On Tue, Nov 26, 2024, 07:09 Richard Barnes <r...@ipv.sx> wrote:

>
> Goal (2) is might not an unreasonable idea, but I would be concerned about
> (a) compatibility impacts with subjects, (b) compatibility impacts with CA
> back-end APIs, and (c) new cross-protocol risks usage of the certificate
> subject key pair (signing some JOSE thing as well as being used in TLS, vs.
> CSR+TLS, which has been done forever).  Even if we wanted to do this, then
> you don't need the whole machinery of ACME challenges.  You don't need an
> extensible set of ways to validate an ECDSA key, you need one, and probably
> not even one per algorithm -- you could just define a JWS structure that
> was the moral equivalent of a CSR and have the client attach it to an order.
>

I've always imagined the pubKey proof of possession challenge as being very
similar to the TLS-ALPN-01 challenge: do a successful TLS handshake while
presenting a (self-signed, or previously-issued) certificate, and that
proves you control the corresponding private key using only well-vetted
protocols that already support many different key types. This avoids the
need to worry about using the same key to sign various different kinds of
objects. And I don't think there are CA compatibility impacts -- a CA would
have the option of ignoring the finalize CSR (and not requiring their
clients to present one) if the client had supplied a pubkey identifier in
the new-order request and completed a challenge for it.

But regardless, that's a rabbit hole that seems orthogonal to the
motivations of this draft.

Aaron
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to