Re: [Acme] kinds of proof

Paul Hoffman <paul.hoffman@vpnc.org> Sat, 29 November 2014 17:22 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44C621A0163 for <acme@ietfa.amsl.com>; Sat, 29 Nov 2014 09:22:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.647
X-Spam-Level:
X-Spam-Status: No, score=-3.647 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qqHjyNQlj_ND for <acme@ietfa.amsl.com>; Sat, 29 Nov 2014 09:22:10 -0800 (PST)
Received: from proper.com (Hoffman.Proper.COM [207.182.41.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E07E1A014D for <acme@ietf.org>; Sat, 29 Nov 2014 09:22:10 -0800 (PST)
Received: from [10.20.30.90] (142-254-17-119.dsl.dynamic.fusionbroadband.com [142.254.17.119]) (authenticated bits=0) by proper.com (8.14.9/8.14.7) with ESMTP id sATHM8oQ094407 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <acme@ietf.org>; Sat, 29 Nov 2014 10:22:09 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: proper.com: Host 142-254-17-119.dsl.dynamic.fusionbroadband.com [142.254.17.119] claimed to be [10.20.30.90]
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <20141129170537.GK285@mournblade.imrryr.org>
Date: Sat, 29 Nov 2014 09:22:08 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <046F438F-6230-4A3A-8A5C-708BA91E002B@vpnc.org>
References: <CAL02cgTgpjQffow2XuaNuT7BtqYVttXdVUgyqBFbsAbN4g0VzQ@mail.gmail.com> <DEC7A8A8-563D-41B3-94AC-71DC7219D3F8@cisco.com> <m27fyg4yzg.wl%randy@psg.com> <547754C0.9050306@cs.tcd.ie> <20141127211348.GE25114@mournblade.imrryr.org> <54784C61.2080508@cs.tcd.ie> <20141128170917.GC285@mournblade.imrryr.org> <88B49E1D-1601-4B86-8D93-14CF71501DFC@vpnc.org> <20141128213724.GG285@mournblade.imrryr.org> <7261AA75-5912-4514-A393-94F602C941C2@vpnc.org> <20141129170537.GK285@mournblade.imrryr.org>
To: acme@ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/acme/FwY5WnVv6-QSm4hV8tFyZfFwoow
Subject: Re: [Acme] kinds of proof
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Nov 2014 17:22:11 -0000

On Nov 29, 2014, at 9:05 AM, Viktor Dukhovni <ietf-dane@dukhovni.org> wrote:
> 
> On Fri, Nov 28, 2014 at 01:57:55PM -0800, Paul Hoffman wrote:
> 
>>> Because unfortunately, Web PKI certificates are host-wide, they don't
>>> specify a port.  Anyone who can run some program on a machine can
>>> bind to some random port and start a web service.  Possibly port-forwarded
>>> somewhere else via SSH!
>>> 
>>> It is far from clear to me that every "shell" user of a machine
>>> should be authorized to obtain certificates for the whole machine.
>> 
>> And it is clear to me that they should be, if we want to see more encryption
>> of traffic. I have no problem with some CAs saying "we'll issue you a cert
>> only if you control port X", but I absolutely want that to be a policy of
>> the CA, not of the enrollment protocol.
> 
> Paul, do you have any examples of CAs that accept any port, or are
> you in part making that up?

When I got a cert for my POP server, what-used-to-be-Verisign required the proof of control to be on a port that was not 80.

However, "does someone allow it" is completely different than "should this new protocol force a business model on all CAs". In the specific case I am thinking about, I want a server that will run DNS over TCP to be able to get a certificate with ACME. For that, the ability to control port 80 on the host is completely irrelevant. The same would be true for IMAP and POP servers. There are plenty non-web uses of TLS where ACME could be useful; hobbling the protocol to be web-only seems premature.

--Paul Hoffman