> Am 17.01.2018 um 10:45 schrieb Yann Ylavic <ylavic....@gmail.com>:
> 
> On Wed, Jan 17, 2018 at 10:30 AM, Stefan Eissing
> <stefan.eiss...@greenbytes.de> wrote:
>> 
>>> Am 16.01.2018 um 21:26 schrieb William A Rowe Jr <wr...@rowe-clan.net>:
>>> 
>>> Color me very confused, but I can't distinguish a difference between vhost 
>>> based
>>> Host: header selection in the "http-01" case, and SNI identification
>>> in the case of
>>> "tls-sni-01". Am I missing something? Discussion pointers?
>> 
>> "http-01" makes a request against the dns name to be validated. It is
>> usually not (easily) possible to intercept that from the wrong user account.
>> 
>> "tls-sni-0[12]" just opens a TLS connection with SNI <challenge>.acme.invalid
>> Some shared hosters have allowed people to upload a certificate for that. So,
>> you sign up via ACME (from anywhere) for a shared hosted not-my-domain.com
>> where you are also customer. Wait for the challenge token, create the cert 
>> and
>> upload it to the hoster.
> 
> I think what is missing is simply "https-01", just like "http-01" but
> on TLS and a self signed cert (SNI is irrelevant).
> It don't see how it's less (nor more) secure than "http-01", but
> admins that don't want to or can't use port 80 have their way...

Agreed. Maybe they do it that way. But since this security weakness affects
the IETF proposed "tls-sni-02" challenge in the ACMEv2 protocol also, any
fix will first go through the working group there. And then maybe
backported be LE to their ACMEv1 offering or not.

Reply via email to