[Acme] proposal for wildcard domain validation
yan <yan@eff.org> Wed, 25 March 2015 01:28 UTC
Return-Path: <yan@eff.org>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id C4B6C1A1C02
for <acme@ietfa.amsl.com>; Tue, 24 Mar 2015 18:28:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.011
X-Spam-Level:
X-Spam-Status: No, score=-7.011 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001,
T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id wGnSNvpFHmAi for <acme@ietfa.amsl.com>;
Tue, 24 Mar 2015 18:28:26 -0700 (PDT)
Received: from mail2.eff.org (mail2.eff.org [173.239.79.204])
(using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id E48181A1C06
for <acme@ietf.org>; Tue, 24 Mar 2015 18:28:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=eff.org;
s=mail2;
h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID;
bh=ORz9yLzDdF9YcfhgfK/j9SmOwxEDR1EbJfMujbogRq0=;
b=Qv0FWV0AslvjRVX9Xkbi6DBJUSjhEL3Q5cLNZhJmyuwwAbBMMvZaF6L3MFn97LAdCJEdu4stCeLXYvNzrSpWnZ8VzgGhbhVKBY/H735c3Hgx/MmmpNy2LZobTvp1SOAFwVbIlTwi9nCJs09R33xRAW2WA+PfGlen1itKKZr/8FY=;
Received: ; Tue, 24 Mar 2015 18:28:26 -0700
Message-ID: <55120F3A.9060004@eff.org>
Date: Tue, 24 Mar 2015 18:28:26 -0700
From: yan <yan@eff.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: acme@ietf.org
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Received-SPF: skipped for local relay
Received-SPF: skipped for local relay
Archived-At: <http://mailarchive.ietf.org/arch/msg/acme/IxGH670xySUUkvsUTpCD8xxDczo>
Subject: [Acme] proposal for wildcard domain validation
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>,
<mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>,
<mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 01:28:28 -0000
Hi all, There has been some extensive discussion of support for wildcard domain validation in https://github.com/letsencrypt/acme-spec/issues/64. After talking about this with Peter Eckersley in person today, I wrote up a proposal for handling wildcard domain validation: https://github.com/letsencrypt/acme-spec/pull/97. Feedback is very welcome. Thanks, Yan