Re: [Acme] I-D Action: draft-ietf-acme-star-00.txt

Martin Thomson <martin.thomson@gmail.com> Mon, 19 June 2017 22:34 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFF8A129C29 for <acme@ietfa.amsl.com>; Mon, 19 Jun 2017 15:34:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fsFeX2_iKMXT for <acme@ietfa.amsl.com>; Mon, 19 Jun 2017 15:34:27 -0700 (PDT)
Received: from mail-lf0-x229.google.com (mail-lf0-x229.google.com [IPv6:2a00:1450:4010:c07::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B771012954B for <acme@ietf.org>; Mon, 19 Jun 2017 15:34:26 -0700 (PDT)
Received: by mail-lf0-x229.google.com with SMTP id o83so63834938lff.3 for <acme@ietf.org>; Mon, 19 Jun 2017 15:34:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=430ABUWJcN7pknpm7h30QbSFHE/bxA6W4A1mQIm5i/k=; b=IhI99XAE1Kg5X3I1aqR8+QIj++abnZd235nWz+G9Eq/bMUhl9ba8l/sTMTTeAVPXGj Ty37TchvlHM4OGvxHZ0jT6iq2aFdbCye595HT5V9Ja0eNasyKPZL2O6rbOhFzFieZVsD g24VHwFEBm8lLgY0VAMtgigc8S2OCw/WSJzHJbQil+Z7Beh7sit+vUjkSCSGGguRn3YO qkAIjxsCzDRqVExJfsHJnDz9MKvLB4dvGBE0wxxp9K4fu59Fnsty8dFZF4Ib+KAQ5sLg 0p4MXpmuTRmLqcBYZYWvJrq5GetLWQETQB0leubGBddjmORqx86GTcMlIIymIi2Nt+s4 thFw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=430ABUWJcN7pknpm7h30QbSFHE/bxA6W4A1mQIm5i/k=; b=Md6R1+WeNhD5Kbnd0iyDy2xOhQq9pkADz1V0nbt3poJmNziCTPBDgfw0TydqtR1OfT 0UnQtnHVEuf+uX7r2S0Yav8oZaAsUMM/TrXz3Vpg+oC1oEepgeRPQnAjS15oEwZtUzR0 My4fzOd9tMP5cXKIAh96xCwgydcSOSiSeSbqtwzyVZ0WR0QJ2cR20O0rV0FkTyHv/N3J rLWeyd8qs6iQx60YpqIUSgqMV7yJ7eLXzQlH6GIeKCYxLpOFL2XZtxohFaNVqEqIDMqJ WefMyc04D5sXV5oM0F75zlOgbHHKep86hAnK3z/xsVGBw5/8JY5auG/MAFFryOS9DtDl yRkQ==
X-Gm-Message-State: AKS2vOyTI6O5Wnb5YAvzahS3/gHsb1J+R0jeXxUuF8FvSZik4eQhVqDY C6+f5pKRUc/ENic0NBoBCXlGy+xCCM0d
X-Received: by 10.25.201.18 with SMTP id z18mr8493596lff.172.1497911664708; Mon, 19 Jun 2017 15:34:24 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.78.17 with HTTP; Mon, 19 Jun 2017 15:34:23 -0700 (PDT)
Received: by 10.46.78.17 with HTTP; Mon, 19 Jun 2017 15:34:23 -0700 (PDT)
In-Reply-To: <CABkgnnWY_2U4uxWDhEU21_UBQr2LJsm1+8gwU2UcP5OfBMrpbw@mail.gmail.com>
References: <149761557766.24143.14359431560325982499@ietfa.amsl.com> <CABkgnnWY_2U4uxWDhEU21_UBQr2LJsm1+8gwU2UcP5OfBMrpbw@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
Date: Tue, 20 Jun 2017 08:34:23 +1000
Message-ID: <CABkgnnXjD8KpFKVK6vDbDKrobo1P3gsjjZcdg20ALXP6XKSgYQ@mail.gmail.com>
To: acme@ietf.org
Content-Type: multipart/alternative; boundary="001a114b2c78ae1478055257bc0e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/cbT9Wrd2YpDhgUcVrw0Er1p5vnk>
Subject: Re: [Acme] I-D Action: draft-ietf-acme-star-00.txt
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Jun 2017 22:34:30 -0000

One further thought. ACME uses an absolute time for expiration. This uses a
relative time. I think that I prefer the former. I realize that consistency
might be impossible in this case, since the recurrent duration is
necessarily relative, but I though it worth raising.

