Re: [Acme] Fwd: FW: New Version Notification for draft-moriarty-acme-client-01.txt

Thomas Peterson <nosretep.samoht@gmail.com> Thu, 30 May 2019 17:58 UTC

Return-Path: <nosretep.samoht@gmail.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55BFD12019C for <acme@ietfa.amsl.com>; Thu, 30 May 2019 10:58:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u8cqpM7iBAC1 for <acme@ietfa.amsl.com>; Thu, 30 May 2019 10:58:38 -0700 (PDT)
Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8810120135 for <acme@ietf.org>; Thu, 30 May 2019 10:58:37 -0700 (PDT)
Received: by mail-wr1-x435.google.com with SMTP id f8so4807285wrt.1 for <acme@ietf.org>; Thu, 30 May 2019 10:58:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=8mSQbht9vn6nz5xqsdHoXI2QO4n27GxuwYOFug6/zus=; b=rlmju+cWlXIuUTooU/FQ7LUz5xlna9r+s3pXNlL05AFiFvhOEVVoazM0CstCDbjlhn vxXtBTuOqiw7BR41XQBouvmfWxeqGJB1kEdj9psXQfNh4WEbevzeUuoEQfI8umeGdh0j tRW+WaQeun80Zn69BY/XmKti6fM2lKlRymoJI6gfj95c+Sp4rBeuu7klNhWmk8wB0VI4 3uUBSkjTjb4/DrqlM2K1pgamdso27mm4XDafsmi70wS0rtjaQc/KpzH7v6e0eUnSqBkl 5rqcGtsBQCPXqY21/+otUdrKTBQ7kmKjRqUjnaVeK0kI4lCEzh7VzWjmkHEblTm3BP0z vvWg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=8mSQbht9vn6nz5xqsdHoXI2QO4n27GxuwYOFug6/zus=; b=iHC5Z6IBkDh1GQaQGGVjEsprBWNXjBoN9k3cmhfWmxPmO+fWyi8kPV8jJtSGNrVw7v 5fKB+f175QqOEXSdj0qWtpIifkLsGNSoLrZumLCdLzLQlUYMrj6CwWCJrEgffNI3SyQS CHMMjYvYI42lN8PiPalaO07W2KTw/uf474bTnSxvNkxP3i+XnNw6ig6gtsv+0YnS+Zqc SAV4qUxwqxg14+KtYd2SalTxf9vQTkeFEpSWocNUho7WvhBeVN56uxUu6x2OcpSkIMGv XirtpzwAOfr+Kp5/oNTReSzupXLck3px5OqR0RbtVrmuf42YvitN3r40H9alKy5HVOfZ 80Ug==
X-Gm-Message-State: APjAAAXy0z8b5jM9ofxnHzOPUQE7VVlETpdCindgfLjdfu7i6jIwxTa3 HjWPB9A7vWIkxlb8Oe+NIUqymF6M
X-Google-Smtp-Source: APXvYqz8ZSS2BPKahNl7R+xx4ybw7qp7Ndq0T9vKCrUJfH9nVjK4U1XfGRzAIMLoLslAxcRU0TA/nA==
X-Received: by 2002:adf:b688:: with SMTP id j8mr3346001wre.238.1559239115629; Thu, 30 May 2019 10:58:35 -0700 (PDT)
Received: from ?IPv6:2a02:c7f:63f:ed00:b4bc:d13f:b58a:c6a2? ([2a02:c7f:63f:ed00:b4bc:d13f:b58a:c6a2]) by smtp.gmail.com with ESMTPSA id v8sm2071174wrt.47.2019.05.30.10.58.34 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Thu, 30 May 2019 10:58:34 -0700 (PDT)
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, IETF ACME <acme@ietf.org>
References: <155922888258.22086.14603097533902177061.idtracker@ietfa.amsl.com> <E8CEA61867EF1E4A9BD05D64D74F76B250F0CD17@MX307CL02.corp.emc.com> <CAHbuEH6mT3pSZe1wtpztc08f4y4snkb=HH+b4km+-YcpqrYVQA@mail.gmail.com>
From: Thomas Peterson <nosretep.samoht@gmail.com>
Message-ID: <dffb6631-26c0-e6c8-a0d1-1d76e9def864@gmail.com>
Date: Thu, 30 May 2019 18:58:33 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) Gecko/20100101 Thunderbird/67.0
MIME-Version: 1.0
In-Reply-To: <CAHbuEH6mT3pSZe1wtpztc08f4y4snkb=HH+b4km+-YcpqrYVQA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/r2jvqFlM7FsiEq9hpK-e9xn4cg8>
Subject: Re: [Acme] Fwd: FW: New Version Notification for draft-moriarty-acme-client-01.txt
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 17:58:40 -0000

