Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Felipe Gasper
> On Mar 5, 2018, at 5:58 PM, Matthew D. Hardeman wrote: > >> On Mar 5, 2018, at 3:50 PM, Felipe Gasper wrote: >> >> Quick point: the alleviation of polling would go for authz status as well as >> to certificate delivery. >> >> A certificate order that has 10 domains needs to poll for the st

Re: [Acme] I-D Action: draft-ietf-acme-tls-alpn-00.txt

2018-03-05 Thread Tim Hollebeek
That's a fair point. Although note that critical extension bugs don't tend to be of the "ignore critical extension" variety (though that happens), they tend to be of the "understand the critical extension for the purposes of rejecting it and then getting the logic backwards" or something similar

Re: [Acme] I-D Action: draft-ietf-acme-tls-alpn-00.txt

2018-03-05 Thread Jacob Hoffman-Andrews
On 03/05/2018 04:37 PM, Tim Hollebeek wrote: > I think we may come to regret using that trick so much. Such schemes > are only one software bug away from having rather profound effects > on trust decisions and the entire ecosystem. This is a good point, but an important mitigating factor is that t

Re: [Acme] ALPN based TLS challenge

2018-03-05 Thread Tim Hollebeek
The concerns in this email, many of which I share, are the reason why I’d really like to get around to doing a full security analysis of all of the BR validation methods at some point. They’ve mostly been considered in isolation, when in reality there are many overlapping themes. Maybe we’l

Re: [Acme] I-D Action: draft-ietf-acme-tls-alpn-00.txt

2018-03-05 Thread Tim Hollebeek
I'm generally supportive of this, but one concern I do have, and I admit I'm mostly just thinking aloud here, is that we are slowly accumulating a larger and larger number of things that look like certificates, but aren't due to people playing games with critical extensions. I think we may come to

Re: [Acme] Fwd: I-D Action: draft-barnes-acme-token-challenge-02.txt

2018-03-05 Thread Peterson, Jon
... and the joint draft Mary was referring to is this: https://www.ietf.org/id/draft-peterson-acme-authority-token-01.txt ... which provides a generic framework for acquiring an authority token as a response to ACME challenges. The specific identifier types for the telephone number and service p

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Matthew D. Hardeman
> On Mar 5, 2018, at 3:50 PM, Felipe Gasper wrote: > > >> On Mar 5, 2018, at 1:13 PM, Matthew D. Hardeman >> wrote: >> >> Especially with CT logging being a pragmatic requirement, time-to-delivery >> for certificates is likely to increase (slightly) rather than decrease. > > Quick point:

Re: [Acme] I-D Action: draft-ietf-acme-acme-10.txt

2018-03-05 Thread Daniel McCarney
Draft 10 highlight reel for the tl;dr crowd: - Clarification of JWS serialization. ACME now requires flattened JSON serialization - https://github.com/ietf-wg-acme/acme/pull/410 - Clarification of object status fields and state model (incl. new "ready" state for orders): https://github

[Acme] I-D Action: draft-ietf-acme-acme-10.txt

2018-03-05 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Automated Certificate Management Environment WG of the IETF. Title : Automatic Certificate Management Environment (ACME) Authors : Richard Barnes

[Acme] Fwd: I-D Action: draft-barnes-acme-token-challenge-02.txt

2018-03-05 Thread Mary Barnes
Hi all, This update is just to fix some overt cut and past errors as I inadvertently left references to Service provider code when I was splitting the generic functionality. Please ignore the -01 as I introduced other errors in fixing those errors. It's important to note that this document do

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Martin Thomson
Sure. Plenty of ways to do that. If your primary concern is issuance, then you don't even need server push, you can just long-poll. In HTTP/1.1, that's gross because it ties up a connection and has some disgusting keep-alive properties. In h2 there is no opportunity cost to worry about, the conn

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Richard Barnes
Thomson: Could h2 push replace some of the polling here? On Mon, Mar 5, 2018 at 4:50 PM, Felipe Gasper wrote: > > > On Mar 5, 2018, at 1:13 PM, Matthew D. Hardeman > wrote: > > > > Especially with CT logging being a pragmatic requirement, > time-to-delivery for certificates is likely to increas

Re: [Acme] Example requests

2018-03-05 Thread Jacob Hoffman-Andrews
On 03/04/2018 02:17 PM, Richard Barnes wrote: > Hey Joern, > > This is a probably a good thing to have.  I think that rather than > putting these in the main spec, it might be better to have them in a > second draft.  This is a pretty common pattern.  For example, for TLS > 1.3, there's a "test ve

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Felipe Gasper
> On Mar 5, 2018, at 1:13 PM, Matthew D. Hardeman wrote: > > Especially with CT logging being a pragmatic requirement, time-to-delivery > for certificates is likely to increase (slightly) rather than decrease. Quick point: the alleviation of polling would go for authz status as well as to cer

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Matthew D. Hardeman
My working experience is primarily outside the PKI space, but I can offer some perspectives on scalability and deployment architecture issues. WebSocket is entirely appropriate for real-time or near-real-time bidirectional communications of an asynchronous nature. The overhead of WebSocket as a

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Felipe Gasper
> On Mar 5, 2018, at 9:35 AM, Jörn Heissler > wrote: > > On Mon, Mar 05, 2018 at 09:11:02 -0500, Felipe Gasper wrote: >> Regarding alternative formats, I think ACME over WebSocket would be a great >> thing. Replay-nonce would go away, and clients wouldn’t need to poll for the >> certificate u

Re: [Acme] Concerning alternative formats …

2018-03-05 Thread Jörn Heissler
On Mon, Mar 05, 2018 at 09:11:02 -0500, Felipe Gasper wrote: > Regarding alternative formats, I think ACME over WebSocket would be a great > thing. Replay-nonce would go away, and clients wouldn’t need to poll for the > certificate unless the connection dropped. The server could send the > certi

Re: [Acme] Explicitly forbid to answer GET requests for account info

2018-03-05 Thread Daniel McCarney
Thanks Joern, merged. On Sun, Mar 4, 2018 at 6:57 AM, Jörn Heissler wrote: > Hi, > > another PR that slightly changes meaning (SHOULD NOT -> MUST NOT): > https://github.com/ietf-wg-acme/acme/pull/407 > > Section "Request Authentication" says: > "Servers MUST NOT respond to GET requests for resou

[Acme] Concerning alternative formats …

2018-03-05 Thread Felipe Gasper
For what it’s worth: Regarding alternative formats, I think ACME over WebSocket would be a great thing. Replay-nonce would go away, and clients wouldn’t need to poll for the certificate unless the connection dropped. The server could send the certificate as soon as it’s ready. A simple handshak