In the current version of the spec, for SimpleHTTPS Validation, the client can specify the path (under .well-known/acme-challenge) where the server should expect to find a copy of the token. The goal as I understand it is to allow a single client to manage multiple pending authorization requests without file collisions. However, I think this adds unnecessary complexity and risk.

Proposal: For the SimpleHTTPS challenge, the client should not provide a path. The server should always fetch .well-known/acme-challenge/<token>.txt, and should expect the contents to equal <token>.

For DVSNI and DNS challenges, the client provides a random string `s', to be hashed with the server's random string `r'. What sort of attack does this protect against? It seems unnecessarily risky to allow the client input into the hash, and leads to some issues like https://github.com/letsencrypt/acme-spec/issues/12.

Proposal: For the DVSNI and DNS challenges, the client should not provide a random string `s', but should directly sign the server's random string `r'.a

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to