Re: [Acme] FW: [EXTERNAL] New Version Notification for draft-vanbrouwershaven-acme-auto-discovery-00.txt

Paul van Brouwershaven <Paul.vanBrouwershaven@entrust.com> Fri, 07 July 2023 07:29 UTC

Return-Path: <Paul.vanBrouwershaven@entrust.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FD46C15153C for <acme@ietfa.amsl.com>; Fri, 7 Jul 2023 00:29:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MntqZEah04YR for <acme@ietfa.amsl.com>; Fri, 7 Jul 2023 00:29:50 -0700 (PDT)
Received: from mx08-0015a003.pphosted.com (mx08-0015a003.pphosted.com [185.183.30.227]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D96DEC14CE4B for <acme@ietf.org>; Fri, 7 Jul 2023 00:29:49 -0700 (PDT)
Received: from pps.filterd (m0242863.ppops.net [127.0.0.1]) by mx08-0015a003.pphosted.com (8.17.1.22/8.17.1.22) with ESMTP id 366KJvJb023227; Fri, 7 Jul 2023 02:29:45 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=mail1; bh=mK+SYpSU2LQrGIz96WDDXjdC 1sFmQoNw/vlIUUadzRM=; b=a8ESIxci8Mvq2UfIk/3ScyU0yLbVAuk/ybV9Wzt4 Q+dW7AQU5ot/lxTYQLv/tpUHkPqYXK/ewJuExClPMJKTxC6FAqk6Hqm/3MkQH3mi E+ATnE9UF2nYuDyAHfMaa/PmKCp2RbBguYdi1F4brvfGUSdcgIzsfP9jSMisjGgr /Excl0JVx3KOH5JyczF7YpMpGSebCQa/b8gtc8i+8KFdfLGd5xs7lCRhAX7QLeAx RHA/usUJcE5t4LCJBXQw3PyRgyH0eGN+FsuF61BjweyBYvMjZJXzwNT6DT/JEYL0 6m2jFXRWkf0CwiGNJz3p9d0xi4SJ+9zeCNKtEMwKWXI61Q==
Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2172.outbound.protection.outlook.com [104.47.57.172]) by mx08-0015a003.pphosted.com (PPS) with ESMTPS id 3rp4jahbq5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 07 Jul 2023 02:29:45 -0500 (CDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ConY94BlnphmZsezCnbBGA0ujPbMIGJqeAbOe1q0N7OS/Wun7iaIsof7LBKi4/dpbhZHA3/nO13tEOHLP0wYBUXKMinw4wFs7yc4DBCu/0/hNFT94SDzd6zsBJBcc0CsTieLphmvmUY3OUyCG852UqK1gsSwnsHXkTDgH3xnp1G8RmWWzRJSztgjHXdJ3Om+C9xg9ef2sG5RhXh5VW5NK9wPb+6Ca3uazqDaaZ4vnILSOYbRgeI6jqRToZ4PPzVyj42NMXaZNTOzVyYjR41QMP/Mxtnwww0ZvhK9Z3dHMIHUP5Z2W9DDrRezAc2r2nlOFyvWYjn7upUr1bwKh+jcsA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mK+SYpSU2LQrGIz96WDDXjdC1sFmQoNw/vlIUUadzRM=; b=G1srWPRmTdDjunC2i87YlhWqyjD17iej3ftbmtya+ZY3NNHHnoNcWAw/C+2/sJj87flrxIxRz1BOxt5snVzniizaYUahkYIXqfJXLLQR9FQ4gd9HCdk9gSeNE8j6dawHe5LmzvgluBDpPeNqHF4cPTyMFddq+aC/1HegmWP7mrrsXYDoWy+I9xCNYxa6vft4OCkoqvyiD22S2uLCy7xyd/pNs3gURz2PhzPq34RgIuyEE4Q3lkeiZX/ikPCWYQLWtRo2h/FOhCWIY5Yqnn33wYbCQ53C9tC5kppBrToVJsPrRcN7X1JCflkebVvVC3QjKh8ezCSTsIeaLuFXhTfEGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
Received: from LV2PR11MB5975.namprd11.prod.outlook.com (2603:10b6:408:17d::6) by IA0PR11MB7813.namprd11.prod.outlook.com (2603:10b6:208:402::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.17; Fri, 7 Jul 2023 07:29:38 +0000
Received: from LV2PR11MB5975.namprd11.prod.outlook.com ([fe80::eb7a:e7ee:ec73:f1b6]) by LV2PR11MB5975.namprd11.prod.outlook.com ([fe80::eb7a:e7ee:ec73:f1b6%7]) with mapi id 15.20.6565.016; Fri, 7 Jul 2023 07:29:37 +0000
From: Paul van Brouwershaven <Paul.vanBrouwershaven@entrust.com>
To: Fraser Tweedale <frase@frase.id.au>, Mike Ounsworth <Mike.Ounsworth@entrust.com>
