[Acme] Fwd: draft-moriarty-acme-client - TOTP, HOTP, etc.

2019-07-23 Thread Kathleen Moriarty
Thank you to Thomas for the review and text below, I'll include it in the
next update.  Shared here for transparency.

Best regards,
Kathleen



*From:* Thomas Peterson 
*Date:* July 23, 2019 at 11:20:05 AM GMT-4
*To:* 
*Subject:* *draft-moriarty-acme-client - TOTP, HOTP, etc.*


[EXTERNAL EMAIL]
Thanks for your time after your presentation at the ACME WG today.

RFC 6238 (TOTP), and RFC 4226 (HOTP) are both IETF standards that cover
one-time password for 2FA use cases. I've attached a patch that should
merge clean against your XML version - please let me know there is any
issues with it.

(You are also free to forward or cc the acme d-list if you think it would
facilitate discussion)

Regards



-- 

Best regards,
Kathleen
___
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme


[Acme] Rate limits and ACME

2019-07-23 Thread Felipe Gasper
Hello,


https://community.letsencrypt.org/t/programmatically-distinguishing-rate-limits/97986/14

^^ W/r/t this LE forum thread, what would be involved in proposing an 
ACME extension that provides a reliable, machine-parsable mechanism to 
distinguish one rate limit from another?

My specific use case is: the client I’m building iterates through users 
on a system and requests certificates as needed: e.g., a newly-added domain, 
expired certificate, etc. On a server that has just enabled automatic 
certificate generation (or even has just transferred in a user with hundreds of 
domains) this will easily run up against Let’s Encrypt’s rate limit of 300 
certificate orders per 3-hour timespan.

We could throttle that locally, but the software we publish runs on 
servers that we don’t administer, so if an admin has requested an adjustment to 
that rate limit (as I suspect many will), we’ll either complicate those admins’ 
lives by making them keep a local configuration in sync manually with their LE 
account, or hard-code 300-per-3hrs and deny them the benefit of their raised 
raite limit, which is even worse.

So the solution we’re looking at right now is that we request 
certificates until we hit that specific orders-per-3hrs rate limit, then we 
stop (until the next cron-scheduled run). This way, from the admin’s 
perspective, stuff Just Works™. But that is the *only* rate limit that we want 
to treat that way; since all of the other rate limits concern specific domains, 
we treat those as nonfatal since a rate limit error for one domain likely won’t 
affect others.

The problem is that right now, the only way we have of identifying that 
specific rate limit is to look for the string “too many new orders” in the 
error document’s “detail”. It’s awfully brittle, but there’s apparently no 
other way.

An ACME extension to solve this, then, seems worth proposing. Thoughts?

Thank you!

-Felipe Gasper
Mississauga, Ontario
___
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme


[Acme] Reminder: ACME Integration side meeting

2019-07-23 Thread Salz, Rich
Weds 9-10 in Coller organized by Rifaat
___
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme