[Acme] Re: DNS-ACCOUNT Challenge Update

Erik Nygren <erik+ietf@nygren.org> Tue, 26 November 2024 22:57 UTC

Return-Path: <nygren@gmail.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90FF3C14F619; Tue, 26 Nov 2024 14:57:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.652
X-Spam-Level:
X-Spam-Status: No, score=-1.652 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dkNbrbFz5yiU; Tue, 26 Nov 2024 14:57:15 -0800 (PST)
Received: from mail-lj1-f178.google.com (mail-lj1-f178.google.com [209.85.208.178]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31DA9C14F614; Tue, 26 Nov 2024 14:57:15 -0800 (PST)
Received: by mail-lj1-f178.google.com with SMTP id 38308e7fff4ca-2ffc1009a06so43012211fa.2; Tue, 26 Nov 2024 14:57:15 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732661833; x=1733266633; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=F56x5vW7O1PKdFxs4/H7yZ9ZqlxtHnwSSist0Wx01Q0=; b=UXRBHexcqmQ9f3wBrJGY3nrCQ4Qfrpq2tZLPELIiYzx7l3sNdRxC2cj2D/VEv0Uvms rIVOj6MwWPnsXCsjA5o32onCFMXVl9F9DcC/h2hfOmmfQ2vTICG0Dmc/y+lOHJLHROAy 7uaK9Ef6TevQ9oH2OSK0BMo0JSvjEHaQ1PiJhopsj9Y8wr8ZtcjNCQ1rN6Z8zfdv5GJN eRUKOVKscHNV23Tr8FA0iimCwg4hFY+s3h+ATjb6kzAZoOb9y/OqUcI60WB10gvUFo3E 8nk7nLC1y1Mbll3oUVh3MHiwGg220BL2rkVkfGNigo/rOvTRgp9UsvKnhRdKtdxDJiQd JGhA==
X-Forwarded-Encrypted: i=1; AJvYcCW4sFFraZmRIUbU+UnOtqBttZX1yoeChvymCN7sI9nXrtV/rIInTsa7qnYQOkvcL0fsVxGn@ietf.org, AJvYcCWLFcAeGHVHWfNRGfip5ZKWdde+jAZuJd/Q/gtzaA4J//sdPlKV/JvwQIMxoQ/VH6+OFCCNpLNQOa2R5Zr/6PtK9S1kBu4hHAEaOSR0p2yt/MLc4HukKgg6xI8bXQ42iqQ=@ietf.org
X-Gm-Message-State: AOJu0YzY4czeK+6TytOr1PTkGFwKLe0p5PhJaCUB+wRx1+qAsoMHFEIq h1GPimBRMGybulKaqSp7FBW8rbJDvxXHPwi/g93Kvnhve9o4uZE7p0tU+83KZ+Xh2MFDm+6cRjT hbIOI0TMmxiNjoFwv9eOa6sfvVzcMB2YX
X-Gm-Gg: ASbGnct2PRN+DX8E4WbpjaQljGrwO5BAnifWupquX4ip4SWgUeMPTXvtI88Tvf4LRIK EbQ1PYUIOacKB26sK8DTVN1QOcsiKLzk5lRb6c5Lgc2iW0nmmDXV5+uaES7RoqEVT
X-Google-Smtp-Source: AGHT+IHTaewzCClsjAeDyLFqXNjWm8pt/uCk16+hdO3snCil3iEX1o0SY3sK9836QkZbh1YwxahUU9onb7WYWhWofog=
X-Received: by 2002:a05:651c:1502:b0:2fc:9674:60b5 with SMTP id 38308e7fff4ca-2ffd60a9703mr6141541fa.25.1732661833040; Tue, 26 Nov 2024 14:57:13 -0800 (PST)
MIME-Version: 1.0
References: <CAOG=JULLX3-m=y+rAvJsSQK7oozCsvnY=24sBVro0TCbxezjkg@mail.gmail.com> <CAPh8bk_B=ZvA8cYLN0T48FF-TShTd-eXmjR03O6rtsMBHT+vNA@mail.gmail.com>
In-Reply-To: <CAPh8bk_B=ZvA8cYLN0T48FF-TShTd-eXmjR03O6rtsMBHT+vNA@mail.gmail.com>
From: Erik Nygren <erik+ietf@nygren.org>
Date: Tue, 26 Nov 2024 17:57:01 -0500
Message-ID: <CAKC-DJiUJ_qWTzaGLtD=QTYmZc5ad4sUypJhe6cuA9nJ3qSBUw@mail.gmail.com>
To: Wayne Thayer <wthayer@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000130e420627d8c5ab"
Message-ID-Hash: DT5KS3NI56PCVSNXAVWM7FQXDML2IN56
X-Message-ID-Hash: DT5KS3NI56PCVSNXAVWM7FQXDML2IN56
X-MailFrom: nygren@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-acme.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Amir Omidi <amir=40aaomidi.com@dmarc.ietf.org>, IETF ACME <acme@ietf.org>, draft-ietf-dnsop-domain-verification-techniques@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Acme] Re: DNS-ACCOUNT Challenge Update
List-Id: Automated Certificate Management Environment <acme.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/dDiH5Ja6BIDz85w2UybkGZmn-Oc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Owner: <mailto:acme-owner@ietf.org>
List-Post: <mailto:acme@ietf.org>
List-Subscribe: <mailto:acme-join@ietf.org>
List-Unsubscribe: <mailto:acme-leave@ietf.org>

What is the rationale for removing the scoping mechanism?
As an operator that is using ACME, that is also a recurring problem that
introduces risk
that limits some use-cases (specifically it makes it more risky to use
ACME) .

