[Acme] Re: ACME discovery drafts looking for an author

Mike Ounsworth <Mike.Ounsworth@entrust.com> Wed, 07 May 2025 17:21 UTC

Return-Path: <Mike.Ounsworth@entrust.com>
X-Original-To: acme@mail2.ietf.org
Delivered-To: acme@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id DAE9526070EC for <acme@mail2.ietf.org>; Wed, 7 May 2025 10:21:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a1DflH8Wmy-4 for <acme@mail2.ietf.org>; Wed, 7 May 2025 10:21:49 -0700 (PDT)
Received: from mx08-0015a003.pphosted.com (mx08-0015a003.pphosted.com [185.183.30.227]) by mail2.ietf.org (Postfix) with ESMTP id C237826070E3 for <acme@ietf.org>; Wed, 7 May 2025 10:21:47 -0700 (PDT)
Received: from pps.filterd (m0242863.ppops.net [127.0.0.1]) by mx08-0015a003.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5478nmdt005793; Wed, 7 May 2025 12:21:39 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; h= content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=mail1; bh=3v4M/cxT5hap6cpggK2Rt3PDHhA8 Ven1/cmGbxehGJc=; b=IGozMyA/PzytgdjY1uNXvBn2KYcmJsdfgCVai+fbXnnW evuYON4xtX5AXCXJ3l2bMLdwsrJiMGYY3B2cMLgLfXMd6IpScvvmDzImebwUMFAE h821LIennSUvm76J4Rtl6AJ3TOwHeFTqrlRkeQ9rywzPUzsDlSSze+LEj5uvtYx/ KHZLZLZdzvyFqB9kERMFyhPBHcLnu5z9SI0Ec7srn/uobjptrv9ZF1TLNtDVnnGF E/XgZFMgdMIbx/TZsxs5d0cQzvIY7kOZexHSZHEYgPYpMyRq74OXsoRbdxS1nwJx bwx0UsLfEkoWRkuF/B0lRp4opF1ibITiDly/jGK2HQ==
Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2170.outbound.protection.outlook.com [104.47.56.170]) by mx08-0015a003.pphosted.com (PPS) with ESMTPS id 46g4brsn8p-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 07 May 2025 12:21:38 -0500 (CDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dD+ymyqk1jptQRUNHyHZIAv6JqXm3P/CzazzVzaubFHH+GxKz4iYVj6YiJjM83fPtE3Nh085NdLtRL8I2kl1JDWWblQu32yVa8kWnrC07kV/4YOe4VaOI6sK0QDrZo/EOdMj/9nXUl1f4/3GrlCObgoKBEgxTGnySB5w0NNV0t3Kgv3Ex/vJtzvMGWMrxS+wLprQ9YKpxVV22HMQu9bDsa4JnLZAkrC79GcaLyaTZZdfswFL/z/Jff15WmMEYFep1xRz+fxvf0KNot60sqUY395VdE7faZ8NFs/vmc3WQTsxmkxkqYWaFMMgTNNS1ZX1ZZtJaTkWo6JNBa/04Nh3ow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RSP+txoUbazdPr0LZFusF65Jf3nCaU5ck4ijDSmWHw4=; b=joS9hyzDPc3Wp6KhGobQTu2t+t4+0W1XcDX95vGEIE9Oe7cShnm4KWQQmRGUkfL+cHzJcJNWwQLZXoC826Dfbt7ETMtPuIgsL25TkiIOaiaw3mELa2hSY8/A6T6e+QGpXkQAl7JyHu9vmWec0cnpVbHAYveLqmHCcCnCsRiR4UIaiwZHyoazWClfYFId4yfPcKPhGoCEcJSLCzCPd1GjwhAMbJCWv+4w9fhO7oJwxjVWeu+gOPgAZCLmPnHFTIxvX4CJDmNLgvkc7uDzmIEp4eedujwdG9nGfjUZ5FE79u4B05+uJjS3Kmy3/w0lKjYBE4eOmcKiBHUyO4Lc51KHjA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
Received: from CH0PR11MB5739.namprd11.prod.outlook.com (2603:10b6:610:100::20) by DM4PR11MB7352.namprd11.prod.outlook.com (2603:10b6:8:103::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8699.35; Wed, 7 May 2025 17:21:34 +0000
Received: from CH0PR11MB5739.namprd11.prod.outlook.com ([fe80::b93d:b2d:3ad8:9702]) by CH0PR11MB5739.namprd11.prod.outlook.com ([fe80::b93d:b2d:3ad8:9702%6]) with mapi id 15.20.8699.026; Wed, 7 May 2025 17:21:34 +0000
From: Mike Ounsworth <Mike.Ounsworth@entrust.com>
To: "acme@ietf.org" <acme@ietf.org>, "Liuchunchi(Peter)" <liuchunchi@huawei.com>
Thread-Topic: ACME discovery drafts looking for an author
Thread-Index: AduZeGev8Rr+K8ZnRvWbWxBdlWpbxgJWbZnAByhIzHA=
Date: Wed, 07 May 2025 17:21:34 +0000
Message-ID: <CH0PR11MB5739BDFD1C0A8F22F81552D39F88A@CH0PR11MB5739.namprd11.prod.outlook.com>
References: <CH0PR11MB57393FF8E15C42DFC79EF6A19FD82@CH0PR11MB5739.namprd11.prod.outlook.com> <52493c2579394eba926ec0129d7aca52@huawei.com>
