Hi Q,
It is great to see that you have a reference implementation for this draft. It
would be helpful for you to add a “related-implementations” tag to
https://datatracker.ietf.org/doc/draft-misell-acme-onion/ that points to the
code in GitHub.
See
Hi again Seo,
I've published my fork of Tor with support for publishing CAA records:
https://github.com/as207960/tor.
There's also now a hidden service at
znkiu4wogurrktkqqid2efdg4nvztm7d2jydqenrzeclfgv3byevnbid.onion with CAA
records in its hidden service descriptor.
Thanks,
Q
Hi Seo,
Thanks for the feedback.
I copy pasted the list of logs into my code from
https://github.com/google/certificate-transparency-community-site/blob/master/docs/google/known-logs.md,
it would probably be a good idea to delete the old logs.
The SERVFAIL response is non very clear, agreed.
google's solera 2018~2022 are no longer accept new record. solera ct log
is sharded by notafter day of incoming certificates, so only log able to
use currently be 2023 (assume 90 day certificate)
when I ran you client for onion-csr without having hosted onion hidden
service, server returned
Hi all,
Thanks for all your feedback over my draft. I've incorporated your comments
into a new draft, and published this.
I've also finished my reference implementation of the draft, more details
available at https://acmeforonions.org. I'd be delighted if you'd try it
out and let me know what