[Sandbox-mailoutput] [Django development] Internal WG Review: Automated Certificate Management Environment (acme)

IETF Secretariat <ietf-secretariat-reply@ietf.org> Thu, 18 April 2019 16:42 UTC

Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: sandbox-mailoutput@ietfa.amsl.com
Delivered-To: sandbox-mailoutput@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D4C7120110 for <sandbox-mailoutput@ietfa.amsl.com>; Thu, 18 Apr 2019 09:42:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.108
X-Spam-Level:
X-Spam-Status: No, score=-1.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RDNS_NONE=0.793, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hiykUuDbccMy for <sandbox-mailoutput@ietfa.amsl.com>; Thu, 18 Apr 2019 09:42:34 -0700 (PDT)
Received: from mailtest.ietf.org (unknown [4.31.198.57]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C12AB12036E for <sandbox-mailoutput@ietf.org>; Thu, 18 Apr 2019 09:42:34 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by sandbox.amsl.com (Postfix) with ESMTP id B811F1C53E9 for <sandbox-mailoutput@ietf.org>; Thu, 18 Apr 2019 09:42:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at mailtest.ietf.org
Received: from mailtest.ietf.org ([4.31.198.57]) by localhost (mailtest.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id STqSyIFN2_hE for <sandbox-mailoutput@ietf.org>; Thu, 18 Apr 2019 09:42:32 -0700 (PDT)
Received: from sandbox.amsl.com (localhost [IPv6:::1]) by sandbox.amsl.com (Postfix) with ESMTP id 6B4E21C53E6 for <sandbox-mailoutput@ietf.org>; Thu, 18 Apr 2019 09:42:32 -0700 (PDT)
Content-Type: multipart/mixed; boundary="===============8137585712520856927=="
MIME-Version: 1.0
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
To: sandbox-mailoutput@ietf.org
Message-ID: <155560575239.30722.9838568886689973809.idtracker@sandbox.amsl.com>
Date: Thu, 18 Apr 2019 09:42:32 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sandbox-mailoutput/RguRhr6-gMSW6shoDaup970G9-4>
Subject: [Sandbox-mailoutput] [Django development] Internal WG Review: Automated Certificate Management Environment (acme)
X-BeenThere: sandbox-mailoutput@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <sandbox-mailoutput.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sandbox-mailoutput>, <mailto:sandbox-mailoutput-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sandbox-mailoutput/>
List-Post: <mailto:sandbox-mailoutput@ietf.org>
List-Help: <mailto:sandbox-mailoutput-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sandbox-mailoutput>, <mailto:sandbox-mailoutput-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Apr 2019 16:42:36 -0000

The attached message would have been sent, but the tracker is in development mode.
It was not sent to anybody.

--- Begin Message ---

A new charter for the Automated Certificate Management Environment (acme) WG
in the Security Area of the IETF is being considered.  The draft charter for
this WG is provided below for your review and comment.

Review time is one week.

The IETF Secretariat

Automated Certificate Management Environment (acme)
-----------------------------------------------------------------------
Current status: Active WG

Chairs:
  Yoav Nir <ynir.ietf@gmail.com>
  Rich Salz <rsalz@akamai.com>

Assigned Area Director:
  Roman Danyliw <rdd@cert.org>

Security Area Directors:
  Benjamin Kaduk <kaduk@mit.edu>
  Roman Danyliw <rdd@cert.org>

Mailing list:
  Address: acme@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/acme
  Archive: https://mailarchive.ietf.org/arch/browse/acme/

Charter: https://datatracker.ietf.org/doc/charter-ietf-acme/

Test!

Historically, issuance of certificates for Internet applications
(e.g., web servers) has involved many manual identity validation steps
by the certification authority (CA).  The ACME WG will specify
conventions for automated X.509 certificate management, including
validation of control over an identifier, certificate issuance,
certificate renewal, and certificate revocation.  The initial focus of
the ACME WG will be on domain name certificates (as used by web
servers), but other uses of certificates can be considered as work
progresses.

ACME certificate management must allow the CA to verify, in an
automated manner, that the party requesting a certificate has authority
over the requested identifiers, including the subject and subject
alternative names.  The processing must also confirm that the requesting
party has access to the private key that corresponds to the public key
that will appear in the certificate.  All of the processing must be done
in a manner that is compatible with common service deployment
environments, such as hosting environments.

ACME certificate management must, in an automated manner, allow an
authorized party to request revocation of a certificate.

The ACME working group is specifying ways to automate certificate
issuance, validation, revocation and renewal.  The ACME working
group is not reviewing or producing certificate policies or
practices.

The starting point for ACME WG discussions shall be draft-barnes-acme.

Milestones:


--- End Message ---