On Thu, Sep 24, 2015 at 10:03:03AM -0400, Michael Richardson wrote:
> 
> {Tourist warning here}
> 
> Peter Eckersley <[email protected]> wrote:
>     >> > I am OK with dropping the TLS option for "simpleHttp" validations.
>     >> > (We can always make SimpleHTTPS later.)
>     >>
>     >> One annoying implication with dropping the TLS option is that it makes
>     >> it difficult to complete the SimpleHTTP challenge when your HTTP site
>     >> redirects to HTTPS, as best practice dictates.  You'd have to
>     >> special-case an exception to allow the challenge response to be served
>     >> over HTTP (this is annoying to do in Apache).
>     >>
>     >> This isn't a problem if the ACME server follows redirects when
>     >> validating the challenge.  The draft doesn't currently require or
>     >> forbid following redirects, so implementations will probably end up
>     >> doing whatever their HTTP client library does by default.
> 
>     > Boulder does indeed follow redirects, so that's our current plan.
> 
> So, if the verifier follows an HTTP redirect to an HTTPS site (does it even
> have to be same name?), which has a (at that point) bogus certificate, 
> and Boulder can cope with that, when why bother having the SimpleHTTP
> check method at all?
> 
> Why not just always use SimpleHTTPS?

Because it is common for webservers to be configured with HTTPS vhosts
that are a strict subset of the HTTP ones, plus a misallocted
default/wildcard HTTPS vhost that is controlled by the
tenant/hypothetical attacker.

Those vulnerable webservers are unlikely to serve a redirect from HTTP
to HTTPS for the domains that lack a correct HTTPS vhost, however.

-- 
Peter Eckersley                            [email protected]
Chief Computer Scientist          Tel  +1 415 436 9333 x131
Electronic Frontier Foundation    Fax  +1 415 436 9993

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to