Re: [Acme] Mail regarding craft of hash for draft-ietf-acme-dns-account-challenge

Amir Omidi <amir@aaomidi.com> Sat, 03 February 2024 21:18 UTC

Return-Path: <amir@aaomidi.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CB6DC14F68F for <acme@ietfa.amsl.com>; Sat, 3 Feb 2024 13:18:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, WEIRD_PORT=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=aaomidi.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ay2xzi2AFpwI for <acme@ietfa.amsl.com>; Sat, 3 Feb 2024 13:18:37 -0800 (PST)
Received: from mail-ej1-x630.google.com (mail-ej1-x630.google.com [IPv6:2a00:1450:4864:20::630]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5478C14F689 for <acme@ietf.org>; Sat, 3 Feb 2024 13:18:37 -0800 (PST)
Received: by mail-ej1-x630.google.com with SMTP id a640c23a62f3a-a35e65df2d8so430346266b.0 for <acme@ietf.org>; Sat, 03 Feb 2024 13:18:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aaomidi.com; s=google; t=1706995116; x=1707599916; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=4nXfXQFMNIeANFj/5dIW4CYhi8RljzWiqsWnkLWu/bQ=; b=AAhngzEWcynJwrl9Sd3h4LslWFzu2ukFbS3NL3QAQkFA0+e22rz3TrzeZhapskh5y3 z9StMHwbONxquc/00/oi3cXESqAsiChoOUZZCu1NjOeRhvbbXk24fN7NvkVAC0iJrOe4 XNa7lYLT+XlEvIUdEkCMl0/mm2NhUyns+N/gjkGxcZKy5HNQlKjX+yGHbbseo5LLLqKh i2Jvfv9pVi8Z65zPi5//uHQ/0g9bL/wGFKaYQ90EhN5KNR5YUpS12pwamU0fc4UafBuc Wl62Xr1EGqDo2AYONJpHpdnVwE4+DwMHcReow0WkRNPnz4YhIvx8klQW+I31qug4TzTU kIEA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706995116; x=1707599916; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=4nXfXQFMNIeANFj/5dIW4CYhi8RljzWiqsWnkLWu/bQ=; b=WCZPVN9Xd23ygA8+24Wp/hSNnpLAiP97PErhEPdt61oNJ8uafI5kQDybu6Va3bPYy7 ursgXbAWnlIqIje5JobTS+u0A+TfluhmiEny910ksVRy9PCWzGNR9IXHvAVxIyDNg3Ww GN3HrjVc0/01bzNnUDeNCtkBCqHKPBu137n4721WJdCryuQlecF43ZI7Jt0btvsI8Fq5 eDhb3olobGDcaWKVXaPxZKy1b1kQmvM8M9CoxsMSOli2DIxcDOZilWr1Y0f03dQBvo8R ENd/XRfp5JxiDxZquM0JvJEaa1nXGa2DB7g0lNNaUGerMISK8aecec6eAQ6z+oXo1xHa OIWA==
X-Gm-Message-State: AOJu0YyDT8oe0rMMkCM3ZrpD6ad9p6uHJ2ySzxYDTEbht5cJUYFbwXOT C9HtPBx36l11DBleqwdkzCDmUvwMycbu425DKZIk4AjtAAvweTkKVmQQO4n+ZxCpkJKj7IdCMvc 3izz5O8l3YJYWS1Z2/p2FrAoSMYB03roMwwCEdcJFZsw5BlUJ
X-Google-Smtp-Source: AGHT+IGwkPtoJdEUIwp0sjF4i3Y2xYYhvu3KqsAzoV2W90nOQaTCaigxZ9SDEb/GW7fGvHsBP8FKG2Yi/+0iyranIJE=
X-Received: by 2002:a17:906:24cf:b0:a35:6667:b3ed with SMTP id f15-20020a17090624cf00b00a356667b3edmr4203479ejb.8.1706995115446; Sat, 03 Feb 2024 13:18:35 -0800 (PST)
MIME-Version: 1.0
References: <31b872f6-2ced-41b3-b22c-58ae89058570@gmail.com> <CAOG=JULrdnk4wYBKB-pfY4kXK=fF=ODi6PZ3wEj=zn7B4=nZXQ@mail.gmail.com> <ab7caac8-52b8-4416-9083-fe8533d51ec4@gmail.com>
In-Reply-To: <ab7caac8-52b8-4416-9083-fe8533d51ec4@gmail.com>
From: Amir Omidi <amir@aaomidi.com>
Date: Sat, 03 Feb 2024 16:18:23 -0500
Message-ID: <CAOG=JUJvhTfN8b_giddEN0wH+3mf2Fh0j6FNij=qg=AXj+zzSA@mail.gmail.com>
To: Seo Suchan <tjtncks@gmail.com>
Cc: acme@ietf.org
Content-Type: multipart/alternative; boundary="0000000000007d6d75061080c522"
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/xPdkAG39GHS2HCYAg2byRJTjMVo>
Subject: Re: [Acme] Mail regarding craft of hash for draft-ietf-acme-dns-account-challenge
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Feb 2024 21:18:42 -0000

No, the accountURL/URI that new-account returns is the only authoritative
path. I'll make sure that it is spelled out in the RFC. If an acme client
has an account key, it can use the method described here:
https://datatracker.ietf.org/doc/html/rfc8555#section-7.3.1 to find the
accountURL for that account.

Since ACME does not define "what the ID part of an accountURL is", I'm much
more inclined on just keeping the entire accountURL as the ID to be hashed
for the challenge label.

On Sat, Feb 3, 2024 at 3:59 AM Seo Suchan <tjtncks@gmail.com> wrote:

> if it's stable but has multiple valid path (ex: acme-v1.ca.com and
> acme-v2.ca.com) , would server need try for both subdomain and lookup
> every possible valid path?
> 2024-02-03 오전 1:35에 Amir Omidi 이(가) 쓴 글:
>
> From my understanding, under ACME we treat that entire accountURL as the
> userID. So I think that URL will need to be stable.
>
> On Fri, Feb 2, 2024 at 2:36 AM Seo Suchan <tjtncks@gmail.com> wrote:
>
>> for some ACME servers they have multiple allowed acme endpoint domains,
>> and server doesn't know what domain name client used to access its API
>> duce don't have full accounturl that used to craft challenge subdomain:
>>
>> like boulder (what Let's encrypt uses) allows to accessed from mulitple
>> path ex:
>>
>> "accountURIPrefixes": [
>> "http://boulder.service.consul:4000/acme/reg/",
>> "http://boulder.service.consul:4001/acme/acct/"
>>          ]
>>
>>   , and pebble and smallstep do not have host in config but allow any ip
>> or domain pointed to them and reflect them to create link to
>> account/order/ect
>>
>> would only using userid part of accountURL (ExampleAccount) from
>> https://example.com/acme/acct/ExampleAccount have problem? while it's
>> trivial to extract from hash to accounturl as accountID was
>> autoincrementing counter, but was there are so few large acme provider
>> it was trivial to make rainbow table anyway.
>>
>> _______________________________________________
>> Acme mailing list
>> Acme@ietf.org
>> https://www.ietf.org/mailman/listinfo/acme
>>
>