Re: [Acme] Do we need/want mandatory-to-implement signature algorithms?

2018-05-30 Thread Stephen Farrell
Hi Russ, On 30/05/18 22:31, Russ Housley wrote: > It seems to me that ACME is being used to support certificate > enrollment for many different applications, so the same approach > seems appropriate. I agree with your description of the past:-) I don't agree with not specifying MTI algs though.

Re: [Acme] Do we need/want mandatory-to-implement signature algorithms?

2018-05-30 Thread Russ Housley
> On May 30, 2018, at 3:54 PM, Salz, Rich > wrote: > > Yes, please ask. If I'm going to tell the IESG that no MTI is needed, I want > to tell them that the WG had consensus. > > This came up in the “AD review” thread that many of you have probably just > seen and skimmed or ignored. :) >

Re: [Acme] I-D Action: draft-ietf-acme-tls-alpn-01.txt

2018-05-30 Thread Roland Bracewell Shoemaker
Various editorial changes and cleanups, mainly looking to clarify the Security Considerations/Design Rationale sections. The one technical change here is removing references to keyAuthorization in the challenge update step as this no longer happens in the ACME draft. > On May 30, 2018, at 2:07

[Acme] I-D Action: draft-ietf-acme-tls-alpn-01.txt

2018-05-30 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Automated Certificate Management Environment WG of the IETF. Title : ACME TLS ALPN Challenge Extension Author : Roland Bracewell Shoemaker

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Daniel McCarney
> > We have multiple CA’s that support it, and other implementations as well. Of the multiple CAs that support ACME, which support something resembling the current draft? When I looked last the non-Let's Encrypt ACME server implementations all seemed to be targeting Certbot and the "ACMEv1" era

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Salz, Rich
* The reason I chose those values is because you're already tied to TLS for the communications and therefore you necessarily have the TLS MTI cipher suites, which means you already have those algorithms. If your toolkit exposes it. If your toolkit is a black box or scripted such as CURL,

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Eric Rescorla
On Wed, May 30, 2018 at 12:56 PM, Salz, Rich wrote: > >- Well, we have a fair bit of experience of a lot of people talking to >Let's Encrypt. That's not really the same as a lot of servers and a lot of >clients. > > > > We have multiple CA’s that support it, and other implementations

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Salz, Rich
* Well, we have a fair bit of experience of a lot of people talking to Let's Encrypt. That's not really the same as a lot of servers and a lot of clients. We have multiple CA’s that support it, and other implementations as well. Certainly LE dominates, but it’s not the only usage. And

[Acme] Do we need/want mandatory-to-implement signature algorithms?

2018-05-30 Thread Salz, Rich
* Yes, please ask. If I'm going to tell the IESG that no MTI is needed, I want to tell them that the WG had consensus. This came up in the “AD review” thread that many of you have probably just seen and skimmed or ignored. :) ACME does not define any mandatory-to-implement signature

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Eric Rescorla
On Wed, May 30, 2018 at 11:45 AM, Salz, Rich wrote: > I believe the working group has decided that MTI algorithms are not > necessary. If you want that confirmed on the list, we can ask. > Yes, please ask. If I'm going to tell the IESG that no MTI is needed, I want to tell them that the WG had

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Eric Rescorla
On Wed, May 30, 2018 at 11:25 AM, Richard Barnes wrote: > > > On Tue, May 29, 2018 at 4:02 PM Eric Rescorla wrote: > >> >> >> On Mon, May 28, 2018 at 9:57 PM, Russ Housley >> wrote: >> >>> Eric: >>> >>> >>> > > Do you want to specify a set of acceptable signature algorithms here? > > >

Re: [Acme] Let's Encrypt ACME-CAA validation-methods support

2018-05-30 Thread Jacob Hoffman-Andrews
Apologies for the delay on publishing the latest draft. I'll work on getting that out today. Thanks for the reminder! On 05/30/2018 12:17 PM, Corey Bonnell wrote: Hello, This development is exciting work in regard to allowing domain owners to limit which validation methods they want to

Re: [Acme] Let's Encrypt ACME-CAA validation-methods support

2018-05-30 Thread Corey Bonnell
Hello, This development is exciting work in regard to allowing domain owners to limit which validation methods they want to allow to be used for their domains. Unfortunately, the validation-methods extension is not compliant with RFC 6844 (the CAA RFC), as parameter tags cannot contain hyphens.

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Salz, Rich
I believe the working group has decided that MTI algorithms are not necessary. If you want that confirmed on the list, we can ask. ACME isn’t just WebPKI, as you know, it’s also becoming STIR and some have proposed home environments. We have many implementations to serve as proof points that

Re: [Acme] AD Review: draft-ietf-acme-acme-12

2018-05-30 Thread Richard Barnes
On Tue, May 29, 2018 at 4:02 PM Eric Rescorla wrote: > > > On Mon, May 28, 2018 at 9:57 PM, Russ Housley > wrote: > >> Eric: >> >> >> > > Do you want to specify a set of acceptable signature algorithms here? > > I am inclined not to. We have already forbidden "none" and MAC. We

[Acme] Let's Encrypt ACME-CAA validation-methods support

2018-05-30 Thread Daniel McCarney
Hi folks, I'm happy to share that Let's Encrypt has deployed support for Hugo Landau's ACME-CAA "validation-methods" CAA record extension in the staging environment[0]. Community feedback/review would be most appreciated. You can find more information in the associated API announcement[1].