Hi Peter,
I have reviewed your draft, this draftis related to RATS, so I noticed it, I am 
trying to understand from these aspects:
Problem: Certificate forgery issue
Object: Short term certificate holders and verifier
Logic for problem-solving: The certificate verifier verifies that the holder 
has the authority to use the certificate
Solution: Reuse the remote proof process of RATS, Generate a attestation result 
for the certificate owner, and the certificate verifier can confirm the 
legitimacy of the certificate through the attestation result, Of course, this 
also involves the issue of mapping or reference.
I also have the following questions:
Does ACME pay attention to the issue of forged certificates?
Does the current coding implementation of ACME have a process for determining 
the authenticity of certificates?
Best,
Meiling
 
From: Liuchunchi(Peter)
Date: 2024-10-23 15:22
To: acme@ietf.org
CC: acme-cha...@ietf.org
Subject: [Acme] new acme draft -- rats identifier and challenge
Hi folks, 
 
Recently I submitted a new ACME draft that extends “rats” identifier and 
challenge type. The purpose of this work is to provide a means that allows an 
ACME server to test if an ACME client possess a valid remote attestation result 
(and an identifier to that), before issuing a certificate to it. Wonder if 
anyone may find this work interesting? 
 
The draft is here https://datatracker.ietf.org/doc/draft-liu-acme-rats/ and 
github repo is here https://github.com/liuchunchi/draft-liu-acme-rats, with 
some todos that welcomes contribution or comments. 
 
Dear chairs, can I request a small slot in Dublin to share this work? 15 or 10 
minutes would suffice. 
 
Best,
Peter (Chunchi) Liu
 
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to