Hi Orie,

Thanks for the very detailed comments!

> I'm sure its been considered, but I will state it it anyway, the csr can
be transported as the payload without json object encapsulation.

Unfortunately, the CA/BF does not allow this, so we're stuck with DER
encoding for the time being.

> Consider an alternative citation for "acmeforonions.org", and although
this is a style nit, I prefer to use examples that are not functional, and
will therefore age consistently, such as acmeforonions.example.

Good catch! Will amend.

> Is this really a MUST? given the "impossible" comment?

Yes it probably is. Will amend.

> The use of SHOULD here, implies there are alternatives which might be
better choices, I wonder what those might be.

On the contrary. There are alternative that are worse choices (that is
connecting over the plain internet) - however the use of Tor to connect to
an ACME server isn't always feasible, hence the should.

> This is a proposed standard from a WG, hopefully the working group is
supportive of this path as well : ) This comment also applies to Appendix A.

A few people noticed this mistake, it will be fixed in the next revision.

> The next section basically says this, so maybe its a no-op, but I'd
prefer stronger warnings than SHOULD on this front.

I will amend SHOULD to MUST in where appropriate.

Q
------------------------------

Any statements contained in this email are personal to the author and are
not necessarily the statements of the company unless specifically stated.
AS207960 Cyfyngedig, having a registered office at 13 Pen-y-lan Terrace,
Caerdydd, Cymru, CF23 9EU, trading as Glauca Digital, is a company
registered in Wales under № 12417574
<https://find-and-update.company-information.service.gov.uk/company/12417574>,
LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876
<https://ico.org.uk/ESDWebPages/Entry/ZA782876>. UK VAT №: GB378323867. EU
VAT №: EU372013983. Turkish VAT №: 0861333524. South Korean VAT №:
522-80-03080. AS207960 Ewrop OÜ, having a registered office at Lääne-Viru
maakond, Tapa vald, Porkuni küla, Lossi tn 1, 46001, trading as Glauca
Digital, is a company registered in Estonia under № 16755226. Estonian VAT
№: EE102625532. Glauca Digital and the Glauca logo are registered
trademarks in the UK, under № UK00003718474 and № UK00003718468,
respectively.


Ar Maw, 7 Ion 2025 am 18:48 Orie Steele via Datatracker <nore...@ietf.org>
ysgrifennodd:

