Hi Roman,

Thanks for the thorough review, and sorry for the delay...

We've posted a new version of the draft, which tries to put a dent in some of 
your concerns.

    > > >
    > > >     ** What is the intended status of this document? The document
    > > > says Informational; the datatracker and the shepherd's report says
    > > > Proposed Standard.  TnAuthlist is PS.  These four places need to be
    > consistent.

We've moved this to PS.

    > > >     ** Are there implementations of this document?  The rough
    > > > history in ACME seems to have been PS should have implementation
    > experience.
    > > > Is the link to STIR decisive here (to make it PS)?

We hope this will get some use with STIR deployments, yes.

    > > >     ** ID-Nits reported the following issues with references being
    > > > listed but not
    > > > used:
 
We divided references into normative and informative, and nuked ones that 
seemed particularly superfluous (including say acme-telephone).

For the most part, the new version incorporates your proposed changes to the 
text throughout (and hopefully it's a little better editorially). There are 
only a few cases where this warrants a bit more comment:

    > > >
    > > >     ** The tkauth-type="atc" type doesn't seem to describe all of
    > > > the required information described by Section 3.1 - 3.3 and Section
    > > > 9 (Security
    > > > Considerations) as being needed for a token format.  Specifically:
...
    > > > Perhaps this section is spelling out
    > > > requirements for both of those collectively?  If so, this should be
    > > > explicitly stated (perhaps in the intro to Section 3, reminded in
    > > > Sections 4 and
    > > 9).

We've taken the tack you suggest above of clarifying that this requirements 
need to be satisfied by a combination of authority-token and its tkauth 
subtypes.

    > > >
    > > >     ** Section 3.  The text notes that authority tokens can be used
    > > > for ACME challenges, but this document doesn't add a new challenge
    > > > type to the "ACME Validation Methods" registry.  Section 6 provides
    > > > an example using token- tnauthlist which seems to suggest a
    > > > type="tkauth-01", but that isn't specified in
    > > > draft-ietf-acme-token-tnauthlist
    > > or this document.

That's fixed, and hopefully overall the IANA considerations are a bit cleaner.
    > > >
    > > >     ** Section 3.1.  Per "... future specifications must indicate
    > > > how a token conveys to the CA the name(s) ...", is there a reason
    > > > this isn't a normative MUST?

As a matter of specmanship, I try to use normative language to constrain what 
implementations do, not what future specifications do. I understand opinion is 
divided on the subject.

    > > >     ** Section 3.2.  Per "an Authority Token could attest to all of
    > > > the resources that the client is eligible to receive certificates
    > > > for", couldn't this leaks information to a CA, if that single CA is
    > > > not
    > > responsible for all of the scopes?

Added a little text about that.

    > > >
    > > >     ** Section 4.  What would be the circumstance where the x5u/iss
    > > > would not equal the token-authority?

I don't know if we have an existing case where it does, but it is at least 
conceivable. If you feel super strong about it, we can cut it.

    > > >
    > > >     ** Section 4.  Should the values of tktype be constrained to the
    > > > IANA "ACME Identifier Types" registry?

This is another one where I don't have a super strong feeling... it would 
certainly be helpful if it were, but it doesn't seem like it's worth normative 
language to that effect.

    > > >
    > > >     ** Section 4.  The example in this section is missing the full
    > > > payload/protected /signature structure to show the actual binding
    > > > provided by the server

We added that, but we're basically punting examples to tnauthlist in this 
version of the draft otherwise.

    > > >
    > > >     ** Section 5.  This token acquisition protocol seems 
underspecified:
    > > >     -- How does the client authenticate/do authorization with the
    > > > HTTPS
    > > server?

I think the precise security used by a web service is not in the scope of this 
as such... if you feel we need to flesh that out substantially, let us know.

    > > >
    > > >     -- Is there any semantics to the resource locator to make for an
    > > > interoperable/discoverable URI?

I don't think that's particularly necessary, but if you feel otherwise, let us 
know.

    > > >
    > > >     -- Does the client get to request a scope?

Yes, I hope that's clear.

    > > >
    > > >     ** Section 5.1.  It might be useful to show a full server
    > > > response example given a particular client request

Again, punting the examples to the tnauthlist draft, since basically a concrete 
example requires all the stuff defined in tnauthlist anyway, to your point here:

    > > >
    > > >     -- How is error handling managed with the HTTP error code?  The
    > > > TnAuthlist draft actually specifies this behavior more that this
    > > > base
    > > document.
    > > >
    > > >     -- Section 5.  Shouldn't a successful response from a Token
    > > > Authority return a body of type "application/jwt" if an "authority
    > > > token" is being returned per Section 4?

tnauthlist has it as we do here; just keeping alignment with that.

    > > >
    > > >     ** Section 8.  This text registers "atc" as an ACME identifier.
    > > > When and how is that used?  I thought that identifier profiles
    > > > specified an identifier and that the atc what the 
challenge/verification type.

This was a point of misalignment with tnauthlist; we've rectified that by 
deleting this "atc" ACME identifier.

    > > >
    > > >     ** Section 8.  Is there a reason that the "atc" claim from
    > > > Section
    > > > 4 not being registered in the "JSON Web Token Claims" registry?

Added.

    > > >
    > > >     ** Section 8.  Per the registry of "token types", there don't
    > > > seem to be enough details here:

We tried to clean this up as well.

Again, thanks for the review, and let us know what we should still be fixing in 
here.

Jon Peterson
Neustar, Inc.
 

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to