Thanks for the new version of this draft. To address some of the points 
raised within in:

 > Section 5, CodeSigning Certificates
 > ... is it worth defining SMS and email for the challenge?

Not exclusively, and given current trends to steer away from using SMS 
for similar uses (notably 2FA) I would recommend omitting SMS completely.

 > Section 7.1 One Time Password (OTP)

Could this not make direct reference to RFC 4226 and RFC 6238? Both are 
quite widely deployed, existing standards.

Regards

On 30/05/2019 16:33, Kathleen Moriarty wrote:
> 
> Hello,
> 
> Thanks to those of you that provided feedback at the last meeting.  I 
> worked a little more on this draft and filled in what I thought might be 
> viable options for challenge types for end users, both for client and 
> code signing certificates.  If these are/are not helpful or more are 
> needed. that feedback would be helpful as well.
> 
> I also posted the start of an overview document that is helpful may be 
> expanded.
> https://tools.ietf.org/html/draft-moriarty-acme-overview-00
> This took some of the content from the original client draft, making it 
> informational only.
> 
> Owen Friel and Rifaat Shekh-Yusef are diligently working on device 
> certificates and hopefully will have an update soon too.  The above 
> draft intentionally leaves those out as a result wile they work through 
> use cases and possibilities.
> 
> Thank you,
> Kathleen
> 
> -----Original Message-----
> From: internet-drafts@ietf.org <mailto:internet-drafts@ietf.org> 
> [mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>]
> Sent: Thursday, May 30, 2019 11:08 AM
> To: Moriarty, Kathleen; Moriarty, Kathleen
> Subject: New Version Notification for draft-moriarty-acme-client-01.txt
> 
> 
> [EXTERNAL EMAIL]
> 
> 
> A new version of I-D, draft-moriarty-acme-client-01.txt
> has been successfully submitted by Kathleen M. Moriarty and posted to the
> IETF repository.
> 
> Name:           draft-moriarty-acme-client
> Revision:       01
> Title:          ACME End User Client and Code Signing Certificates
> Document date:  2019-05-30
> Group:          Individual Submission
> Pages:          14
> URL: https://www.ietf.org/internet-drafts/draft-moriarty-acme-client-01.txt
> Status: https://datatracker.ietf.org/doc/draft-moriarty-acme-client/
> Htmlized: https://tools.ietf.org/html/draft-moriarty-acme-client-01
> Htmlized: https://datatracker.ietf.org/doc/html/draft-moriarty-acme-client
> Diff: https://www.ietf.org/rfcdiff?url2=draft-moriarty-acme-client-01
> 
> Abstract:
>     Automated Certificate Management Environment (ACME) core protocol
>     addresses the use case of web server certificates for TLS.  This
>     document extends the ACME protocol to support end user client, device
>     client, and code signing certificates.
> 
> 
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org 
> <http://tools.ietf.org>.
> 
> The IETF Secretariat
> 
> 
> 
> -- 
> 
> Best regards,
> Kathleen
> 
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme
>