[Acme] Interactions between HTTPS RRs (rfc9460) and HTTP-01 DV
Erik Nygren <erik+ietf@nygren.org> Tue, 15 April 2025 20:46 UTC
Return-Path: <nygren@gmail.com>
X-Original-To: acme@mail2.ietf.org
Delivered-To: acme@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id CDB191C8AC13 for <acme@mail2.ietf.org>; Tue, 15 Apr 2025 13:46:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.893
X-Spam-Level:
X-Spam-Status: No, score=-1.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DfY3J6-pm1Wz for <acme@mail2.ietf.org>; Tue, 15 Apr 2025 13:46:40 -0700 (PDT)
Received: from mail-lf1-f47.google.com (mail-lf1-f47.google.com [209.85.167.47]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 5B4C21C8AC09 for <acme@ietf.org>; Tue, 15 Apr 2025 13:46:40 -0700 (PDT)
Received: by mail-lf1-f47.google.com with SMTP id 2adb3069b0e04-5499e3ec54dso7271642e87.0 for <acme@ietf.org>; Tue, 15 Apr 2025 13:46:40 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1744749998; x=1745354798; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=msDOUdVrqfOGJO/PWaywYfWv4RB1svjAbXCpfl+AGZI=; b=iEroqcyXmQuxbKi4Z7M6lqrZnLOFAdbGy+ralTWXzm3YG/lHlcOyfWIQg6lypKAhli UY8Yb/j7xI4mptcSaCdO4eEdJGoW5SE0namwrCBVMDxnQBXBBehqGKltEHlpMOrGLRo2 xfVkS3qX27iuQYamOdTmJti+pMz+bfRYyeoIiK4KIdy7f1PVOTh6aEXN+7h1LuzVYUOV 6Kb8wRCB9kRq0WotJiO1ubgwTkL76ZcC2vF1hoyYM9miYEv/aDJEV1g095TOzgvx52Ty 5hPFK3ps0fwaaQDs3/6W81RFOzfT7oAZkYjO+Rhboy1XfmAmIPb5Eo0k4o2zT4mEOFkL AIzQ==
X-Gm-Message-State: AOJu0Yy5hYk+zWPkLBEfaCuWijDVl40lx4GVTP/bFgdIvVPsY0Xcdj5K 7reafdczpDNc/kgBTaxrOT42/Y1XvJgW3l02UHQ24l+XSqsWOzvF9AFGdN9PDi42RYcOYtAcU32 CW9FStuwysrmS25E6lU5DBUIe9bv4bANI
X-Gm-Gg: ASbGncspi3JzPkWMAlJZjHpd54l+ttQcEorJRHCbaNfLnqVxHdLMpz26A7SKDWPawUi Cu9rx/woyTEisqEKh9mKuoyzOjX/xMhGRfdgEA0XMxJh+l1VUcvp89Aj+RPXfwrvKgICcuTBL6q RDiDAY5LLZ2bV7LDZjJwXSuYV/y+Wo4Xh+vaDIi7KcPH11aHD3ZS+lJty37GbwckrYvA==
X-Google-Smtp-Source: AGHT+IH/2yl7Sw42BUdVNnMmT0a0VKwIiOB4SJtd/bW+0DxLN53Ed/n+0L7gkho1h/cjeBuO323ddYdcRd+6eSU85Z0=
X-Received: by 2002:a05:6512:15a0:b0:549:8fc0:bc2b with SMTP id 2adb3069b0e04-54d60580787mr79724e87.39.1744749997685; Tue, 15 Apr 2025 13:46:37 -0700 (PDT)
MIME-Version: 1.0
From: Erik Nygren <erik+ietf@nygren.org>
Date: Tue, 15 Apr 2025 16:46:25 -0400
X-Gm-Features: ATxdqUG0qUZAza_-dS-DVsPvkTAmjGstGK3HrOqdR3kv1kxNcFC8r2gFqs9ZL2w
Message-ID: <CAKC-DJiDx7onEahH7KcYHykzf7iqGbOgjKD45BNHcE+AmHgoWg@mail.gmail.com>
To: IETF ACME <acme@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d587830632d743c1"
Message-ID-Hash: P6EZT3IV5PR7ASCQQBCSORNX3WDGSOIQ
X-Message-ID-Hash: P6EZT3IV5PR7ASCQQBCSORNX3WDGSOIQ
X-MailFrom: nygren@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-acme.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Acme] Interactions between HTTPS RRs (rfc9460) and HTTP-01 DV
List-Id: Automated Certificate Management Environment <acme.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/HJ4cMlmvQ28XqIfH7Ti1ueF_9OA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Owner: <mailto:acme-owner@ietf.org>
List-Post: <mailto:acme@ietf.org>
List-Subscribe: <mailto:acme-join@ietf.org>
List-Unsubscribe: <mailto:acme-leave@ietf.org>
One of my colleagues recently pointed out a potential interaction between HTTPS RRs (RFC 9460) as it relates to ACME and HTTP-01 DV. If a hostname get an HTTPS RR into DNS prior to getting a cert validated, then there would be a problem if the ACME client resolved the HTTPS RR and auto-upgraded the http:// URI to https as part of HTTP-01 DV. Since a cert won't exist yet this would fail. How would we want to clarify this? It's probably too big for an errata for RFC 8555 but annoying to have to have a draft just to clarify all on its own. If there are plans to do an rfc8555bis (or anything else Updating rfc8555 for HTTP-01) this could be good to include in there. The reading of RFC 8555 section 8.3 is fairly clear that: Dereference the URL using an HTTP GET request. This request MUST be sent to TCP port 80 on the HTTP server [...] > Because many web servers allocate a default HTTPS virtual host to a > particular low-privilege > tenant user in a subtle and non-intuitive manner, the challenge must be > completed over HTTP, not HTTPS > but there's a potential that implementors of HTTP client libraries implementing RFC 9460 might follow section 9.5 ( https://www.rfc-editor.org/rfc/rfc9460.html#name-http-strict-transport-secur) and get into trouble. That section specifies: An HTTPS RR directs the client to communicate with this host only over a secure transport, similar to HSTS [HSTS]. Prior to making an "http" scheme request, the client SHOULD perform a lookup to determine if any HTTPS RRs exist for that origin. To do so, the client SHOULD construct a corresponding "https" URL as follows: 1. Replace the "http" scheme with "https". 2. If the "http" URL explicitly specifies port 80, specify port 443. 3. Do not alter any other aspect of the URL. I think one potential clarification to RFC 8555 Section 8.3 would be that validating clients SHOULD NOT do a resolution of HTTPS RRs. Best, Erik
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Erik Nygren
- [Acme] Interactions between HTTPS RRs (rfc9460) a… Erik Nygren
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Michael Richardson
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Stephen Farrell
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Erik Nygren
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Richard Barnes
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Erik Nygren
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Benjamin Kaduk
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Michael Richardson
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Richard Barnes
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Erik Nygren
- [Acme] Re: Interactions between HTTPS RRs (rfc946… Martin Thomson