need for service-specific certificates that respect organizational boundaries.

I recognize that this is a new approach that may take time for the community to fully evaluate. I understand that support from deployers would strengthen the case for adoption. Would it be helpful if I prepared a more detailed problem statement with specific deployment scenarios from potential implementers to share on the mailing list?

Best regards,
Michel Le Bihan

Le 08/09/2025 à 17:30, Mike Ounsworth a écrit :
Hi Michel.

The chairs see your request for a Call-For-Adoption. This is an -00 draft, tagged as Proposed Standard, that I imagine will generate quite a bit of discussion; I don't claim to be an expert on the interactions between SRV DNS records and X.509 Certificates, but the Introduction of your draft certainly gives me the impression that this is a workaround to be able to get certificates for a domain that you're not authorized to get certificates for, which I imagine will generate a fair amount of discussion. Since this is a brand new draft, I don't see much discussion on the list about it yet.

We could do a Call-For-Adoption if you like, which may generate some discussion, but it also has a good chance of failing. Since you are submitting this as Standards Track, I think you would be in a stronger position for a CfA if you can get some large deployers (for example, cloud service providers or ACME operators) to come to the list saying that this draft solves a real-world problem they have, and they are interested in deploying this. Maybe waiting and presenting this at IETF 124 in Montreal would be a good way to generate discussion on this draft?

On Wed, 3 Sept 2025 at 12:47, Michel Le Bihan <[email protected]> wrote:

    Dear ACME WG,

    I would like to request that the working group consider adopting
    my draft, draft-lebihan-srv-identifier-validation-extension-00
    
(https://datatracker.ietf.org/doc/draft-lebihan-srv-identifier-validation-extension/),
    “Automated Certificate Management Environment (ACME) SRV
    Identifier Validation Extension”, as a WG document.

    The draft extends ACME to cover SRV identifiers in a way that I
    believe is consistent with the WG’s scope and useful for real
    deployment scenarios. I would welcome a call for adoption and
    feedback from the group.

    Best regards,
    Michel Le Bihan

    _______________________________________________
    Acme mailing list -- [email protected]
    To unsubscribe send an email to [email protected]
_______________________________________________
Acme mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to