In-Reply-To: <52493c2579394eba926ec0129d7aca52@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH0PR11MB5739:EE_|DM4PR11MB7352:EE_
x-ms-office365-filtering-correlation-id: 82a2fae9-9088-4875-ddc9-08dd8d8b9de0
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|4022899009|1800799024|8096899003|7053199007|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH0PR11MB5739.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(4022899009)(1800799024)(8096899003)(7053199007)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH0PR11MB5739BDFD1C0A8F22F81552D39F88ACH0PR11MB5739namp_"
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR11MB5739.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 82a2fae9-9088-4875-ddc9-08dd8d8b9de0
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 May 2025 17:21:34.4933 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dKU3WqdiK+lcoNe21DOD1i9gqA976Pxt/+EnEF1qRWd/pdvKuz4kR+V3QBMPgHE7jZr+33QJOo7iDYU0aaUXCBXpRwveUravrU40Ecupx/Q=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB7352
X-Authority-Analysis: v=2.4 cv=Pd7/hjhd c=1 sm=1 tr=0 ts=681b96a2 cx=c_pps a=o9WQ8H7iXVZ6wSn1fOU0uA==:117 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=dt9VzEwgFbYA:10 a=FEbzDYiKvWYA:10 a=48vgC7mUAAAA:8 a=XUe_gMu_AAAA:8 a=M6c-YmAoMH5B6fWAN-MA:9 a=QEXdDO2ut3YA:10 a=yMhMjlubAAAA:8 a=SSmOFEACAAAA:8 a=NZmwOlgS-Q2SEnlVt0IA:9 a=eXJEum2V_S38jebT:21 a=gKO2Hq4RSVkA:10 a=UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=frz4AuCg-hUA:10 a=lqcHg5cX4UMA:10 a=Hyxxk7IO8alR8e2HbrPC:22
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwNTA3MDE1OSBTYWx0ZWRfX6UY5xfgKxPpR WFwxwpR0FkqDGJ9rr1MpfhafGqhnawKjEG6T2mO/EOV05JIO2gGTUN2gF6S14rXPBuskz071EVJ 5LmFGXqgYih6PJ/JS9pWNkQVdl3zhCg9TDeU3Ok95TfbjHyWzd1XWJ42bjbC6qzRclGN8a/s3rj v1cpBLE+sY13sTXaVVnp/0DsXKVGgkxyanac2NDC67Rd0APMTMLrffS110s6r9HSFl34Nd9EvJ6 quSHC1Q4AzvBztewGAOY13soqJLhlswMaDDfcu+78FKZPKWRsks6ZN5TRhM3Lug6t0jiWSlHLqW xgfc/k+ndbJdGif92l7s5fL/e9ZA6zznA8Rj/t5PpTR7kUOiuOGapF9R6XqKueKAOl7v8yTZxxM L5kPHjJm0zXIAaDKT/Me+XiWih6pRJN+jpLI9/RDvWZyjADxY10VzCSUKcFJB+spOWzvFn0Y
X-Proofpoint-ORIG-GUID: 62iSqxF2wWavAPk5V7PKdLTzUEJRktpk
X-Proofpoint-GUID: 62iSqxF2wWavAPk5V7PKdLTzUEJRktpk
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.0.736,FMLib:17.12.80.40 definitions=2025-05-07_05,2025-05-06_01,2025-02-21_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 lowpriorityscore=0 impostorscore=0 adultscore=0 phishscore=0 bulkscore=0 spamscore=0 priorityscore=1501 mlxlogscore=999 mlxscore=0 clxscore=1015 suspectscore=0 classifier=spam authscore=0 authtc=n/a authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.21.0-2504070000 definitions=main-2505070159
Message-ID-Hash: V2DVTIK4RGGADSPEP56363OVY25CYWSQ
X-Message-ID-Hash: V2DVTIK4RGGADSPEP56363OVY25CYWSQ
X-MailFrom: Mike.Ounsworth@entrust.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-acme.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Acme] Re: ACME discovery drafts looking for an author
List-Id: Automated Certificate Management Environment <acme.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/mfBXMTSdQ7g5-fZ0ESs0cA5LT2k>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Owner: <mailto:acme-owner@ietf.org>
List-Post: <mailto:acme@ietf.org>
List-Subscribe: <mailto:acme-join@ietf.org>
List-Unsubscribe: <mailto:acme-leave@ietf.org>

Hey Peter,

Sorry, this email got lost in my post-Bangkok email pile.

