[Acme] Re: DNS-ACCOUNT Challenge Update
Erik Nygren <erik+ietf@nygren.org> Tue, 26 November 2024 22:57 UTC
Return-Path: <nygren@gmail.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90FF3C14F619; Tue, 26 Nov 2024 14:57:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.652
X-Spam-Level:
X-Spam-Status: No, score=-1.652 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dkNbrbFz5yiU; Tue, 26 Nov 2024 14:57:15 -0800 (PST)
Received: from mail-lj1-f178.google.com (mail-lj1-f178.google.com [209.85.208.178]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31DA9C14F614; Tue, 26 Nov 2024 14:57:15 -0800 (PST)
Received: by mail-lj1-f178.google.com with SMTP id 38308e7fff4ca-2ffc1009a06so43012211fa.2; Tue, 26 Nov 2024 14:57:15 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732661833; x=1733266633; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=F56x5vW7O1PKdFxs4/H7yZ9ZqlxtHnwSSist0Wx01Q0=; b=UXRBHexcqmQ9f3wBrJGY3nrCQ4Qfrpq2tZLPELIiYzx7l3sNdRxC2cj2D/VEv0Uvms rIVOj6MwWPnsXCsjA5o32onCFMXVl9F9DcC/h2hfOmmfQ2vTICG0Dmc/y+lOHJLHROAy 7uaK9Ef6TevQ9oH2OSK0BMo0JSvjEHaQ1PiJhopsj9Y8wr8ZtcjNCQ1rN6Z8zfdv5GJN eRUKOVKscHNV23Tr8FA0iimCwg4hFY+s3h+ATjb6kzAZoOb9y/OqUcI60WB10gvUFo3E 8nk7nLC1y1Mbll3oUVh3MHiwGg220BL2rkVkfGNigo/rOvTRgp9UsvKnhRdKtdxDJiQd JGhA==
X-Forwarded-Encrypted: i=1; AJvYcCW4sFFraZmRIUbU+UnOtqBttZX1yoeChvymCN7sI9nXrtV/rIInTsa7qnYQOkvcL0fsVxGn@ietf.org, AJvYcCWLFcAeGHVHWfNRGfip5ZKWdde+jAZuJd/Q/gtzaA4J//sdPlKV/JvwQIMxoQ/VH6+OFCCNpLNQOa2R5Zr/6PtK9S1kBu4hHAEaOSR0p2yt/MLc4HukKgg6xI8bXQ42iqQ=@ietf.org
X-Gm-Message-State: AOJu0YzY4czeK+6TytOr1PTkGFwKLe0p5PhJaCUB+wRx1+qAsoMHFEIq h1GPimBRMGybulKaqSp7FBW8rbJDvxXHPwi/g93Kvnhve9o4uZE7p0tU+83KZ+Xh2MFDm+6cRjT hbIOI0TMmxiNjoFwv9eOa6sfvVzcMB2YX
X-Gm-Gg: ASbGnct2PRN+DX8E4WbpjaQljGrwO5BAnifWupquX4ip4SWgUeMPTXvtI88Tvf4LRIK EbQ1PYUIOacKB26sK8DTVN1QOcsiKLzk5lRb6c5Lgc2iW0nmmDXV5+uaES7RoqEVT
X-Google-Smtp-Source: AGHT+IHTaewzCClsjAeDyLFqXNjWm8pt/uCk16+hdO3snCil3iEX1o0SY3sK9836QkZbh1YwxahUU9onb7WYWhWofog=
X-Received: by 2002:a05:651c:1502:b0:2fc:9674:60b5 with SMTP id 38308e7fff4ca-2ffd60a9703mr6141541fa.25.1732661833040; Tue, 26 Nov 2024 14:57:13 -0800 (PST)
MIME-Version: 1.0
References: <CAOG=JULLX3-m=y+rAvJsSQK7oozCsvnY=24sBVro0TCbxezjkg@mail.gmail.com> <CAPh8bk_B=ZvA8cYLN0T48FF-TShTd-eXmjR03O6rtsMBHT+vNA@mail.gmail.com>
In-Reply-To: <CAPh8bk_B=ZvA8cYLN0T48FF-TShTd-eXmjR03O6rtsMBHT+vNA@mail.gmail.com>
From: Erik Nygren <erik+ietf@nygren.org>
Date: Tue, 26 Nov 2024 17:57:01 -0500
Message-ID: <CAKC-DJiUJ_qWTzaGLtD=QTYmZc5ad4sUypJhe6cuA9nJ3qSBUw@mail.gmail.com>
To: Wayne Thayer <wthayer@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000130e420627d8c5ab"
Message-ID-Hash: DT5KS3NI56PCVSNXAVWM7FQXDML2IN56
X-Message-ID-Hash: DT5KS3NI56PCVSNXAVWM7FQXDML2IN56
X-MailFrom: nygren@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-acme.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Amir Omidi <amir=40aaomidi.com@dmarc.ietf.org>, IETF ACME <acme@ietf.org>, draft-ietf-dnsop-domain-verification-techniques@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Acme] Re: DNS-ACCOUNT Challenge Update
List-Id: Automated Certificate Management Environment <acme.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/dDiH5Ja6BIDz85w2UybkGZmn-Oc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Owner: <mailto:acme-owner@ietf.org>
List-Post: <mailto:acme@ietf.org>
List-Subscribe: <mailto:acme-join@ietf.org>
List-Unsubscribe: <mailto:acme-leave@ietf.org>
What is the rationale for removing the scoping mechanism? As an operator that is using ACME, that is also a recurring problem that introduces risk that limits some use-cases (specifically it makes it more risky to use ACME) . At a minimum it would be good to call out this risk in Security Considerations. The rationale is called out in draft-ietf-dnsop-domain-verification-techniques ( https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06 ). I can see why domain-challenge might not be relevant for the ACME use-case, leaving primarily the host and wildcard cases. Specifically (pasting from that draft): 4. <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#section-4>Scope of Validation <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#name-scope-of-validation> *For security reasons, it is crucial to understand the scope of the domain name being validated. Both Application Service Providers and the User need to clearly specify and understand whether the validation request is for a single hostname, a wildcard (all hostnames immediately under that domain), or for the entire domain and subdomains rooted at that name. This is particularly important in large multi-tenant enterprises, where an individual deployer of a service may not necessarily have operational authority of an entire domain.