CC: Richard Barnes <rlb@ipv.sx>, "acme@ietf.org" <acme@ietf.org>
Thread-Topic: [Acme] FW: [EXTERNAL] New Version Notification for draft-vanbrouwershaven-acme-auto-discovery-00.txt
Thread-Index: AQHZsBerC3uY6kYm2E+UdbTaxF5c/6+s00KAgAArYwCAAAvKz4AAYxKAgAAJcQCAABUwAIAAGJEAgAA4ADs=
Date: Fri, 07 Jul 2023 07:29:36 +0000
Message-ID: <LV2PR11MB59758EB8AE2A564200261537F82DA@LV2PR11MB5975.namprd11.prod.outlook.com>
References: <168865435873.61106.2850041921157081937@ietfa.amsl.com> <CH0PR11MB5739FDB26BF675925C449AA69F2CA@CH0PR11MB5739.namprd11.prod.outlook.com> <CAL02cgSH1XM0krpYuCVP1VNpZ8EpprHog1+-oeQkN0a5bX8vHA@mail.gmail.com> <LV2PR11MB5975C3F165D41FBA2BEED912F82CA@LV2PR11MB5975.namprd11.prod.outlook.com> <ZKdW965KnS_C1P6n@bacardi.hollandpark.frase.id.au> <ZKde4llTB-dpA3Kj@bacardi.hollandpark.frase.id.au> <CH0PR11MB57398336D760C6FEA94E21169F2DA@CH0PR11MB5739.namprd11.prod.outlook.com> <ZKeFRKXMXVSlt5GQ@bacardi.hollandpark.frase.id.au>
In-Reply-To: <ZKeFRKXMXVSlt5GQ@bacardi.hollandpark.frase.id.au>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LV2PR11MB5975:EE_|IA0PR11MB7813:EE_
x-ms-office365-filtering-correlation-id: 99886577-f46b-4d9f-ced8-08db7ebbeae6
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV2PR11MB5975.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(136003)(346002)(376002)(39860400002)(366004)(396003)(451199021)(76116006)(110136005)(54906003)(7696005)(478600001)(71200400001)(91956017)(966005)(6506007)(15650500001)(66946007)(4326008)(64756008)(8676002)(122000001)(66476007)(5660300002)(66556008)(9686003)(6636002)(41300700001)(52536014)(8936002)(38100700002)(66446008)(2906002)(316002)(53546011)(38070700005)(83380400001)(66574015)(33656002)(86362001)(55016003)(186003)(166002)(19627405001)(66899021); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_LV2PR11MB59758EB8AE2A564200261537F82DALV2PR11MB5975namp_"
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV2PR11MB5975.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 99886577-f46b-4d9f-ced8-08db7ebbeae6
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Jul 2023 07:29:36.7815 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gLpb0JWPDLHAZjODYutwn1chYCmQaXTXMLpqvrq6Dse+IuwLNRJSV0f8qOlzuN6STxACEZywmzkDAZZ84lXOg5VMOoIXlZpYMhiTYmvVm95bCsazTQ2Ul0Ls3rxIrlb8
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR11MB7813
X-Proofpoint-GUID: eI5p3C5qUsiTivtjxPIOnuAijO1jUWSy
X-Proofpoint-ORIG-GUID: eI5p3C5qUsiTivtjxPIOnuAijO1jUWSy
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-07-07_04,2023-07-06_02,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 priorityscore=1501 bulkscore=0 adultscore=0 phishscore=0 clxscore=1011 mlxscore=0 spamscore=0 mlxlogscore=999 malwarescore=0 suspectscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2305260000 definitions=main-2307070068
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/d8iAyBp4s5Mx1NT7UfLhlsmu-88>
Subject: Re: [Acme] FW: [EXTERNAL] New Version Notification for draft-vanbrouwershaven-acme-auto-discovery-00.txt
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jul 2023 07:29:54 -0000