I’m not sure that I fully understand your question. It has also been a long time since I put thought into these drafts, so my memory is getting fuzzy.

Can you please expand what you are referring to with this:
“My question is about this "certificate" that needs distribution”





“And what are the required works for it to proceed?”

I believe that the technical content is fairly mature, although there are a few small open issues that should be described in my slides from past ACME meetings. But more importantly, and more time-consuming, is the political consensus-building work: some effort is required to make sure that the big public CAs and ACME client maintainers feel that this document is serving their interests, and need a few cloud providers to give at least neutral statements that they would allow this mechanism to be turned on within their environments.

---
Mike Ounsworth

From: Liuchunchi(Peter) <liuchunchi=40huawei.com@dmarc.ietf.org>
Sent: Tuesday, April 1, 2025 2:22 AM
To: Mike Ounsworth <Mike.Ounsworth@entrust.com>; acme@ietf.org
Subject: [EXTERNAL] RE: ACME discovery drafts looking for an author

If I get it right, you are maintaining a whitelist of authorized clients (via pks) that can request issued certificates from SP/CA. This part is quite clear. My question is about this "certificate" that needs distribution restraining -- is it


If I get it right, you are maintaining a whitelist of authorized clients (via pks) that can request issued certificates from SP/CA. This part is quite clear.



My question is about this "certificate" that needs distribution restraining -- is it the server certificate (of a web)? If it is, I thought it is free to distribute in order to visit the service?



If it does need distribution restraining, the reason I can think of is "private key is also maintained by the SP/CA so they can be used together for third party adversary to spoof my domain". But this becomes more of a private key protection problem...  I think it is interesting work but I am just trying to understand the exact value use case.



And what are the required works for it to proceed?



Peter



> -----Original Message-----

> From: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org<mailto:Mike.Ounsworth=40entrust.com@dmarc.ietf.org>>

> Sent: Thursday, March 20, 2025 5:28 PM

> To: acme@ietf.org<mailto:acme@ietf.org>

> Subject: [Acme] ACME discovery drafts looking for an author

>

> Hi ACME,

>

> As I said during ACME today, I have a pair of (expired) drafts that I can no

> longer continue to put time and effort into. They are looking for a new lead

> author. FREE TO A GOOD HOME!

>

> They are:

>

> draft-vanbrouwershaven-acme-auto-discovery

> draft-vanbrouwershaven-acme-client-discovery

>

> The idea of the drafts is:

>

> acme-auto-discovery:

> What if your website is hosted by a cloud hosting provider and their UI only

> gives you two options for where to get a certificate for your website: A) use

> the CA of the cloud provider's choice over ACME, B) upload a PEM file. The

> first means that you have no ability to manage that certificate, control which

> clients can request that certificates, manage how many copies of that

> certificate get issued, or revoke that certificate. It also becomes very difficult

> to monitor CT logs for abuse of your website since you have no visibility into

> which cert requests were made on your behalf. This also leads to lack of CA

> diversity since many cloud hosters use the same small number of CAs. Option

> B) "upload PEM file" is going to become an extinct species with the push to

> 45-day certificates and beyond. This draft provides a mechanism where you

> can put in your website's CAA DNS record (although maybe SRV would be

> better?) the URL and CA Account info for where you would like the ACME

> client to go to retrieve a cert for your domain.

>

>

> acme-client-discovery:

> If, using the above mechanism, you wish to configure at your CA an allow-list

> of ACME clients that may request certs for your domain, how would you do it?

> The obvious way is to configure an allow-list of ACME Client public keys,

> however a naïve approach here would lock-in keys such that hosting providers

> cannot rotate ACME client keys or add new ACME clients. This draft registers

> a .well-known URI at which a hosting provider can publish the set of public

> keys that belong to its ACME clients. Essentially, a level of abstraction for

> allow-listing ACME clients that may request certificates against your CA

> account.

>

>

> These drafts have had some design team iterations and are fairly mature, but

> will require some effort to get them through adoption and WGLC. If you think

> these problems are worth solving, these drafts can be yours free-of-charge! I

> would be happy to stay on either as a secondary author or document

> shepherd, but I can no longer dedicate time to advancing them.

>

> ---

> Mike Ounsworth

> Software Security Architect, Entrust

>

> Any email and files/attachments transmitted with it are intended solely for

> the use of the individual or entity to whom they are addressed. If this message

> has been sent to you in error, you must not copy, distribute or disclose of the

> information it contains. Please notify Entrust immediately and delete the

> message from your system.

>

> _______________________________________________

> Acme mailing list -- acme@ietf.org<mailto:acme@ietf.org>

> To unsubscribe send an email to acme-leave@ietf.org<mailto:acme-leave@ietf.org>