On Mon, Jan 22, 2018 at 05:09:53PM -0800, Jacob Hoffman-Andrews wrote:
> 
> To fix that, the CA could assist the user by providing narrowly-scoped
> DNS hosting: It would serve only TXT records used in validating DNS
> challenges. The CA instruct subscribers to delegate the _acme-challenge
> subdomain to a subdomain of the CA's hosted DNS domain. For instance, if
> a subscriber has account number 1234, the CA would say: Please deploy a
> CNAME record like so:
> 
> _acme-challenge.example.com. CNAME 1234.challenges.ca.example.net.
> 
> The assisted-dns-01 challenge would then be validated like dns-01,
> except: As the first step in validation, the CA would deploy the
> expected TXT value at 1234.challenges.ca.example.net. Then the CA would
> continue to look up "TXT _acme-challenge.example.com." In a way,
> fetching final TXT record would be a formality: the CA could in theory
> stop once it saw the CNAME pointed at the right location, though most
> likely abiding by the terms of the BRs would require following the
> formal lookup steps.
> 
> This challenge has the big advantage that subscribers only need to do a
> one-time CNAME setup, and renewals can be reliably automated without
> requiring that renewing systems have permission to update DNS. In
> effect, the CNAME record would act like a long-term delegation
> permitting the CA to issue continuously for the base domain.

I came up with very similar method when trying to figure out how the
Amazon Certificate Manager DNS challenge works. It has similar
"standing authentication" property, and yet needs to comply with the
BRs.



-Ilari
 

_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to