>
> Wouldn't it be a lot better not to do the validations at all if you can
> tell at new-order time that you're not going to be willing to issue?


Yes, that would be better in this one capacity. However I don't think it
comes close to justify the scaling issues associated with accepting the CSR
up-front, and as mentioned, there are other reasons why validations may
occur for an order that the CA isn't willing to issue at the time of
finalization.

There also isn't a CAA-PKP so we're bikeshedding about impact on features
that are both unspecified & unimplemented.

- Daniel / cpu

On Mon, Oct 30, 2017 at 3:33 PM, Richard Barnes <r...@ipv.sx> wrote:

>
>
> On Mon, Oct 30, 2017 at 10:15 AM, Daniel McCarney <c...@letsencrypt.org>
> wrote:
>
>> > Example: Suppose that CAA-PKP got added (restrict issuance on SPKI key).
>> Implementing that without knowing the public key at validation time is
>> annoying.
>>
>> Can you expand on "annoying"?
>>
>> It seems completely possible to reject the order finalization message
>> based on a CAA-PKP property.
>>
>
> Wouldn't it be a lot better not to do the validations at all if you can
> tell at new-order time that you're not going to be willing to issue?
>
>
>
>> In-fact, we already have to be rechecking CAA for authorizations
>> validated more than 8 hours ago at the time of issuance so there must be
>> code in place to check CAA at finalization and clients must be prepared for
>> their order to be rejected at finalization based on CAA already.
>>
>> I don't see how this is any more annoying.
>>
>> - cpu
>>
>> On Tue, Oct 24, 2017 at 10:17 AM, Ilari Liusvaara <
>> ilariliusva...@welho.com> wrote:
>>
>>> On Tue, Oct 24, 2017 at 02:45:01PM +0100, Hugo Landau wrote:
>>> >
>>> > The ACME protocol should permit CAs to implement policy as far as is
>>> > reasonably practicable with regard to the workflows around which the
>>> > protocol is organised. Providing the CSR up-front allows the CA to
>>> > predicate order processing on aspects of that CSR, both with regard to
>>> > the present protocol and any future extensions, both now and in the
>>> > future in ways that we can and cannot foresee. I don't think it's
>>> > appropriate to defer giving critical information to the CA until the
>>> > last minute due to a resource utilisation concern which LE has already
>>> > proven capable of dealing with, especially when the whole point of the
>>> > order flow in the first place was to provide more flexibility for CAs
>>> to
>>> > institute policy.
>>>
>>> Example: Suppose that CAA-PKP got added (restrict issuance on SPKI
>>> key). Implementing that without knowing the public key at validation
>>> time is annoying.
>>>
>>> As to why one would want something like that, it would allow limiting
>>> trust on certficiate management system without deploying something as
>>> dangerous as HPKP.
>>>
>>>
>>>
>>> -Ilari
>>>
>>
>>
>> _______________________________________________
>> Acme mailing list
>> Acme@ietf.org
>> https://www.ietf.org/mailman/listinfo/acme
>>
>>
>
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to