Right.  The property that we're trying to authenticate here is that the
ACME client controls something associated with the hostname.  Ideally, this
would be the person with write access to the zone file (cf. DNS
challenges), but to facilitate validation, modern validation accepts
validation of things like controlling an HTTP or HTTPS server.  It's less
clear that it would be acceptable to validate that someone can provision a
service on, say, port 36707.

That said, the ability to do domain validation without service interruption
seems like an important requirement.  It seems like the DNS challenge
listed in the current draft meets that requirement.  We should be able to
design the simpleHttps challenge so that you just have to to provision an
extra file on an HTTPS server, not reconfigure it.

--Richard

On Thu, Apr 16, 2015 at 8:56 PM, Nico Williams <[email protected]>
wrote:

> You have to be able to prevent unauthorized users from using this
> alternative callback port to get certs with which to impersonate your
> service.
>
> _______________________________________________
> Acme mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/acme
>
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to