while it's blunt tool current CAA issuewild record with whiltelist accounturi would able to do that, as issuewild overides issue.

2023-10-04 오후 4:59에 Q Misell 이(가) 쓴 글:
Regardless of the inclusion of that paragraph in the BR I still think it would be worthwhile to be able to limit a DNS based validation to not issuing wildcards, should an admin so desire.
------------------------------------------------------------------------

Any statements contained in this email are personal to the author and are not necessarily the statements of the company unless specifically stated. AS207960 Cyfyngedig, having a registered office at 13 Pen-y-lan Terrace, Caerdydd, Cymru, CF23 9EU, trading as Glauca Digital, is a company registered in Wales under № 12417574 <https://e.as207960.net/w4bdyj/Tuxjr0hL>, LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876 <https://e.as207960.net/w4bdyj/w06IBwih>. UK VAT №: GB378323867. EU VAT №: EU372013983. Turkish VAT №: 0861333524. South Korean VAT №: 522-80-03080. AS207960 Ewrop OÜ, having a registered office at Lääne-Viru maakond, Tapa vald, Porkuni küla, Lossi tn 1, 46001, trading as Glauca Digital, is a company registered in Estonia under № 16755226. Estonian VAT №: EE102625532. Glauca Digital and the Glauca logo are registered trademarks in the UK, under № UK00003718474 and № UK00003718468, respectively.



On Tue, 3 Oct 2023 at 20:04, Seo Suchan <[email protected]> wrote:

    Because CA/B baseline DNS Change auth have this paragraph, I think
    DNS admin should consider any DNS record there to be valid for
    wildcard.

    Note: Once the FQDN has been validated using this method, the CA
    MAY also issue Certificates for
    other FQDNs that end with all the Domain Labels of the validated
    FQDN. This method is suitable
    for validating Wildcard Domain Names.

    2023-10-03 오후 10:31에 Erik Nygren 이(가) 쓴 글:
    Within draft-ietf-dnsop-domain-verification-techniques
    <https://e.as207960.net/w4bdyj/KvYIoLDG> there is considerable
    discussion about the risks associated with DNS DCV records (such
    as ACME DNS-01) not being clear in the record about whether the
    scope applies to just a single hostname (example.com
    <https://e.as207960.net/w4bdyj/qLxR85iE>) or to a wildcard
    (*.example.com <https://e.as207960.net/w4bdyj/tcl3DZPh>). While
    DNS-01 has this within the token, the DNS TXT record itself only
    includes a hash of the token making this hard for a DNS admin to
    validate.

    We have a proposed change to use distinct labels for different
    scopes.  For example:

    * "`_acme-host-challenge.example.com
    <https://e.as207960.net/w4bdyj/JpqJjdxE>`" applies only to the
    specific host name of "example.com
    <https://e.as207960.net/w4bdyj/oHE7qkwz>" and not to anything
    underneath it.
    * "`_acme-wildcard-challenge.example.com
    <https://e.as207960.net/w4bdyj/xVMcJdIL>`" applies to all host
    names at the level immediately underneath "example.com
    <https://e.as207960.net/w4bdyj/K9ajyGUJ>". For example, it would
    apply to "foo.example.com
    <https://e.as207960.net/w4bdyj/t7IJuCyq>" but not "example.com
    <https://e.as207960.net/w4bdyj/zyBITmRO>" nor
    "quux.bar.example.com <https://e.as207960.net/w4bdyj/wvu0juZp>".
    In the ACME context this would be for *.example.com
    <https://e.as207960.net/w4bdyj/oirLEOAx>.

    Pull request for this is here:

    <http://goog_1991325217>
    
https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-domain-verification-techniques/pull/90/files
    <https://e.as207960.net/w4bdyj/awm4ssbi>

    What is the sense of the ACME WG on if this would make sense?
    Roll-out would presumably take quite some time so both would need
    to keep working.

    I'd suggest that it may make sense to incorporate as part of
    draft-ietf-acme-dns-account-challenge since the roll-out for both
    would likely follow a similar pattern.  In that case I'd proposed
    that we'd replace the "-account" in that draft with a
    specification to use either "-host" or "-wildcard" depending on
    scope. (That might also mean expanding the title of that draft.)

    There's also a scope of the domain and its subdomains, covering
    example.com <https://e.as207960.net/w4bdyj/LVqv0vTq>,
    *.example.com <https://e.as207960.net/w4bdyj/cV3n3pfP>,
    *.*.example.com <https://e.as207960.net/w4bdyj/xHJHAQvD>,
    *.{...}.example.com <https://e.as207960.net/w4bdyj/gnFjNtwj>,
    etc, but this isn't something specified by ACME due to the
    semantics of wilcards X509 certs.

        Erik


    _______________________________________________

    Acme mailing list

    [email protected]

    https://www.ietf.org/mailman/listinfo/acme  
<https://e.as207960.net/w4bdyj/eLTGHv1V>

    _______________________________________________
    Acme mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/acme
    <https://e.as207960.net/w4bdyj/cbz6pd9N>
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to