[art] Artart last call review of draft-ietf-acme-integrations-12

John Levine via Datatracker <noreply@ietf.org> Wed, 11 January 2023 19:38 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: art@ietf.org
Delivered-To: art@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D0F42C18F801; Wed, 11 Jan 2023 11:38:29 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: John Levine via Datatracker <noreply@ietf.org>
To: art@ietf.org
Cc: acme@ietf.org, draft-ietf-acme-integrations.all@ietf.org, last-call@ietf.org, johnl@taugh.com
X-Test-IDTracker: no
X-IETF-IDTracker: 9.5.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <167346590984.15738.10671454294045880784@ietfa.amsl.com>
Reply-To: John Levine <johnl@taugh.com>
Date: Wed, 11 Jan 2023 11:38:29 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/art/efQ6-4iasbvkX8lCcXKANlxaq4E>
Subject: [art] Artart last call review of draft-ietf-acme-integrations-12
X-BeenThere: art@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Applications and Real-Time Area Discussion <art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/art>, <mailto:art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/art/>
List-Post: <mailto:art@ietf.org>
List-Help: <mailto:art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/art>, <mailto:art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jan 2023 19:38:29 -0000

Reviewer: John Levine
Review result: Ready with Nits

This is the ARTART review for draft-ietf-acme-integrations-12.  

The document is ready with nits.

When reading the review keep in mind that your reviewer has limited
experience with ACME and none with EST, BRKSI, or TEAP.

In each of the four examples, I gather that the servers are already
configured to handle subdomains of example.com, per the second para of
7.5 that says it's an error if a client asks for anything else. This
is likely obvious if you know about EST, BRKSI, and TEAP, but it would
be a kindness to us newbies to note it perhaps just before section 3.

In the four examples, EAP and TEAP have pre-authorization as the first
step, while the two BRSKI ones just say it's complete. It's not clear
whether there's something different about BRKSI pre-auth. If there is,
it would be nice to note why, if not, perhaps the TEAP one could take
it out and say the first step is complete as the BRSKI ones do.  Other
than that, the diagrams are quite clear even though they are long.

In the Security Considerations, it says that it is expected that the
registrar wil use RFC 3007 updates to put records into the DNS. In my
admittedly limited ACME experience, it's more common to use a local
API to talk to whatever is managing the DNS. (I rolled my own API for
my own DNS toaster and acme.sh, because I could.) Is it really limited
to RFC 3007 updates? If not, you might want to reword it more
generally to say it's going to use something to update the DNS, and if
the credentials leak, that would be bad. 

I agree with the advice to limit the name scope of updates, and if
possible the RRTYPEs. My API only lets the ACME client update CAA and
TXT records since that's all ACME needs.