Alexey hasn't posted yet an updated version, and I edited the first part of the minutes (the STAR portion only), now attached with my changes.

Chairs, please take a look, some of the changes are potentially important, as they refer to action items (I went through the YouTube video).

Alexey, can you please merge them with your changes.

Thanks,

    Yaron

On 09/11/2018 5:28, Salz, Rich wrote:
Nitpicking is why I posted so quickly :)  Please post an edited version!

On 11/9/18, 9:51 AM, "Alexey Melnikov" <[email protected]> wrote:

     Sorry for nitpicking, but below are my corrections to the minutes. I can
     just send the updated version instead of a patch.
> ## Email TLS certs and EMAIL end-user certs, 15 minutes
     >     Who will read?  Ready for WGLC?
     >
     > Paul Hofman: I don't understand the proposed change
     > Alexey: At the moment service/port are single. If you wanted to issue 
multiple
     > ports (IMAP/IMAPS) it needs to be multiple requests.
     > Paul: I see no reason not to have multiple services.
     > Chaair: One array or two?
     > Alexey: One array
     > Richard: I'm confused. This document is talking about authenticating
     > DNS, but what would go into a certificate is a Domain.
     > Alexey: In theory you could issue SRV based IDs. In the most common use 
cases
     > that won't be used.
Change to: In the most common use cases DNS IDs would be issued instead. > Richard: I think this should be updated to cover SRV. Insert: Alexey: SRV is already covered in the document. > DKG: I want to agree with Richard. If it's just on name, this is too complex.
     > Several steps need including
     > Alexey: For DNS there will be slightly specific service name.
Change to: For DNS challenge, there service name is included in the DNS
     name used for the ACME challenge.
     (_<port>._<service>._acme-challenge.<domain> TXT record.)
I think Richard also suggested to create a new DNS-based ACME challenge
     type.
> DKG: If the cert being requested isn't specifically for the service, this
     > could open an attack to other services for other protocols
     > AI: Alexey to add some clarifying text, Richard to send some
     > AI: After next draft, WGLC; READ
     >
     > Paul Hoffman: These details aren't clear in the current draft.
     > Richard: We have a copy of layers of indirection, what I am least clear 
on is
     > the mapping of service to certificate. CA's may want to include SRV into 
the
     > cert if you show control of the domain.
     > Alexey: I'm hoping they'll issue certs with the port
Change to: I'm hoping they'll issue certs with the service name > Richard: I suggest you implement SRV service IDs
     > Tim: SRV has been discussed but not implemented
     > Tim: The assumption all zones in a domain are controlled by the same 
identity is no longer true.
     > Alexey: I am developing software that could develop software to validate 
these, but first I need CAs to issue certs against this.
Change to: I am developing client side software that validate these, but
     first I need CAs to issue certs against this.
     >
     >
I think it is worth pointing out here that now we moved on to the S/MIME
     document:
> Yaron: Are you expecting end user to perform this challenge?
     > Alexey: Yes, possibly through copy/pasting the challenge.
Change the above 2: Yaron: Are you expecting end user to perform this challenge or email client?
     Alexey: Both. If email client doesn't support this natively, it is
     possible to copy&past the challenge to an external program and then
     create a reply with the calculated result.
> Chair: Is there any provisiion for multiple clients? Alexey: yes > AI: Tim H and dkg said they would review
ACME at IETF 103

# ACME is meeting at IETF 103 in the last session, Thursday II. 16:10-18:10

Agenda is as follows:

## Administrivia, 10 minutes
    Note well, jabber, minute-takers
    dkg for Jabber,
    Thomas Peterson for Minutes

## Brief updates, 10 minutes
    ACME, CAA challenge, IP identifier challenge, ALPN challenge

Richard: I am still waiting for my co-worker to read an outstanding PR,
I will probably merge it later tonight
Chair: We will open another 2 week WGLC

STAR, 30 min
    - ACME-STAR: Update as a result of the last-minute ACME changes, etc.
      Was already in WGLC; seeking a doc shepherd
AI: Chairs to redo WGLC after the meeting (2 weeks), seek shepherd, and then 
send to IESG

    - START-delegation; now is an ACME profile, after feedback
      Call for adoption

Richard: This is what is set to the IdO for DNS challenge? Yaron: Yes.
Thomas Fossati: No, the DNS challenge is run just on the regular identifier 
name (the "value" of the CNAME), it is run by the IdO.
Yaron: the CNMAE part i soptional, simplifies synchronization of provisioning.
Richard: What CNAME is provisioned as a result of this?
Yaron Sheffer: CNAME points from DNO to NDC. 

