DNS wildcards are mentioned in 3 sections in RFC8555 (in addition to the IANA 
Considerations section):

1. https://tools.ietf.org/html/rfc8555#section-7.1.3 Order Objects:

   Any identifier of type "dns" in a newOrder request MAY have a
   wildcard domain name as its value.  A wildcard domain name consists
   of a single asterisk character followed by a single full stop
   character ("*.") followed by a domain name as defined for use in the
   Subject Alternate Name Extension by [RFC5280].  An authorization
   returned by the server for a wildcard domain name identifier MUST NOT
   include the asterisk and full stop ("*.") prefix in the authorization
   identifier value.  The returned authorization MUST include the
   optional "wildcard" field, with a value of true.

2. https://tools.ietf.org/html/rfc8555#section-7.1.4 Authorization Objects:
 
   If an
   authorization object conveys authorization for the base domain of a
   newOrder DNS identifier containing a wildcard domain name, then the
   optional authorizations "wildcard" field MUST be present with a value
   of true.       

3. https://tools.ietf.org/html/rfc8555#section-7.4.1 Pre-authorization

   Note that because the identifier in a pre-authorization request is
   the exact identifier to be included in the authorization object, pre-
   authorization cannot be used to authorize issuance of certificates
   containing wildcard domain names.

For the subdomains use case, it looks as if it makes sense to define a 
"parentdomain" boolean flag (or "basedomainname" or similar) to be included in 
the authorization object for a domain that authorizes subdomain certs. The 
relevant CAB guidelines are quoted in 
https://tools.ietf.org/html/draft-friel-acme-subdomains-00#appendix-A.

The authorization object would then explicitly indicate that this is a base 
domain authorization and thus subdomain certs may be issued off this. This is 
conceptually similar to the current "wildcard" flag which indicates that a 
wildcard cert may be issued off the identifier in the object, and would 
definitively differentiate wildcard vs. base domain vs. explicit domain 
authorizations.

Item #3 from section 7.4.1 Pre-authorization is already called out as a 
substantive change from RFC8555: i.e. the identifier in the authorization 
object may be different from the identifier in the newAuthz object.

> -----Original Message-----
> From: Acme <[email protected]> On Behalf Of Salz, Rich
> Sent: 26 November 2019 21:53
> To: [email protected]
> Subject: Re: [Acme] Call for adoption draft-frield-acme-subdomains
> 
> WRONG.  My mistake.
> 
> Please discuss this, especially the subdomains/wildcard issues.  This is 
> *NOT* a
> call for adoption.  We will take this up in Vancouver, IETF 107.
> 
> From: Rich Salz <mailto:[email protected]>
> Date: Tuesday, November 26, 2019 at 4:51 PM
> To: "mailto:[email protected]"; <mailto:[email protected]>
> Subject: [Acme] Call for adoption draft-frield-acme-subdomains
> 
> This email starts a ten-day call for adoption. There was consensus in the 
> room at
> IETF 106 to adopt this as a working group document. If you disagree with that,
> or have any other strong feelings, please post to the list before the end of 
> next
> week.
> Also discussed was the need for some additional clarity around subdomains and
> the existing wildcard challenges.
> 
> Thank you.
> 
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to