On Thu, Jan 18, 2018 at 4:14 PM, J.C. Jones via dev-security-policy < [email protected]> wrote:
> As one of the authors of 3.2.2.4.10, Alex's logic is exactly how we walked > through it in the Validation Working Group. The ADN lookup is DNS, and what > you find when you connect there via TLS, within the certificate, should be > the random value (somewhere). 3.2.2.4.10 was written to permit ACME's > TLS-SNI-01 while being generic enough to permit CAs to accomplish the same > general validation structure without following the ACME-specified > algorithm. > > J.C. I would presume that the CABforum would be the place to explore further details, but it seems that the specifications for the #10 method should be reexamined as to what assurances they actually provide with a view to revising those specifications. At least 1 CA so far has found that the real world experience of a (presumably) compliant application of method #10 as it exists today was deficient in mitigating the provision of certificates to incorrect/unauthorized parties. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

