Hi Richard, Hi Mike, Hi Yoav, Hi Aaron

First thanks again.


Based on the consensus on IETF125, before starting IDP/Opaque-01, I thought 
about the motivation and value of this draft again.
Before that, I have seen exist experimental draft 
(acme-service-provider/acme-token-challenge/acme-sso etc). I like the ideas 
behind these drafts, So I'm curious about why acme wg haven't continued to 
explore the automation certificate requirements in the enterprise 
communication/collaboration? Especially after the popularization of E2EE, shift 
the focus of ACME challenge verification from domain name/identifier to public 
key identity.


In my opinion, 1) although the mainstream business architecture has been 
completely cloudized, it still retains a number of OnPrems, most of which are 
still traditional SIP stacks. 2) to people, the Internet is moving towards 
end-to-end security, from E2EE to E2EP(privacy), Decentralised or distributed, 
they don't need a certificate(or anonymous certificates) to identify themselves 
but with temporary public key by Signal or MLS with transparency. 3) 2B, 
whatever OnPrems or cloud based, there is a centralised ID trust anchor in the 
enterprise, and it is natural to think of the architecture of IdP+ACME+CA, 
let's E2E authenticate based on Certificate, register an enterprise account 
(long-term or temporary) first, and then obtain a authorisation certificate 
(long-term or temporary), access the enterprise network, access enterprise 
services (zero trust) or conduct meetings and communication with other 
enterprise users (E2EE).


So I ask and initiate a discussion:
1) In addition to the rfc8555 Web-PKI framework (proof domain 
name/identifier), is there need another IdP+ACME+CA framework for non Web-PKI 
(automatically issuing certificates to device or people under the 
guarantee of authoritative identity trust anchor)? Different from the previous 
draft, it mainly proves the identity of the public key.
2) If IDP/Opaque-01 had the motivation and value, issuing temporary or 
anonymous certificates to people (the retrieve func of Opaque makes it 
unnecessary for people to carry their private keys). Whether it has enough 
other universal scenarios and standardised value?
3) IETF MIMI WG is solving the problem of encryption interoperability on the 
Internet. So does our ACME WG also need to try to solve the interoperability 
problem of cross-domain certificates between different enterprises?



Best regards,

GengFeng


         原始邮件
         
       
发件人:吴攀雨 <[email protected]&gt;
发件时间:2026年4月2日 22:15
收件人:IETF ACME <[email protected]&gt;
抄送:[email protected] 
<[email protected]&gt;
主题:[Acme] Update: draft-geng-acme-public-key-05




Hi all,




We’ve just published an updated version of the draft:

https://www.ietf.org/archive/id/draft-geng-acme-public-key-05.html




Thanks again for all the valuable feedback and discussions during IETF 125 — 
especially thanks to Aaron Gable, Ilari Liusvaara, David Benjamin, 
Richard&nbsp;Barnes, and others for the insightful comments.




Here’s a summary of the main changes from -04 to -05:




1. Challenge type consolidation

The six challenge types in -04 (pk-dns-01, pk-http-01, pk-tls-alpn-01, 
pk-email-01, pk-csr-01, pk-cert-01) are now unified into a single pk-01 
challenge. Delivery is negotiated via supported_delivery / delivery fields in 
the challenge object.




2. newOrder restructuring

The pk_binding object has been split into three top-level fields: 
public_key&nbsp;(SPKI), pop_mode&nbsp;("async" / "sync"), and csr_less.

3. Unified PoP signing formula

All delivery methods now use a consistent signature construction with domain 
separation and identifier binding:

&nbsp; to_sign = "ACME-pk-01\x00" || keyAuthorization || "." || identifier




4. New ALPN identifier “acme-pk/1”

Defined a new TLS ALPN protocol identifier independent of RFC 8737 
(“acme-tls/1”).

In sync mode, the TLS handshake directly returns the raw proof bytes as 
application data, without requiring a self-signed X.509 certificate with the 
acmeValidation extension. An IANA registration has been requested per RFC 7301.




5. Security enhancements

Added defenses against:

&nbsp; &nbsp; •Unknown Key Share (UKS) via identifier binding

&nbsp; &nbsp; •Cross-protocol attacks via “ACME-pk-01\x00” domain separation

&nbsp; &nbsp; •Authorization reuse via SPKI-level binding checks




6. Post-quantum (PQC) considerations

Added motivation for PQC transition. Noted that PQ signatures may exceed DNS 
TXT limits, and recommend using sync mode (pop_mode: "sync", TLS-ALPN delivery) 
for PQ scenarios.




7. Removal of IdP-based authentication mode

Removed non-Web PKI IdP-based authentication (pk-csr-01, pk-cert-01) and 
related WebAuthn/OPAQUE integration. These will be addressed in a separate 
document following prior feedback.




As always, comments and feedback are very welcome!




Best regards,

Grace
_______________________________________________
Acme mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to