At a minimum it would be good to call out this risk in Security
Considerations.
The rationale is called out in
draft-ietf-dnsop-domain-verification-techniques (
https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06
).

I can see why domain-challenge might not be relevant for the ACME use-case,
leaving primarily the host and wildcard cases.


Specifically (pasting from that draft):

4.
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#section-4>Scope
of Validation
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#name-scope-of-validation>
*For
security reasons, it is crucial to understand the scope of the domain name
being validated. Both Application Service Providers and the User need to
clearly specify and understand whether the validation request is for a
single hostname, a wildcard (all hostnames immediately under that domain),
or for the entire domain and subdomains rooted at that name. This is
particularly important in large multi-tenant enterprises, where an
individual deployer of a service may not necessarily have operational
authority of an entire domain.*

*In the case of X.509 certificate issuance, the certificate signing request
and associated challenge are clear about whether they are for a single host
or a wildcard domain. Unfortunately, the ACME protocol's DNS-01 challenge
mechanism ([RFC8555 <https://www.rfc-editor.org/rfc/rfc8555>], Section 8.4
<https://rfc-editor.org/rfc/rfc8555#section-8.4>) does not differentiate
these cases in the DNS Validation Record. In the absence of this
distinction, the DNS administrator tasked with deploying the Validation
Record may need to explicitly confirm the details of the certificate
issuance request to make sure the certificate is not given broader
authority than the User intended. (The ACME protocol is addressing this in
[ACME-SCOPED-CHALLENGE
<https://datatracker.ietf.org/doc/draft-ietf-acme-scoped-dns-challenges/>].)*

*In the more general case of an Internet application service granting
authority to a domain owner, again no existing DNS challenge scheme makes
this distinction today. New applications should consider having different
application names for different scopes, as described below in Section 5.2.1
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#scope-indication>.
Regardless, services should very clearly indicate the scope of the
validation in their public documentation so that the domain administrator
can use this information to assess whether the Validation Record is
granting the appropriately scoped authority.*
5.2.1.
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#section-5.2.1>Scope
Indication
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#name-scope-indication>

*For applications that may apply more broadly than to a single hostname,
the RECOMMENDED approach is to differentiate the application-specific
underscore prefix labels to also include the scope (see Section 4
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-06#scope>).
In particular:*

-

*"_<PROVIDER_RELEVANT_NAME>-host-challenge.example.com
<http://host-challenge.example.com>" applies only to the specific hostname
of "example.com <http://example.com>" and not to anything underneath it.*
-

*"_<PROVIDER_RELEVANT_NAME>-wildcard-challenge.example.com
<http://wildcard-challenge.example.com>" applies to all hostnames at the
level immediately underneath "example.com <http://example.com>". For
example, it would apply to "foo.example.com <http://foo.example.com>" but
not "example.com <http://example.com>" nor "quux.bar.example.com
<http://quux.bar.example.com>"*

*[...]*

Best, Erik


On Tue, Nov 19, 2024 at 4:57 PM Wayne Thayer <wthayer@gmail.com> wrote:

> Thank you Amir. This draft solves a problem that is hindering adoption of
> ACME. I’ve reviewed it and am happy with the simplifications that place the
> focus on solving that one specific problem.
>
> In order for CAs to implement this new domain validation method, the CAB
> Forum’s TLS Baseline Requirements need to be updated. Unless concerns are
> posted in the next week or two that might result in material changes to the
> current draft, I will start a CAB Forum ballot to add dns-account-01 as an
> additional permitted validation method in the TLS baseline Requirements.
>
> Thanks,
>
> Wayne
>
> On Mon, Nov 18, 2024 at 9:50 AM Amir Omidi <amir=
> 40aaomidi.com@dmarc.ietf.org> wrote:
>
>> Hi everyone,
>>
>> Based on the feedback received, we've published a new version of the
>> DNS-ACCOUNT-01 draft (
>> https://datatracker.ietf.org/doc/draft-ietf-acme-dns-account-label/)
>> This version has been simplified by removing DNS-02 and the scoping
>> mechanism, focusing purely on enabling multiple concurrent ACME clients to
>> authorize the same domain.
>>
>> Key changes:
>>
>>    - Removed DNS-02 challenge type completely
>>    - Removed the scoping mechanism (host/wildcard/domain)
>>    - Simplified DNS record format
>>    - More focused introduction on the core problem of enabling multiple
>>    concurrent ACME clients
>>    - Better explanation of use cases like multi-region deployments
>>
>>
>> We welcome your feedback on these changes.
>>
>> Best regards,
>> Amir Omidi
>> _______________________________________________
>> Acme mailing list -- acme@ietf.org
>> To unsubscribe send an email to acme-leave@ietf.org
>>
> _______________________________________________
> Acme mailing list -- acme@ietf.org
> To unsubscribe send an email to acme-leave@ietf.org
>