Good day,

I’m new to this so, if the comment is not appropriate I’m sorry.

I do know of use case where the wild card certificate is requested as a way for 
a domain owner to have SSL protection for all his current and future sub domain 
without having any intention to actually host a wildcard http server but 
numerous specific subdomain. 

It may event sure this is a good idea as this will expose, at least during the 
authentication phase, a web service to have the load of any miswritten 
subdomain web activity.

I’m not sure if access to a specific http subdomain could be an effective way 
to demonstrate effective full domain controls. 

For exemple, let say (no idea if this is active somewhere) a well know 
organisation have a wildcard dns setting that goes to a subcontractor to catch 
all mis label subdomain entry, this does not mean the subcontractor http 
services has the authority to have a wildcard. (Let imagine a bank that want to 
monitor miss label sub-domain).

Thomas-Louis Laforest

> Le 24 janv. 2018 à 16:58, Hugo Leisink <[email protected]> a écrit :
> 
> Hi,
> 
> While implementing ACMEv2 for Let's Encrypt, I noticed that wildcard
> certificates can only be obtained via dns-01. Because it's not possible
> for me to do that automatically, I proposed them a way to do it via
> http-01. After they said that 'it might work', they told me to contact
> you about this.
> 
> My idea is that when a client requests a wildcard certificate
> (*.domain.tld), the CA server offers a challenge and requests that
> challenge via HTTP while using a random hostname (<long random
> string>.domain.tld). Because only a webserver with a website configured
> for *.domain.tld and with a properly configured DNS can respond to this
> challenge, it's enough proof that the request for a wildcard certificate
> is valid. Perhaps the CA server can do multiple requests with a new
> randomly chosen hostname for more proof. After all, they will all end up
> at the same website.
> 
> The discussion about this at the Let's Encrypt forum can be found here:
> https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcommunity.letsencrypt.org%2Ft%2Fwildcard-certificates-via-http-01%2F51223&data=02%7C01%7C%7C483c89afae754bcc814808d56375907e%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636524278950348118&sdata=bfdowfZL%2F7Mh3VHAK3KI3KZPVwzaILBvVc9O%2BtnGwq0%3D&reserved=0
> 
> I really like to hear your thoughts about this.
> 
> Kind regards,
> Hugo Leisink
> 
> 
> _______________________________________________
> Acme mailing list
> [email protected]
> https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Facme&data=02%7C01%7C%7C483c89afae754bcc814808d56375907e%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636524278950348118&sdata=embcPP7vMGE%2FWEng4QrFi%2FP5hLYH0QB95EyzaIL73HI%3D&reserved=0
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to