On 19 Jun. 2017 10:08 am, "Martin Thomson" <martin.thomson@gmail.com> wrote:

> A few brief comments on this draft.
>
> On 16 June 2017 at 22:19,  <internet-drafts@ietf.org> wrote:
> >    This memo proposes an ACME extension to enable the issuance of short-
> >    term and automatically renewed certificates.  This allows a domain
> >    name owner to delegate the use of certificates to another party,
> >    while retaining the capability to cancel this delegation at any time
> >    with no need to rely on certificate revocation mechanisms.
>
> I found the introduction overly specific.  The generic use case is to
> simplify the deployment of certificates to unprivileged nodes.  The
> unprivileged nodes then only need to be configured with a URL for
> their certificates.
>
> That requires a couple of paragraphs of exposition at most.  This
> extends to Section 2, which describes a system architecture that
> implies the existence of protocol elements that are simply not defined
> in this document.
>
> Sections 1 and 2 could much more clearly describe what *this* document
> provides.  It provides an extension to ACME that allows for the
> creation of a certificate that automatically renews.
>
> The focus on the CDN case affects the entire document.  The point is
> that the authorized entity is delegating the ability to use a
> certificate for its name to an unprivileged node.  Don't use "CDN",
> "content owner" or any of these highly specific terms.  Use generic
> terms; make new terms if necessary.  FWIW, while NDC is a cute
> reversal, "consumer" really isn't accurate.
>
> draft-iab-web-pki-problems has been abandoned.  It's not a great idea
> to cite it.
>
> In Section 3.1.1, I think that the resolution of these fields, being
> in days, is not conducive to reducing granularity.  (Or will you
> permit 5.7e-3 as a value?)
>
> Section 3.1.1 needs to clearly articulate how
> "recurrent-certificate-validity" (could this be any more verbose and
> hard to type?) relates to "expires".
>
> Please include a definition for the new attributes, rather than just
> providing an example and commenting the JSON.
>
> In Section 3.1.2, you REALLY, REALLY need to authenticate this
> request.  My suggestion is to change this to a POST request with {
> "recurrent": false }.  (I'd have suggested PUT or PATCH, but ACME's
> reliance on JWS perverts that in ways that is incompatible with those
> methods.)
>
> In Section 3.2, the discussion about a Proxy is misleading.  The only
> relevant actor in this is an ACME client.  This section could be
> reduced to:
>
> An ACME client discovers whether a server supports this extension by
> examining a newly created order.  The "recurrent" member will exist if
> the server supports automatic recurring certificate issuance; the
> "recurrent" member will be true if the server accepts the request.
>
> Can the server specify a shorter value for "recurrent-total-lifetime"?
>
> I don't understand Section 3.3 at all.  I'd recommend removing this
> section.  The DNO will decide what authorizations it requests amply
> without this level of proscription in standards.
>
> In Section 3.4, the use of the Expires header field is a common
> mistake.  This is an HTTP caching directive.  It should probably be
> shorter than the expiration time of the certificate (half in fact),
> but not for the reasons that you might think.  The purpose of a
> recommendation on Expires is to ensure that the certificate is not
> cached beyond the point where a newer certificate will be issued.  You
> should remove this text.
>
> Section 5.1 should be promoted to Section 5
>
> Don't mention time-sensitive policy actions by the CA/B Forum.
>
> Can't you simply ensure that the CDN can't modify the CAA record?
>