* *In the case of X.509 certificate issuance, the certificate signing request and associated challenge are clear about whether they are for a single host or a wildcard domain. Unfortunately, the ACME protocol's DNS-01 challenge mechanism ([RFC8555 <https://www.rfc-editor.org/rfc/rfc8555>], Section 8.4 <https://rfc-editor.org/rfc/rfc8555#section-8.4>) does not differentiate these cases in the DNS Validation Record. In the absence of this distinction, the DNS administrator tasked with deploying the Validation Record may need to explicitly confirm the details of the certificate issuance request to make sure the certificate is not given broader authority than the User intended. (The ACME protocol is addressing this in [ACME-SCOPED-CHALLENGE <https://datatracker.ietf.org/doc/draft-ietf-acme-scoped-dns-challenges/>].)* *In the more general case of an Internet application service granting authority to a domain owner, again no existing DNS challenge scheme makes this distinction today. New applications should consider having different application names for different scopes, as described below in Section 5.2.1 <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#scope-indication>. Regardless, services should very clearly indicate the scope of the validation in their public documentation so that the domain administrator can use this information to assess whether the Validation Record is granting the appropriately scoped authority.* 5.2.1. <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#section-5.2.1>Scope Indication <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#name-scope-indication> *For applications that may apply more broadly than to a single hostname, the RECOMMENDED approach is to differentiate the application-specific underscore prefix labels to also include the scope (see Section 4 <https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#scope>). In particular:* - *"_<PROVIDER_RELEVANT_NAME>-host-challenge.example.com <http://host-challenge.example.com>" applies only to the specific hostname of "example.com <http://example.com>" and not to anything underneath it.* - *"_<PROVIDER_RELEVANT_NAME>-wildcard-challenge.example.com <http://wildcard-challenge.example.com>" applies to all hostnames at the level immediately underneath "example.com <http://example.com>". For example, it would apply to "foo.example.com <http://foo.example.com>" but not "example.com <http://example.com>" nor "quux.bar.example.com <http://quux.bar.example.com>"* *[...]* Best, Erik On Tue, Nov 19, 2024 at 4:57 PM Wayne Thayer <wthayer@gmail.com> wrote: > Thank you Amir. This draft solves a problem that is hindering adoption of > ACME. I’ve reviewed it and am happy with the simplifications that place the > focus on solving that one specific problem. > > In order for CAs to implement this new domain validation method, the CAB > Forum’s TLS Baseline Requirements need to be updated. Unless concerns are > posted in the next week or two that might result in material changes to the > current draft, I will start a CAB Forum ballot to add dns-account-01 as an > additional permitted validation method in the TLS baseline Requirements. > > Thanks, > > Wayne > > On Mon, Nov 18, 2024 at 9:50 AM Amir Omidi <amir= > 40aaomidi.com@dmarc.ietf.org> wrote: > >> Hi everyone, >> >> Based on the feedback received, we've published a new version of the >> DNS-ACCOUNT-01 draft ( >> https://datatracker.ietf.org/doc/draft-ietf-acme-dns-account-label/) >> This version has been simplified by removing DNS-02 and the scoping >> mechanism, focusing purely on enabling multiple concurrent ACME clients to >> authorize the same domain. >> >> Key changes: >> >> - Removed DNS-02 challenge type completely >> - Removed the scoping mechanism (host/wildcard/domain) >> - Simplified DNS record format >> - More focused introduction on the core problem of enabling multiple >> concurrent ACME clients >> - Better explanation of use cases like multi-region deployments >> >> >> We welcome your feedback on these changes. >> >> Best regards, >> Amir Omidi >> _______________________________________________ >> Acme mailing list -- acme@ietf.org >> To unsubscribe send an email to acme-leave@ietf.org >> > _______________________________________________ > Acme mailing list -- acme@ietf.org > To unsubscribe send an email to acme-leave@ietf.org >
- [Acme] Re: DNS-ACCOUNT Challenge Update Greg T. Wallace
- [Acme] DNS-ACCOUNT Challenge Update Amir Omidi
- [Acme] Re: DNS-ACCOUNT Challenge Update Wayne Thayer
- [Acme] Re: DNS-ACCOUNT Challenge Update Jesper Kristensen
- [Acme] Re: DNS-ACCOUNT Challenge Update Amir Omidi
- [Acme] Re: DNS-ACCOUNT Challenge Update Erik Nygren
- [Acme] Re: DNS-ACCOUNT Challenge Update Amir Omidi
- [Acme] Re: DNS-ACCOUNT Challenge Update Q Misell