On Thu, Dec 19, 2024 at 11:00 AM Watson Ladd <watsonbl...@gmail.com> wrote:

> Any solution will have to involve the device doing something, and
> something validating the device. If we can get the user ISP (I know, I
> know), to produce a residential domain setup like
> fijinb23.users.example.com, then the router ((I know I know)can somehow
> gather that a new printer has been added, give the printer
> printer.fijnb23.users.example.com via communication to the ISP, and set
> the DNS challenge entries to respond to a request for DCV validation that
> results in a cert being sent back to the printer with a CSR the printer
> generates.
>
> There's lots of problems here, but I think this strawman shows the problem
> can be solved, and it's just a matter of improvements.
>

A service provider is essential but it doesn't have to be the user's ISP.

The only requirement for being a Mesh Service Provider, is to have a DNS
name and a public static IP address. We can discuss different protocol
options but I am pretty sure those will be required.

I am currently hosting my own MSP on a Digital Ocean Droplet for $5/mo. I
would expect the first group of providers stepping up to provide an MSP
like service are the VPN companies. Eventually ISPs would likely offer the
service.


My original goal here was to provide users with an open service where they
choose their service provider and can change their choice at. any time with
ZERO switching costs. So I am not a big fan of the DNS names at $10/yr for
this application.

However, another big change happening right now is that Blue Sky has made
some extensions to OAUTH2 which together make it what OpenID connect was
supposed to be, an actually open identity system where you can use an
account you personally control at any Web site (not use an account at
Facebook or Google or possibly Apple) as your Web handle.

I have implemented this for my Palimpsest document annotation system, I can
log in as @phill.hallambaker.com:

https://bsky.app/profile/phill.hallambaker.com/post/3ldjuhc7b4d2w


This is something I think we should ride hard. OpenID failed the users. All
it takes to turn this login approach into what OpenID promised is branding
and a name (and a way to make sure the incumbents can't sabotage). I am
currently proposing @nything because you can log into anything.

So lets say I am offering a free MSP service at example.com and Alice
creates an account, I probably issue her @alice.example.com as her @nything
handle and can assign coffee.alice.example.com to her coffee pot.

Such an MSP might monetize by attempting to upsell to a paid account with
VPN service or selling a domain name if it was only doing IoT.
Adding @nything means that they can be providing open service, end to end
secure messaging, mail, file sharing, voice and video.


In this model, all we need to issue the certificates is to relay
certificate requests from devices inside a private network to the external
network and to return the certificates. I am assuming here that we will be
using the new 6 day certs with a 24 hour renewal cycle.

I can do that for EC certs with minimal protocol overhead at the device and
without the need for a local hub:

* Device onboarding - device specifies the base threshold share for the TLS
certificates it will use.
* Cert renewal: Every 24 hours, device HTTP GETs a package containing its
new (encrypted) threshold share and cert

Ideally, the base threshold share is bound to the device such that it
cannot be extracted. But in any case, the device public key is rolling
every 24 hours without the device ever having to be involved with the cert
issue. The device doesn't do ACME, it just downloads the certs and
threshold shares and uses them to assemble the private key.


The MSP end does all the ACME protocol. The device doesn't have to be
involved in that AT ALL. The MSP has control of alice.example.com and will
provision all the records needed for DNS Challenge, CAA etc. Can even do
TLSA and DKIM.

This approach does not require callsigns but at the cost of requiring the
user to subscribe to a $10/yr name or be captive to the MSP.


Another possibility is to get rid of the MSP entirely and the CA does the
same function. But then the CA has to be running the DNS for the end user
as well.

I have code implementing about 80% of this scheme today.
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to