Thanks for the clarification! We'll discuss Jacob's proposed language in
the session on Wednesday, and I'll plan to issue draft -07 shortly after
the document freeze is over.

Aaron

On Mon, Nov 4, 2024, 21:47 Deb Cooley <debcool...@gmail.com> wrote:

> Aaron,
>
> You can issue a new version of the draft, even as it sits in my queue.
> I'd prefer you do that before I start my review.
>
> Deb
>
> On Mon, Nov 4, 2024 at 11:18 PM Aaron Gable <aaron=
> 40letsencrypt....@dmarc.ietf.org> wrote:
>
>> Thanks Yoav!
>>
>> I've already spoken with Jacob about this change offline, and plan to
>> bring it up as part of my timeslot this week. You're absolutely right that
>> it doesn't affect any of the bits on the wire; it's just instructions on
>> client behavior. I'm in favor of incorporating this language (or a slightly
>> edited version of it); I'm just unfamiliar with the process for
>> incorporating changes like this as we move out of WGLC and into IESG.
>>
>> Aaron
>>
>> On Mon, Nov 4, 2024 at 12:34 PM Yoav Nir <ynir.i...@gmail.com> wrote:
>>
>>> Thanks for that.
>>>
>>> If I’m reading this correctly, this is all clarification, not
>>> bits-on-the-wire changes. Changes like that can be added after WGLC if they
>>> don’t raise objections.
>>>
>>> I see that you are not registered for the IETF meeting, so it probably
>>> doesn’t make sense to discuss it at the ACME session, but we’ll mention
>>> that the PR exists, and the discussion can continue on the mailing list.
>>>
>>> Yoav
>>>
>>> On 29 Oct 2024, at 22:09, Jacob Hoffman-Andrews <jsha=
>>> 40letsencrypt....@dmarc.ietf.org> wrote:
>>>
>>> Hi all, and especially to Yoav and Aaron for getting the ARI draft
>>> through Last Call.
>>>
>>> I'm very sorry to make a substantive proposal _after_ Last Call, but
>>> after talking to a client author I became concerned that we're not being
>>> explicit enough about how frequently clients should check. I've just
>>> uploaded this PR:
>>>
>>> https://github.com/aarongable/draft-acme-ari/pull/82
>>>
>>> For convenience, I'm reproducing the added sections below:
>>>
>>> ## Schedule for checking RenewalInfo objects
>>>
>>> RenewalInfo objects must be fetched frequently so that clients learn
>>> about renewal quickly. But requests must not overwhelm the server. This
>>> protocol uses the Retry-After header to indicate to clients how often to
>>> retry. Note that in other HTTP applications, Retry-After often indicates
>>> the earliest time to retry a request. In this protocol, it indicates both
>>> the earliest time and a target time.
>>>
>>> Clients SHOULD fetch a certificate's RenewalInfo object immediately
>>> after issuance. After that, clients SHOULD fetch the certificate's
>>> RenewalInfo as soon as possible after the time indicated in the Retry-After
>>> header (backoff on errors takes priority, though). Clients SHOULD set
>>> reasonable limits on the value in the Retry-After header. For instance,
>>> values under 1 minute should be treated as if they were one minute and
>>> values over one day should be treated as if they were one day.
>>>
>>> Clients SHOULD stop checking RenewalInfo after a certificate is expired.
>>> Clients SHOULD stop checking RenewalInfo after they consider a certificate
>>> to be replaced (for instance, after a new certificate for the same
>>> identifiers has been received and configured).
>>>
>>> ### Error handling
>>>
>>> Temporary errors include, for instance:
>>>
>>>   - Connection timeout
>>>   - Request timeout
>>>   - 5xx HTTP errors.
>>>
>>> On receiving a temporary error, clients SHOULD do exponential backoff
>>> with a capped number of tries. If all tries are exhausted, clients SHOULD
>>> treat the request as a long-term error.
>>>
>>> Long term errors include, for instance:
>>>
>>>   - Retry-After is invalid or not present
>>>   - RenewalInfo object is invalid
>>>   - DNS lookup failure
>>>   - Connection refused
>>>   - Non-5xx HTTP error
>>>
>>> On receiving a long term error, clients SHOULD perform the next
>>> RenewalInfo fetch as soon as possible after six hours have passed (or some
>>> other locally configured default).
>>>
>>> ### Server choice of Retry-After
>>>
>>> Servers set the Retry-After header based on their requirements on how
>>> quickly to perform a revocation. For instance, a server that needs to
>>> revoke certificates within 24 hours of notification of a problem might
>>> choose to reserve twelve hours for investigation, six hours for clients to
>>> fetch RenewalInfo, and six hours for clients to perform a renewal. Setting
>>> a small value for Retry-After means that clients can respond more quickly,
>>> but also incurs more load on the server. Servers should estimate their
>>> expected load based on the number of clients, keeping in mind that third
>>> parties may also monitor RenewalInfo endpoints.
>>> _______________________________________________
>>> Acme mailing list -- acme@ietf.org
>>> To unsubscribe send an email to acme-le...@ietf.org
>>>
>>>
>>> _______________________________________________
>>> Acme mailing list -- acme@ietf.org
>>> To unsubscribe send an email to acme-le...@ietf.org
>>>
>> _______________________________________________
>> Acme mailing list -- acme@ietf.org
>> To unsubscribe send an email to acme-le...@ietf.org
>>
>
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to