Re: [Acme] Issuing certificates based on Simple HTTP challenges

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 16 December 2015 12:01 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F53A1B29DB for <acme@ietfa.amsl.com>; Wed, 16 Dec 2015 04:01:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F4xc3wkJkadI for <acme@ietfa.amsl.com>; Wed, 16 Dec 2015 04:01:11 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5876C1B2A0C for <acme@ietf.org>; Wed, 16 Dec 2015 04:01:07 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id D4790BE58; Wed, 16 Dec 2015 12:01:05 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pOtz_aCTUzws; Wed, 16 Dec 2015 12:01:05 +0000 (GMT)
Received: from [134.226.36.93] (bilbo.dsg.cs.tcd.ie [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 2DDEEBE51; Wed, 16 Dec 2015 12:01:05 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1450267265; bh=LvZMtVJHkUzPQfRjKcpa/zZJsImfiYVzO3SVcsdnvg0=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=QKSoIRxnCO5M5MMZ2ES325AJys4sHDk5ApaY8DZn+rj+ga/Glq7W+kJECRCZPSQsa AaDjFCQXf+RuDKgtn0oNh7z3hO/jBsmn6i6/QOmM9+CCtFLbSJULzRh+n9u2YryIR4 udZS4VDl/lAr5Xwqbjy9ynhIj1lvlkMWbAslgUf8=
To: Julian Dropmann <julian@dropmann.org>
References: <CAF+SmEpOLoaREymVhi=qOUg2opz1vKzzNp6tGrDTZAjYSKFDkg@mail.gmail.com> <566F15DC.7090607@wyraz.de> <6B677A87-C6A0-485E-80DF-24960D585F46@coderanger.net> <566F2CB5.90402@wyraz.de> <89774336-0BA6-48FC-821D-1E8F3ED9AC14@coderanger.net> <566F4701.7050308@wyraz.de> <F3DA31B1-B27C-4C63-8ED4-6D27D46FF282@coderanger.net> <C2C239F2-E8A7-499B-BE52-3A48EA92B86D@dropmann.org> <BF7F8411-3E83-4A1F-B3A1-4C37DC8B4618@coderanger.net> <3CDE1749-3143-49EE-BD66-0AE4A8CC4175@dropmann.org> <566FDAB7.2030403@cs.tcd.ie> <56700F68.3040103@wyraz.de> <56701904.2070009@cs.tcd.ie> <56702EFA.1050008@wyraz.de> <13B5E9A8-E9CE-4018-8A9D-7856CBF06B4F@coderanger.net> <CAMm+Lwhvf+nRVV38q1U1DKm1WStV1UJv4+EJ_zvq0G_Tb25S9w@mail.gmail.com> <2761E0B2-8DCC-4150-813F-8CAB756C0392@coderanger.net> <174B082E-2721-41AE-992D-2937DCCB74CB@dropmann.org> <5670CBD6.5080000@cs.tcd.ie> <CAF+SmEp494K9pQqWNAeH1iS+dsmLSMJnuMpAvjGm0dku3ukEfQ@mail.gmail.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <56715280.2070600@cs.tcd.ie>
Date: Wed, 16 Dec 2015 12:01:04 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.4.0
MIME-Version: 1.0
In-Reply-To: <CAF+SmEp494K9pQqWNAeH1iS+dsmLSMJnuMpAvjGm0dku3ukEfQ@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/acme/AyETATud9mTfu-4KsUJqki1SNMQ>
Cc: "acme@ietf.org" <acme@ietf.org>, Noah Kantrowitz <noah@coderanger.net>
Subject: Re: [Acme] Issuing certificates based on Simple HTTP challenges
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Dec 2015 12:01:14 -0000

Julian,

On 16/12/15 09:22, Julian Dropmann wrote:
> If the owners of the domain decide you not to give you write access to
> their zone, there is probably a reason for that.
> And this reason is that _they_ want to remain in control.
> 
> So why do you even assume that you should be able to obtain a certificate
> for their domain if you do not even have control over that zone?
> In my opinion that is exactly the definition of what CAs should verify: If
> the requester has control over the zone the CA signs the certificate for.
> If the CA issues a certificate for the whole zone, it has to check if this
> happens in consent with the people who have control over that entire zone,
> and not just one guy running a service there.
> 
> You push this discussion in a direction where its all about ease of use for
> the guy running the box to obtain a certificate.
> But please explain to me then, why the host behind an A record should have
> that legitimization.

I'm sorry but I am not seeing what else there is to explain.
But I'll try one more time.

I control the hosts in question and have for >10 years, even
through h/w upgrades. The university don't care that I have
been using self-signed certs for all that time and now don't
care that I can finally present a cert that verifies in a
browser. They are happy enough to trust me to not mess about
inside the college network. All of that is entirely legitimate.

S.

> 
> On Wed, Dec 16, 2015 at 3:26 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie>
> wrote:
> 
>>
>> Hiya,
>>
>> On 16/12/15 01:44, Julian Dropmann wrote:
>>> The target users are server admins right? In order to set up their
>>> services, they should be familiar with DNS.
>>
>> Familiar with != has write access to.
>>
>> In my university, I have root on 24U of boxen with zero write
>> access to the routers, f/w, DNS or mail servers, meaning that
>> for 13 years I couldn't get the two that are publicly visible
>> web servers certified by any CA any time I checked, which was
>> admittedly not that often.
> 
> 
>> ACME (via LE in that case, but I've no allegiance) fixed that
>> in a couple of minutes. And those minutes didn't require deep
>> knowledge of anything - relative ignorance would have worked
>> just as well, which is fantastic:-)
>>
>> And before someone argues, sure there are other situations but
>> our goal here is to define a protocol that works in the most
>> common of those cases as easily as possible and that supports
>> automation.
>>
>>> To use the current
>>> mechanism they already need to configure the A record.
>>
>> Not necessarily the same admins. That much is pretty obvious
>> and unless someone has demographics about how many sysadmins
>> have what access to what (which would be great!) I think this
>> is repetitive argument and therefore pointless.
>>
>> Cheers,
>> S.
>>
>>
>>> So whats the
>>> big difference? Instead of an A record they need to use an SRV
>>> record. So technically only the record type changes. Nothing else.
>>> How is that even a higher level of interaction?
>>>
>>> There are other services requiring admins to create DNS records
>>> (Google Apps for example). They are being used.
>>
>>
> 
> 
> 
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme
>