On 10/22/2018 8:24 PM, Salz, Rich wrote:

  * My suggestion with something similar to DANE and DKIM (in
    utilizing DNS and DNSSEC), DNS TXT record is already been used by
    acme protocol to pass a challenge, so why not use similar
    implementation to authenticate the server itself for the client,
    so the client can verify the certificate and the chain, without a
    third-party.

No third-party is needed.  The client has to trust **something** out of band.  In a browser, this is typically the root store, and any CA trust chain should end up being signed by something in that store.  Other clients have different methods, but they are ultimately a set of trusted “root anchors.”  If you put data in DNS, then the client has to trust DNS and the chain that signed that data.

I think we’re struggling to understand the issue you are trying to raise.


I am not trying to raise an issue, client can only trust acme server simply by providing a key (public key) along with the ACME URL, you trust example.com then put in your library this url and this key supplied by example.com service, thus the client doesn't need to trust anything else, by such key any MitM can be detected by both client and server or just one, that depends on how you tweak this protocol, that key can be supplied to the library by implementer, user or DNSSEC (in this case you need a key) .

Acme server is CA server and shouldn't need a root store to be validated or trusted, that root store can be easily manipulated even by a software, even without locally manipulation the MitM can issue a certificate to the client by simply hijacking the connection and having certificate issued by trusted CA, and the client will validate and trust that certificate.

Again i am sorry that you feel i am raising an issue, i am not, only suggesting a concerning matter to discuss.

Best regards and sorry for wasting your time,
K. Obaideen
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to