> Orie Steele has entered the following ballot position for
> draft-ietf-acme-onion-05: Yes
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-acme-onion/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> # Orie Steele, ART AD, comments for draft-ietf-acme-onion-05
> CC @OR13
>
> * line numbers:
>   -
>
> https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-acme-onion-05.txt&submitcheck=True
>
> * comment syntax:
>   - https://github.com/mnot/ietf-comments/blob/main/format.md
>
> * "Handling Ballot Positions":
>   -
> https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/
>
> ## Comments
>
> ### Double encoding
>
> ```
> 270        csr (required, string)  The CSR in the base64url-encoded
> version of
> 271           the DER format.  (Note: Because this field uses base64url,
> and
> 272           does not include headers, it is different from PEM.)
> ```
>
> Its a shame there is double encoding here, but I gather it is to support
> extensibility.
>
> I'm sure its been considered, but I will state it it anyway, the csr can be
> transported as the payload without json object encapsulation.
>
> For example:
>
> ```
> 278        {
> 279          "protected": base64url({
> 280            "alg": "ES256",
> 281            "kid": "https://example.com/acme/acct/evOfKhNU60wg";,
> 282            "nonce": "UQI1PoRi5OuXzxuX7V7wL0",
> 283            "url": "https://example.com/acme/chall/bbc625c5";,
>            "cty": "application/pkcs10",
> 284          }),
> 285          "payload": base64url( <<bytes>> ),
> 288          "signature": "Q1bURgJoEslbD1c5...3pYdSMLio57mQNN4"
> 289        }
> ```
>
> I see that the extensibility to the payload is later used for "onionCAA"
> in an
> example, so feel free to ignore this comment, assuming that parameter is
> not
> natural to include in the CSR.
>
> ### indeterminate wait
>
> ```
> 341        In the case the Ed25519 public key is novel to the client it
> will
> 342        have to resign and republish its hidden service descriptor.  It
> 343        SHOULD wait some (indeterminate) amount of time for the new
> 344        descriptor to propagate the Tor hidden service directory
> servers,
> 345        before proceeding with responding to the challenge.  This
> should take
> 346        no more than a few minutes.  This specification does not set a
> fixed
> ```
>
> It is sorta determined below...
> Also, if the should is ignored or the window is too short, the check will
> fail,
> so this is really a MUST wait for the service to be published to the
> network,
> and the timing is simply unknown?
>
> ### acmeforonions.org
>
> ```
> 386        create2-formats 2
> 387        single-onion-service
> 388        caa 128 issue "test.acmeforonions.org
> ;validationmethods=onion-csr-01"
> 389        caa 0 iodef "mailto:secur...@example.com";
> 390        introduction-point
> AwAGsAk5nSMpAhRqhMHbTFCTSlfhP8f5PqUhe6DatgMgk7kSL3
> 391                KHCZUZ3C6tXDeRfM9SyNY0DlgbF8q+QSaGKCs=
> 392        ...
> ```
>
> Very cool site!
> It is mentioned in the implementation report, but that will be removed on
> publication. Consider an alternative citation for "acmeforonions.org", and
> although this is a style nit, I prefer to use examples that are not
> functional,
> and will therefore age consistently, such as acmeforonions.example.
>
> Consider that "acmeforonions.org" may change ownership or content in the
> future.
>
> ### SHOULD wait?
>
> ```
> 426        If the hidden service has client authentication enabled then it
> will
> 427        be impossible for the ACME server to decrypt the second layer
> 428        descriptor to read the CAA records until the ACME server's
> public key
> 429        has been added to the first layer descriptor.  To this end an
> ACME
> 430        server SHOULD wait until the client responds to an authorization
> 431        before checking CAA, and treat this response as indication that
> their
> 432        public key has been added and that the ACME server will be able
> to
> 433        decrypt the second layer descriptor.
> ```
>
> Is this really a MUST? given the "impossible" comment?
>
> ### Alternative channels for requesting certs
>
> ```
> 755        ACME clients SHOULD connect to ACME servers over the Tor
> network to
> 756        alleviate this, preferring a hidden service endpoint if the CA
> 757        provides such a service.
> ```
>
> The use of SHOULD here, implies there are alternatives which might be
> better
> choices, I wonder what those might be.
>
> ## Nits
>
> ### Framing
>
> ```
> 652        suitability.  The reasons the author wishes to pursue this path
> in
> 653        the first place are detailed in Appendix A.  It is felt that
> there is
> ```
>
> This is a proposed standard from a WG, hopefully the working group is
> supportive of this path as well : )
>
> This comment also applies to Appendix A.
>
> ### MUST consider privacy
>
> ```
> 709        A site operator SHOULD consider the privacy implications of
> 710        redirecting to a non-".onion" site - namely that the ACME server
> 711        operator will then be able to learn information about the site
> 712        redirected to that they would not if accessed via a ".onion"
> Special-
> 713        Use Domain Name, such as its IP address.  If the site
> redirected to
> ```
>
> I'm not sure why making it not a MUST is better guidance.
> There are a few other SHOULD consider's in Sec Considerations, which seem
> like
> MUSTs to me.
>
> Especially this section:
>
> ```
> 759        If an ACME client requests a publicly trusted WebPKI
> certificate it
> 760        will expose the existence of the Hidden Service publicly due to
> its
> 761        inclusion in Certificate Transparency logs [RFC9162].  Hidden
> Service
> 762        operators SHOULD consider the privacy implications of this
> before
> 763        requesting WebPKI certificates.  ACME client developers SHOULD
> warn
> 764        users about the risks of CT logged certificates for hidden
> services.
> ```
>
> Especially risky for experimental / test / demographic specific sub
> environments, like high-value.target.....onion.
>
> The next section basically says this, so maybe its a no-op, but I'd prefer
> stronger warnings than SHOULD on this front.
>
>
>
>
_______________________________________________
Acme mailing list -- acme@ietf.org
To unsubscribe send an email to acme-le...@ietf.org

Reply via email to