Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D4180


IMPORTANT
S 3.
>      used to refer to fully qualified domain names.  If a ACME server
>      wishes to request proof that a user controls a IPv4 or IPv6 address
>      it MUST create an authorization with the identifier type "ip".  The
>      value field of the identifier MUST contain the textual form of the
>      address as defined in [RFC1123] Section 2.1 for IPv4 and in [RFC4291]
>      Section 2.2 for IPv6.

Are all three variants here valid?


S 4.
>      For the "tls-alpn-01" the subjectAltName extension in the validation
>      certificate MUST contain a single iPAddress which matches the address
>      being validated.  As [RFC6066] does not permit IP addresses to be
>      used in the SNI extension the server MUST instead use the IN-
>      ADDR.ARPA [RFC1034] or IP6.ARPA [RFC3596] reverse mapping of the IP
>      address as the SNI value instead of the literal IP address.

What happens if an attacker forces an incorrect SNI on you here? I
don't see any security analysis below, but I suspect it's bad,


COMMENTS
S 6.
>
>   6.  Security Considerations
>
>      Given the often short delegation periods for IP addresses provided by
>      various service providers CAs MAY want to impose shorter lifetimes
>      for certificates which contain IP identifiers.  They MAY also impose

https://tools.ietf.org/rfcmarkup?doc=6919#section-6

If the WG thinks that providers ought to do this, then it should say
so.
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to