Re: [Acme] Opsdir telechat review of draft-ietf-acme-dtnnodeid-10

2022-10-21 Thread Brian Sipos
Linda, To provide some clarification: a "delay-tolerant network" isn't just a descriptive term, it is a specific type of overlay network operating with the Bundle Protocol of RFC 9171 in accordance with the principals of RFC 4838. This proposed validation method is both conceptually and

Re: [Acme] [IANA #1217636] Expert Review for draft-ietf-acme-dtnnodeid-08 (bundle)

2022-10-20 Thread Brian Sipos
All, I'm reposting here to confirm that in a different thread I identified the DTN draft which modifies the IANA registry [1] as a necessary companion to the ACME document. The DTN document purely updates the IANA registry and has no other substantial content. [1]

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-10.txt

2022-09-22 Thread Brian Sipos
e Management > Environment WG of the IETF. > > Title : Automated Certificate Management Environment > (ACME) Delay-Tolerant Networking (DTN) Node ID Validation Extension > Author : Brian Sipos > Filename: draft-ietf-acme-dtnnodeid-1

Re: [Acme] [EXT] Re: I-D Action: draft-ietf-acme-dtnnodeid-09.txt

2022-09-07 Thread Brian Sipos
us know whether you think it is > ready (or make comments). We are hoping to get this draft finished! > > > > Deb Cooley > > > > On Tue, May 24, 2022 at 5:29 PM Sipos, Brian J. > wrote: > > All, > > > > I haven’t seen any reviews of the last draft versio

Re: [Acme] [EXT] Re: I-D Action: draft-ietf-acme-dtnnodeid-09.txt

2022-09-07 Thread Brian Sipos
gt; >> wrote: > >> > >>> All, > >>> > >>> I haven’t seen any reviews of the last draft version -09. I hope that > the > >>> closer alignment with RFC 8823 makes its understanding and analysis > easier. > >>> > >

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-09.txt

2022-03-02 Thread Brian Sipos
; This draft is a work item of the Automated Certificate Management > Environment WG of the IETF. > > Title : Automated Certificate Management Environment > (ACME) Delay-Tolerant Networking (DTN) Node ID Validation Extension > Author : Brian Sipos >

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-08.txt

2022-01-12 Thread Brian Sipos
t; > Title : Automated Certificate Management Environment > (ACME) Delay-Tolerant Networking (DTN) Node ID Validation Extension > Author : Brian Sipos > Filename: draft-ietf-acme-dtnnodeid-08.txt > Pages : 30 >

Re: [Acme] Opsdir last call review of draft-ietf-acme-dtnnodeid-07

2022-01-07 Thread Brian Sipos
Linda, The way that Roman has described this is correct. There are however subtleties to the distinctions between Node ID, Administrative Endpoint ID, and general Endpoint ID that are not explained in this document that deserve at least an expansion in the Terminology section and a paragraph in

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-06.txt

2021-10-14 Thread Brian Sipos
on-line Internet-Drafts > directories. > This draft is a work item of the Automated Certificate Management > Environment WG of the IETF. > > Title : Automated Certificate Management Environment > (ACME) Delay-Tolerant Networking (DTN) Node ID Validation Extension

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-05.txt

2021-10-04 Thread Brian Sipos
going to the same destination). If the "token-chal" is assumed to be globally unique, then the client really doesn't need to know what ACME servers are making the challenges. On Mon, Oct 4, 2021 at 3:05 PM Aaron Gable wrote: > Brian, > > Fantastic, thank you for the responses!

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-05.txt

2021-09-30 Thread Brian Sipos
d ignore that constraint and generate bundles with > lifetimes far into the future and a strictly-implemented server would be > obligated to accept them. > > BS1: I agree that ideally these would indicate the same end time, but the ACME server should trust only its own originated data, i.e.

Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-05.txt

2021-09-26 Thread Brian Sipos
e IETF. > > Title : Automated Certificate Management Environment > (ACME) Delay-Tolerant Networking (DTN) Node ID Validation Extension > Author : Brian Sipos > Filename: draft-ietf-acme-dtnnodeid-05.txt > Pages

Re: [Acme] AD Review of draft-ietf-acme-dtnnodeid-04

2021-08-20 Thread Brian Sipos
m in. > > Russ > > On Aug 20, 2021, at 3:10 PM, Brian Sipos > wrote: > > Rich, I see your point. I had made my own assumptions that tools would > validate that the SAN URI contained a valid URI and nothing more. But > because the RFC 5280 requires more about the authority par

Re: [Acme] AD Review of draft-ietf-acme-dtnnodeid-04

2021-08-20 Thread Brian Sipos
Rich, I see your point. I had made my own assumptions that tools would validate that the SAN URI contained a valid URI and nothing more. But because the RFC 5280 requires more about the authority part some tools/libraries are free to throw out URIs that have some other (RFC-invalid) authority

