Hi all,

I agree that it would be beneficial for the ACME protocol to have a pubKey
identifier type, and to have challenges which can be used to prove control
over the corresponding private key. However, it seems that I believe this
would be useful for entirely different reasons than the authors here, and I
am currently unconvinced by the motivations presented here.

I believe that a pubKey identifier type is useful for two reasons:
1) it allows the CSR to be removed from the finalize request, as it will no
longer be carrying any information that is not already found in other parts
of the ACME protocol; and
2) proof-of-possession allows the ACME server to respect keyCompromise
revocation requests which are signed by the Subscriber key instead of only
accepting those which are signed by the certificate key.

It seems that this draft is arguing for the inclusion of a pubKey type and
corresponding challenges from a security perspective: that an adversary
might replace the CSR in the finalize request and thereby get issuance of a
certificate containing a malicious key. I must admit I do not understand
this threat model.

If the adversary is simply a network adversary between the legitimate
Client and Server, then they cannot replace the CSR: the finalize request
is signed by the ACME client key and cannot be tampered with without
invalidating that signature. If the adversary is on the ACME client host,
and has access to the ACME client key, then the game is already lost --
that adversary *is* the Subscriber for all intents and purposes, and has
significant latitude: they can change the ACME client key to one the victim
doesn't control, they can (generally, based on the architecture of most
clients) complete HTTP-01 and DNS-01 challenges, and they can prove
possession of any private key they like.

So I think that this document needs to be overhauled in two ways:
- more clearly motivating the threat model: what exactly is the security
issue being solved, and why is it import that it be solved; and
- more clearly motivating the solution space: how do proof-of-possession
challenges mitigate the threat, and why are this particular set of proposed
challenges the best way to do so.

Aaron
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to