Richard: I'll take a look at the draft and provide feedback

Yaron: This could be used for long-term certs.
Richard: This could be used for short term use case, but I don't see a
reason to join this with long-term.
Chris: If someone finds a solution where they are using them for long term,
more power to them, we should encourage them.
Yoav: What if we don't find such a use case? Right now we don't have any use
cases
Daniel Kahn Gilmore: If you are going to restrict delegation to STAR, how are 
you going to restrict
it? What cut line would you use? Expiration or other?
Yaron Sheffer: The document could restrict with a MUST.
Tim Hollebeek: That (making delegation depend on lifetime) makes things more 
complicated, as this confuses delegation
is for short term, but not for long term. It's more useful in short term, but 
generally useful, should not restict.
Yoav: will want to take to the list.

Chair: Are you requesting this be adopted?
Yaron: That's on the next slide

Rich: put it (restriction to STAR) in the draft as an open issue.

Richard: If a CNAME has been delegated, the NDC "owns" it can do the
HTTP challenge (maybe not the DNS challenge) just by having the record pointed
at it.
Jon Peterson: How does base ACME work when resolving the challenge?
Richard: There are some CDNs today that do this today, for ACME issuance.
Richard: It appears the CNAME here is confusing, but the rest of the document
is sound. There is a scoping question if the CNAME connection is suitable.
Jon: If you only have an account with the NDC, but not the IdO then yeah, you
wouldn't be able to prove ownership.
Richard: ACME accounts are cheap. Except where CA is imposing
conditions. You may, e.g. lock a domain to an account but I'm unsure if that's
being done in practice.
Chris Wendt: Are you locking this to DNS type or open to other identifier 
types? Might want other identifiers in STIR.
Yaron: Once this is a WG document, this is a WG decision, but I don't see a 
reason to lock it to DNS.
Sanjay Mishra: The CNAME used here, the NDC is asking IdO to use it?
Yaron: Yes.

Hum on whether this area is of interest to the group - yes.
AI: Chairs to issue call for adoption in 1-2 weeks, to give people time to read.

## Email TLS certs and EMAIL end-user certs, 15 minutes
    Who will read?  Ready for WGLC?

Paul Hofman: I don't understand the proposed change
Alexey: At the moment service/port are single. If you wanted to issue multiple
ports (IMAP/IMAPS) it needs to be multiple requests.
Paul: I see no reason not to have multiple services.
Chaair: One array or two?
Alexey: One array
Richard: I'm confused. This document is talking about authenticating
DNS, but what would go into a certificate is a Domain.
Alexey: In theory you could issue SRV based IDs. In the most common use cases
that won't be used.
Richard: I think this should be updated to cover SRV.
DKG: I want to agree with Richard. If it's just on name, this is too complex.
Several steps need including
Alexey: For DNS there will be slightly specific service name.
DKG: If the cert being requested isn't specifically for the service, this
could open an attack to other services for other protocols
AI: Alexey to add some clarifying text, Richard to send some
AI: After next draft, WGLC; READ

Paul Hoffman: These details aren't clear in the current draft.
Richard: We have a copy of layers of indirection, what I am least clear on is
the mapping of service to certificate. CA's may want to include SRV into the
cert if you show control of the domain.
Alexey: I'm hoping they'll issue certs with the port
Richard: I suggest you implement SRV service IDs
Tim: SRV has been discussed but not implemented
Tim: The assumption all zones in a domain are controlled by the same identity 
is no longer true.
Alexey: I am developing software that could develop software to validate these, 
but first I need CAs to issue certs against this.


Yaron: Are you expecting end user to perform this challenge?
Alexey: Yes, possibly through copy/pasting the challenge.
Chair: Is there any provisiion for multiple clients?
AI: Tim H and dkg said they would review

## TN Authority Token documents, 20 minutes
    Updates

AI: Another rev then WGLC


ADJOURN
_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to