Hi Jacob,

What use case did you have in mind for including the expiration date
in the RDATA? We didn't choose to initially include it as we believed
the instructions for when a validation record could be removed were clear
with ACME. ACME challenge tokens are only used once and have the expiry of
the associated authorization object as you mentioned. The dnsop draft goes
on to state "The 'expiry' key MAY be omitted in cases where the provider
has clarified the record expiry policy out-of-band (Appendix A.1.1.3
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-03#appendix-A.1.1.3>)"
[Section 5.2.1
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-03#name-metadata-for-expiry>
].

In regards to allowing clients to preemptively shorten lifetimes of
authorizations, it would be nice to attempt to quantify the expected
savings from the server standpoint and to talk to clients to see how they
would use the feature. I suspect that some clients currently using
authorization deactivation would continue to do so even if they could
specify shorter lifetimes. They require authorization deactivation
immediately upon issuance. I don't currently have any hard data though. I
agree that adding the feature would best be achieved with a separate draft.

James

On Tue, Mar 19, 2024 at 5:23 PM Jacob Hoffman-Andrews <jsha=
40letsencrypt....@dmarc.ietf.org> wrote:

> The latest dns-account-01 draft (
> https://datatracker.ietf.org/doc/html/draft-ietf-acme-scoped-dns-challenges-00)
> incorporates recommendations from the dnsop domain control verification
> draft (
> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-03
> ).
>
> The dnsop draft says:
>
> > Providers MUST provide clear instructions on when a validation record
> can be removed. These instructions SHOULD be encoded in the RDATA via
> comma-separated ASCII key-value pairs [RFC1464], using the key "expiry" to
> hold a time after which it is safe to remove the validation record.
>
> But the ACME draft doesn't specify that. I think it should! The specified
> expiry should be the expiry of the pending authorization object. After that
> point, the challenge will never be validated and the record can be removed.
>
> This brings up a separate question: Should subscribers be able to specify
> what maximum lifetime they want for the validated authorization? For
> instance some subscribers might want to never reuse authorizations.
> Currently they can achieve that by deactivating authorizations after
> issuance, but it could be more convenient to do it preemptively. One option
> would be to encode it in the TXT record. But if we specify such a thing I
> think we'd want it to work for any challenge type, probably by making it
> part of the challenge POST. So, out of scope for this draft, I think.
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme
>
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to