Re: [Acme] Reference implementation of draft-misell-acme-onion

2023-05-27 Thread Charles Eckel (eckelcu)
Hi Q, It is great to see that you have a reference implementation for this draft. It would be helpful for you to add a “related-implementations” tag to https://datatracker.ietf.org/doc/draft-misell-acme-onion/ that points to the code in GitHub. See

Re: [Acme] Reference implementation of draft-misell-acme-onion

2023-04-24 Thread Q Misell
Hi again Seo, I've published my fork of Tor with support for publishing CAA records: https://github.com/as207960/tor. There's also now a hidden service at znkiu4wogurrktkqqid2efdg4nvztm7d2jydqenrzeclfgv3byevnbid.onion with CAA records in its hidden service descriptor. Thanks, Q

Re: [Acme] Reference implementation of draft-misell-acme-onion

2023-04-23 Thread Q Misell
Hi Seo, Thanks for the feedback. I copy pasted the list of logs into my code from https://github.com/google/certificate-transparency-community-site/blob/master/docs/google/known-logs.md, it would probably be a good idea to delete the old logs. The SERVFAIL response is non very clear, agreed.

Re: [Acme] Reference implementation of draft-misell-acme-onion

2023-04-23 Thread Seo Suchan
google's solera 2018~2022 are no longer accept new record. solera ct log is sharded by notafter day of incoming certificates, so only log able to use currently be 2023 (assume 90 day certificate) when I ran you client for onion-csr without having hosted onion hidden service, server returned

[Acme] Reference implementation of draft-misell-acme-onion

2023-04-20 Thread Q Misell
Hi all, Thanks for all your feedback over my draft. I've incorporated your comments into a new draft, and published this. I've also finished my reference implementation of the draft, more details available at https://acmeforonions.org. I'd be delighted if you'd try it out and let me know what