Robert Wilton has entered the following ballot position for
draft-ietf-acme-authority-token-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-acme-authority-token/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Hi,

Thanks for this.  I don't know much about ACME.  Hence only some minor
comments/suggestions.

1.  Introduction

   It enables administrative entities to prove
   effective control over resources like domain names, and automates the
   process of generating and issuing certificates that attest control or
   ownership of those resources.

   In some cases, proving effective control over an identifier requires
   an attestation from a third party who has authority over the
   resource,

I note that you use "identifier" in the first part of the sentence and then
"resource" in the second, and wanted to check that these shouldn't both be
"resource".

4.  Authority Token Challenge tkauth-type Registration

                                      In addition to helping to manage
   replay, the "jti" provides a convenient way to reliably track with
   the same "atc" Authority Token is being used for multiple challenges
   over time within its set expiry.

I found this sentence hard to scan/understand.

        {
    "protected": base64url({
         "typ":"JWT",
     "alg":"ES256",
     "x5u":"https://authority.example.org/cert";
        }),
    "payload": base64url({
         "iss":"https://authority.example.org/authz";,
     "exp":1300819380,
     "jti":"id6098364921",
     "atc":{"tktype":"TnAuthList","tkvalue":"F83n2a...avn27DN3==","fingerprint":
     "SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:D3:BA:B9:19:81:F8:50:
     9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"}
        }),
     "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
        }

The alignment of the rows of this JSON looks somewhat strange.  Aligning the
fields may make it more readable.

5.  Acquiring a Token

   MUST support an HTTPS REST interface

Is REST well defined enough to be an RFC 2119 MUST?  Does this need a reference
to what constitutes a REST interface that would be compliant with this
specification?

Thanks,
Rob



_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to