Hi,

what about this idee for dns based authorization ?

1) Take the Publickey of the Account and build the SHA-1 of if. (Mable later SHA-256) 2) Create an Textrecord sha1-dns-02-acme-challenge for domain with the Base64 content of the hash.
sha1-dns-02-acme-challenge.example.com. 300 IN TXT "gfj9Xq...Rg85nM"

Improvements above dns-01:
a) It allow Wildcard entries so that the user does not need to change the dns for each fqdn.
b) As long as the account key is the same the approval is the same.

This is analogue to placing an html page containing an authorization token into the webserver like google use is for webmaster info access. We do not need the random factor to prevent replay. As long as we bind the authorization to the account key.

With the system i described above the challenge that fulfil the random request is:

The certificate requester must prove that he own the private key for the public key that he announced in the DNS record. To prove this the CA send an random 128bit token to the requester that is send back as jwk signed with the matching private key for the DNS record containing the token from the challenge.

Gruß Thomas Lußnig

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to