Re: [Acme] AD Review of draft-ietf-acme-dtnnodeid-04

2021-08-14 Thread Brian Sipos
All, I understand more fully now that the RFC5280 definition for uniformResourceIdentifier has a more specific purpose than as a general URI container, and that existing tools likely have additional assumptions baked in about what services the URIs are to be used for. I was really hoping that the

Re: [Acme] AD Review of draft-ietf-acme-dtnnodeid-04 (others)

2021-08-14 Thread Brian Sipos
Roman, My replies regarding the other, editorial comments are below with the prefix "BS:". I'll get back to the earlier topics in the other mail thread. ** Section 1. Editorial. The paragraph starting with "Once an ACME server validates ..." jumps immediately into discussion a "uri" without

Re: [Acme] AD Review of draft-ietf-acme-dtnnodeid-04

2021-07-27 Thread Brian Sipos
Roman, Thank you for this thorough review. I want to address the more procedural/structural points first; the ones which have implications outside of just this document. > On the process side, this arrangement is rather unusual. No quarrels with the substance of the update which will improve

Re: [Acme] Publication has been requested for draft-ietf-acme-dtnnodeid-04

2021-07-21 Thread Brian Sipos
Yoav, Is there anything needed in the near term to make progress on this document? I haven't seen any further comments since the WG last call has ended. Also, as an FYI the current draft is the result of review comments from the DTN WG and there are no outstanding issues from either WG. I am

[Acme] RFC 8823 email-reply-00: How to concatenate the tokens?

2021-06-06 Thread Brian Sipos
Richard, >From my interpretation, the fact that the two token parts are base64url >strings is immaterial to the text-string concatenation into the ACME "token" >value. The Key Authorization calculation of RFC 8555 also does not care where >the token text came from or whether it is a base64url

Re: [Acme] WGLC for ACME DTN Node ID

2021-05-03 Thread Brian Sipos
Yoav, This draft has also received a DTN WG review, and I have a new revision in progress. This new revision will also address a difference in behavior from the email S/MIME document that was brought up by Ryan Sleevi and explained by Ben Kaduk. That change does affect the data content by

Re: [Acme] WGLC for ACME DTN Node ID

2021-04-21 Thread Brian Sipos
Ben, Thank you for the feedback. Given that this document is earlier in the stream, we still have opportunities to improve its encoded structure or properties. > My recollection from the email+S/MIME document (which is to be published as > an RFC imminently) is that the token-part2 was playing

Re: [Acme] WGLC for ACME DTN Node ID

2021-04-16 Thread Brian Sipos
Ryan, Thank you for the review comments. My responses are inline with prefix "[BS1]". > With admittedly very little context for this specific use case, a few > things stand out: > Section 2 states "Any identifier of type "uri" in a newOrder request MUST > NOT have a wildcard ("*") character in

Re: [Acme] WGLC for ACME DTN Node ID

2021-04-09 Thread Brian Sipos
Russ, Thank you for the review comments. My responses are inline with prefix "[BS1]". > I think that this document is almost ready. I have a few comments. > MAJOR: > Section 4 points to Section 4.4.2 of [I-D.ietf-dtn-tcpclv4]; but that profile > does not require the certificate to include an

[Acme] ACME DTN Node ID validation update

2021-02-25 Thread Brian Sipos
All, Recently both the DTN drafts related to BPv7 (over which the Node ID validation is performed) and the ACME draft for email validation (from which the Node ID validation takes its workflow) have progressed to the RFC Editor's queue, which is great! I am updating the DTN Node ID validation

Re: [Acme] Adopting the DTN draft

2020-08-26 Thread Brian Sipos
Rich, I plan on submitting a slightly updated draft, including the WG name prefix, today. Thanks for the uptake and sorry for the delay in posting. From: Salz, Rich Sent: Friday, August 21, 2020 10:05 To: acme@ietf.org ; Brian Sipos Subject: Adopting the DTN

Re: [Acme] ACME email validation

2020-06-19 Thread Brian Sipos
Nielsen Sent: Friday, June 19, 2020 13:25 To: Brian Sipos; acme@ietf.org Cc: alexey.melni...@isode.com Subject: SV: [Acme] ACME email validation The reason is to prevent email spoofing. In the case of .well-known or DNS validation, or ALPN, you publish a record where ACME fetches. That can’t

[Acme] ACME email validation

2020-06-18 Thread Brian Sipos
All, In a recent draft I created for using ACME for non-web-PKI verification [1] I see that there are many similarities with an earlier draft for email verification [2]. In that email protocol, the challenge token is split into two parts which arrive at the email validation agent through two