Hi Fraser,

I did not see your earlier proposal and thanks for providing this history.
Can CAA be used?  Yes, but the number of CAA records to manage grows
with the number of domains for which certs must be issued.  This
could be a headache for some orgs.
I agree that it depends on the number of domain names and that this could cause some challenges if you manage thousands of domain names, on the other hand, this could be templated (depending on the DNS provider), and if you have thousands of domain names you might also have thousands of ACME capable servers. In case all thousand domain names use the same CNAME, CAA specifies that the record could be at the target domain name.

Each domain must indeed have at least one CAA record, but there is no need to change these records unless you want to change the CAs for this domain. This draft could make such a change easier, as instead of changing the ACME server configuration (which is not always possible in a shared environment) at each provider and/or at all your own servers, and potentially in CAA, you could now simply change this domain by domain.

CAA records should ideally be configured on all domains by organizations relying on certificates anyway, it restricts who can issue certificates for your domain name and significantly reduces the attack surface. All CAs are required to check CAA records according to the CA/Browser forum Baseline Requirements before issuing a certificate.

That said, adoption of CAA is not at the level where we would like to see it. This draft might create an additional incentive to configure CAA records.

Per published RFCs only the "dns" identifier type could be use with the CAA approach.  "ip" identifiers are important for many orgs, particuarly those managing their own cloud infrastructure.
Correct, this is not something we really considered, as when you manage your own infrastructure you can also manage your ACME configuration more easily. But like you stated, usage of CAA in the .arpa domain could be dealt with in a separate document.

Paul






________________________________
From: Fraser Tweedale <frase@frase.id.au>
Sent: Friday, July 7, 2023 05:23
To: Mike Ounsworth <Mike.Ounsworth@entrust.com>
Cc: Paul van Brouwershaven <Paul.vanBrouwershaven@entrust.com>; Richard Barnes <rlb@ipv.sx>; acme@ietf.org <acme@ietf.org>
Subject: Re: [Acme] FW: [EXTERNAL] New Version Notification for draft-vanbrouwershaven-acme-auto-discovery-00.txt

On Fri, Jul 07, 2023 at 01:55:52AM +0000, Mike Ounsworth wrote:
> Thanks for the comments Fraser.
>
> Guilty as charged -- we were not thinking about private enterprise
> environments when we wrote it; we were thinking about
> publicly-reachable servers on public clouds getting certs from
> public CAs. In that context, the quote from the abstract "at the
> mercy of their hosting provider as to which Certification
> Authorities (CAs) can be used" is less about the ACME server being
> reachable in a network sense, and more about public hosting
> providers -- quite reasonably -- not wanting to maintain a
> dropdown menu of every ACME server on the internet. Typically if
> you want to use a CA other than the single one that your hosting
> provider knows how to ACME to, then your only option is to
> manually upload a PEM file. Yuck. The other assumption here is
> that this draft is really for domain owners who care enough about
> where their certs come from to have a "favourite CA" because
> people who don't care will be happy to use whatever default ACME
> server.
>
> That said, it's interesting to think about how this could apply to
> your enterprise problem of "find me /some/ ACME server that I can
> reach/use in this network zone". Assuming a private network with
> multiple DNS zones, you could configure your private DNS to slap
> on a constant CAA record across a DNS zone, and that gives you
> your "give me an ACME server, any one will do", right?
>
> Out of curiosity, what happened to draft-tweedale-acme-discovery?
> Did it just not have enough momentum to proceed? Searching on the
> ACME list archive did not turn up very much discussion.

I presented it at IETF 109.  There was broard agreement that it was
a problem that should be solved, but no appetite for the WG to adopt
it at that time.  I'm happy with the content of the proposal and
even implemented a working POC in certbot.

For context, I work at Red Hat and helped develop the ACME server
support in Red Hat Certificate System (upstream: Dogtag Certificate
System) and Identity Management in RHEL (upstream: FreeIPA).  So I
was thinking about how to further enable customers to use cert
automation within their environments.  We haven't implemented the
proposed DNS-SD records yet, because there is no client support (due
to lack of a standard to follow - a "chicken/egg" situation).

Can CAA be used?  Yes, but the number of CAA records to manage grows
with the number of domains for which certs must be issued.  This
could be a headache for some orgs.

Per published RFCs only the "dns" identifier type could be use with
the CAA approach.  "ip" identifiers are important for many orgs,
particuarly those managing their own cloud infrastructure.  But how
to use CAA for ipAddress SAN is not defined.  (Perhaps use the
existing CAA attributes in _.in-addr.arpa and _.ip6.arpa zones).
There is a draft that defines how it would work for the "email"
identifier type[1].

[1] https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-lamps-caa-issuemail/__;!!FJ-Y8qCqXTj2!ezGmXjnzfTuIX7JryAxwWBM4Y0J3L361SpCv7HT0y-OrUWiCDLwPd9OLbGk2iZD2fa3rfV8mXrxRH3QGmNSGIBlmBj8$

However, I think that the CAA approach is likely to get more
traction.  It uses DNS RR types that PKI people are already familiar
with.  It *can* be used in enterprise environments, albeit with more
administrative burden in scenarios that involve a lot of domain
names.

The gap of how CAA can be applied to ipAddress SAN names should be
dealt with in a separate document.  Such work will no doubt attract
interest from other groups (CAB Forum in particular).

The approaches are not mutually exclusive but I really can't imagine
clients would want to implement support for more than one mechanism.
Let's see where this new proposal leads!

Cheers,
Fraser
Any email and files/attachments transmitted with it are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.