Hi Aaron,
Thank you so much for your comment, see inline:
-----------------------------------------------------------------
2024年11月27日 05:50,Aaron Gable <aa...@letsencrypt.org> 写道:
On Tue, Nov 26, 2024, 07:09 Richard Barnes <r...@ipv.sx> wrote

Goal (2) is might not an unreasonable idea, but I would be concerned about
(a) compatibility impacts with subjects, (b) compatibility impacts with CA
back-end APIs, and (c) new cross-protocol risks usage of the certificate
subject key pair (signing some JOSE thing as well as being used in TLS, vs.
CSR+TLS, which has been done forever).  Even if we wanted to do this, then
you don't need the whole machinery of ACME challenges.  You don't need an
extensible set of ways to validate an ECDSA key, you need one, and probably
not even one per algorithm -- you could just define a JWS structure that
was the moral equivalent of a CSR and have the client attach it to an order.

I've always imagined the pubKey proof of possession challenge as being very
similar to the TLS-ALPN-01 challenge: do a successful TLS handshake while
presenting a (self-signed, or previously-issued) certificate, and that
proves you control the corresponding private key using only well-vetted
protocols that already support many different key types. This avoids the
need to worry about using the same key to sign various different kinds of
objects. And I don't think there are CA compatibility impacts -- a CA would
have the option of ignoring the finalize CSR (and not requiring their
clients to present one) if the client had supplied a pubkey identifier in
the new-order request and completed a challenge for it.
 [ wupanyu] In my understanding, the TLS-ALPN-01 challenge is mainly used
to verify domain control, and the key Authorization during the challenge is
derived from the fingerprint of the account key, indirectly proving the
client's control over the account key. But in fact there is no way to solve
the public key substitution attack at the final certificate request stage.
As for streamlining the CSR process, it's an interesting point that can be
discussed together indeed!

But regardless, that's a rabbit hole that seems orthogonal to the
motivations of this draft.

Aaron
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to