Hi,

even better it would be if it does not introduce an new record.
The challenge could be that the user sign an random token + random value from him with an private key.
So CA send (token, challenges[...])
User reply (userToken, SIGNED(token,userToken),publicKey,"tlsa-311")

This has two advantages over the current model:
1) There is no dynamic update required
2) The CA can direct verify the challenge since the user can pre publish the tlsa record. 3) It is not more insecure than any other dns-01, tls-sni-01 or http-01 since if he have controll
over the DNS he can select the ip.
4) It should be compatible with cname.

Gruß Thomas

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to