Re: [Acme] Assisted DNS, freshness tokens, and BR validation methods

2018-01-23 Thread Matthew D. Hardeman
Note as a further point of clarification: there may be more ease in the CNAME delegation method, most especially because mutations on the target zone name are possible in a way that the NS delegations could not accommodate. i.e - _acme-challenge.label-to-validate.example.com CNAME _acme-chall

Re: [Acme] Assisted DNS, freshness tokens, and BR validation methods

2018-01-23 Thread Matthew D. Hardeman
Whoops - quickie fix on this: It’s been a long day. Update permission to the dynamic DNS zone that is being delegated to should be bound to the account key that has most recently demonstrated control of the same label, such as via a one-time DNS-01 challenge to set up the delegation. Anyone s

Re: [Acme] Assisted DNS, freshness tokens, and BR validation methods

2018-01-23 Thread Matthew D. Hardeman
Allow me to throw in a twist which might more tighten the academic discussion over whether a static CNAME for a TXT record to a special zone at a CA (or other third party), over which dynamic updates to the CNAM target are available. The opposition seems to be that chasing the CNAME to the other

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Thomas Lußnig
But there is one difference between the two proves. 1) DNS-01 : Prove is with TXT record is that you have current DNS access 2) CNAME : Prove that you have once DNS access and now Account Key access And here is no difference to the idea to publish account key via TXT record. Both prove one time d

[Acme] Assisted DNS, freshness tokens, and BR validation methods

2018-01-23 Thread Jacob Hoffman-Andrews
[Starting a new thread for this particular fork of the conversation] Thanks for the input, Tim! As a member of the CA/Browser Forum Validation Working Group, and a big contributor to the BR validation methods, your perspective on this is particularly helpful. On 01/23/2018 08:37 AM, Tim Hollebeek

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Tim Hollebeek
It doesn't matter if lookups chase CNAMEs, because the answer has to include a cryptographically secure random number that was created especially for that particular validation and was not used in previous validations, in order to be compliant with the BRs. Your arbitrary computable impure functi

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Ilari Liusvaara
On Tue, Jan 23, 2018 at 07:53:12PM +, Tim Hollebeek wrote: > > > Oh, and the method very similar to the propose one (involving static CNAME > > as > > persistent authentication) is being used in the wild. And due to > > fundamential > > nature of DNS, even static zone can result variable res

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Tim Hollebeek
> Oh, and the method very similar to the propose one (involving static CNAME > as > persistent authentication) is being used in the wild. And due to > fundamential > nature of DNS, even static zone can result variable results for names under > the > zone. By who? I don't think it's possible f

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Ilari Liusvaara
On Tue, Jan 23, 2018 at 05:03:37PM +, Tim Hollebeek wrote: > No, the BRs codify requirements, not security goals. The Mozilla root program > requires all CAs to comply with the baseline requirements at all times. > > Something similar to PCI/DSS compensating controls existed as Method 11 in >

[Acme] whois data for validation

2018-01-23 Thread Jim Reid
> On 23 Jan 2018, at 16:50, Sebastian Nielsen wrote: > > I think that it could be acceptable to "reuse" an old validation provided > WHOIS is checked right? As a general rule, relying on the accuracy of whois data for *anything* is remarkably stupid. Some registries try hard to publish accu

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Tim Hollebeek
No, the BRs codify requirements, not security goals. The Mozilla root program requires all CAs to comply with the baseline requirements at all times. Something similar to PCI/DSS compensating controls existed as Method 11 in the BRs previously. It was removed last year in favor of explicit requi

Re: [Acme] Assisted-DNS challenge type [invalid signature!] [invalid signature!]

2018-01-23 Thread Sebastian Nielsen
I have seen the BR, and what I understand, the purpose of BRs are to provide a specific security goal. In this case, to prevent someone from aquiring control of a domain, and then subsuquently, after losing control of said domain, being able to still renew and reissue certificates for said domai

Re: [Acme] Assisted-DNS challenge type [invalid signature!]

2018-01-23 Thread Tim Hollebeek
> I think that it could be acceptable to "reuse" an old validation provided > WHOIS > is checked right? > Eg, if a hash is made of all the WHOIS data, and all the WHOIS data stays > identical from last validation, then theres proof that control of domain has > not > shifted in the meantime, which

Re: [Acme] Assisted-DNS challenge type [invalid signature!]

2018-01-23 Thread Sebastian Nielsen
I think that it could be acceptable to "reuse" an old validation provided WHOIS is checked right? Eg, if a hash is made of all the WHOIS data, and all the WHOIS data stays identical from last validation, then theres proof that control of domain has not shifted in the meantime, which is the main

Re: [Acme] Assisted-DNS challenge type

2018-01-23 Thread Thomas Lußnig
Yes and if you avoid the random token in the primary location, you can use the public account key announced in the dns also as static prove. On 1/23/2018 5:37 PM, Tim Hollebeek wrote: Your proposed method defeats one of the goals of the BR domain control validation requirements, which is to d

Re: [Acme] Assisted-DNS challenge type

2018-01-23 Thread Tim Hollebeek
> This challenge has the big advantage that subscribers only need to do a one- > time CNAME setup, and renewals can be reliably automated without requiring > that renewing systems have permission to update DNS. In effect, the CNAME > record would act like a long-term delegation permitting the CA to

Re: [Acme] Removing TLS-SNI-02, plans for continuation of last-call

2018-01-23 Thread Daniel McCarney
Only positive responses were noted and the discussion period Rich mentioned has passed so I've merged https://github.com/ietf-wg-acme/acme/pull/390 Thanks all, - Daniel / cpu On Fri, Jan 12, 2018 at 1:29 PM, Daniel McCarney wrote: > This removes the "tls" error. I do not think this is appropri

Re: [Acme] Assisted-DNS challenge type

2018-01-23 Thread Jörn Heissler
On Tue, Jan 23, 2018 at 10:12:39 +0100, Thomas Lußnig wrote: > instead of an FIXED cname that does not ensure that the requestor possess > access to the dns. > I would prefer to use an static TXT record whith the Account Key hashed. > This would prove that > only an person possesing an specified pr

Re: [Acme] Assisted-DNS challenge type

2018-01-23 Thread Thomas Lußnig
Hi, instead of an FIXED cname that does not ensure that the requestor possess access to the dns. I would prefer to use an static TXT record whith the Account Key hashed. This would prove that only an person possesing an specified private key is allowed to request. Or to use TLSA record to veri

Re: [Acme] Assisted-DNS challenge type

2018-01-23 Thread Niklas Keller
2018-01-23 8:09 GMT+01:00 Ilari Liusvaara : > On Mon, Jan 22, 2018 at 05:09:53PM -0800, Jacob Hoffman-Andrews wrote: > > > > To fix that, the CA could assist the user by providing narrowly-scoped > > DNS hosting: It would serve only TXT records used in validating DNS > > challenges. The CA instruc