Any comments on this email on how to explicitly distinguish between wildcard 
and subdomain authorizations, which hopefully addresses ekr's mic comments.


> -----Original Message-----
> From: Acme <[email protected]> On Behalf Of Owen Friel (ofriel)
> Sent: 26 November 2019 22:51
> To: Salz, Rich <[email protected]>; [email protected]
> Subject: Re: [Acme] Call for adoption draft-frield-acme-subdomains
> 
> DNS wildcards are mentioned in 3 sections in RFC8555 (in addition to the IANA
> Considerations section):
> 
> 1. https://tools.ietf.org/html/rfc8555#section-7.1.3 Order Objects:
> 
>    Any identifier of type "dns" in a newOrder request MAY have a
>    wildcard domain name as its value.  A wildcard domain name consists
>    of a single asterisk character followed by a single full stop
>    character ("*.") followed by a domain name as defined for use in the
>    Subject Alternate Name Extension by [RFC5280].  An authorization
>    returned by the server for a wildcard domain name identifier MUST NOT
>    include the asterisk and full stop ("*.") prefix in the authorization
>    identifier value.  The returned authorization MUST include the
>    optional "wildcard" field, with a value of true.
> 
> 2. https://tools.ietf.org/html/rfc8555#section-7.1.4 Authorization Objects:
> 
>    If an
>    authorization object conveys authorization for the base domain of a
>    newOrder DNS identifier containing a wildcard domain name, then the
>    optional authorizations "wildcard" field MUST be present with a value
>    of true.
> 
> 3. https://tools.ietf.org/html/rfc8555#section-7.4.1 Pre-authorization
> 
>    Note that because the identifier in a pre-authorization request is
>    the exact identifier to be included in the authorization object, pre-
>    authorization cannot be used to authorize issuance of certificates
>    containing wildcard domain names.
> 
> For the subdomains use case, it looks as if it makes sense to define a
> "parentdomain" boolean flag (or "basedomainname" or similar) to be included in
> the authorization object for a domain that authorizes subdomain certs. The
> relevant CAB guidelines are quoted in https://tools.ietf.org/html/draft-friel-
> acme-subdomains-00#appendix-A.
> 
> The authorization object would then explicitly indicate that this is a base 
> domain
> authorization and thus subdomain certs may be issued off this. This is
> conceptually similar to the current "wildcard" flag which indicates that a
> wildcard cert may be issued off the identifier in the object, and would
> definitively differentiate wildcard vs. base domain vs. explicit domain
> authorizations.
> 
> Item #3 from section 7.4.1 Pre-authorization is already called out as a
> substantive change from RFC8555: i.e. the identifier in the authorization 
> object
> may be different from the identifier in the newAuthz object.
> 
> > -----Original Message-----
> > From: Acme <[email protected]> On Behalf Of Salz, Rich
> > Sent: 26 November 2019 21:53
> > To: [email protected]
> > Subject: Re: [Acme] Call for adoption draft-frield-acme-subdomains
> >
> > WRONG.  My mistake.
> >
> > Please discuss this, especially the subdomains/wildcard issues.  This
> > is *NOT* a call for adoption.  We will take this up in Vancouver, IETF 107.
> >
> > From: Rich Salz <mailto:[email protected]>
> > Date: Tuesday, November 26, 2019 at 4:51 PM
> > To: "mailto:[email protected]"; <mailto:[email protected]>
> > Subject: [Acme] Call for adoption draft-frield-acme-subdomains
> >
> > This email starts a ten-day call for adoption. There was consensus in
> > the room at IETF 106 to adopt this as a working group document. If you
> > disagree with that, or have any other strong feelings, please post to
> > the list before the end of next week.
> > Also discussed was the need for some additional clarity around
> > subdomains and the existing wildcard challenges.
> >
> > Thank you.
> >
> _______________________________________________
> Acme mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/acme
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to