Hi Sabrina,

Thanks for the quick turnaround!

We will move this document forward in the publication process at this time.

RFC Editor/mf


> On Jun 17, 2025, at 11:40 AM, Sabrina Tanamal via RT <iana-mat...@iana.org> 
> wrote:
> 
> Hi Megan, 
> 
> These changes are complete: 
> 
> https://www.iana.org/assignments/acme
> 
> Thanks,
> Sabrina
> 
> On Tue Jun 17 14:31:25 2025, mfergu...@staff.rfc-editor.org wrote:
>> IANA,
>> 
>> Please make the following updates to
>> https://www.iana.org/assignments/acme/acme.xhtml#acme-error-types to
>> match the document.
>> 
>> Original:
>> The CA only supports checking CAA for hidden services in-band, but the
>> client has not provided an in-band CAA
>> 
>> New (add “the” and cap Hidden Services):
>> The CA only supports checking the CAA for Hidden Services in-band, but
>> the client has not provided an in-band CAA
>> 
>> Once these updates have been confirmed, this document will be ready to
>> move forward to publication.
>> 
>> Thank you.
>> 
>> RFC Editor/mf
>> 
>> 
>> 
>>> On Jun 6, 2025, at 4:51 PM, Q Misell <q...@as207960.net> wrote:
>>> 
>>> That looks good to me. Happy for this to move to TI.
>>> Any statements contained in this email are personal to the author and
>>> are not necessarily the statements of the company unless specifically
>>> stated. AS207960 Cyfyngedig, having a registered office at 13 Pen-y-
>>> lan Terrace, Caerdydd, Cymru, CF23 9EU, trading as Glauca Digital, is
>>> a company registered in Wales under № 12417574, LEI
>>> 875500FXNCJPAPF3PD10. ICO register №: ZA782876. UK VAT №:
>>> GB378323867. EU VAT №: EU372013983. Turkish VAT №: 0861333524. South
>>> Korean VAT №: 522-80-03080. AS207960 Ewrop OÜ, having a registered
>>> office at Lääne-Viru maakond, Tapa vald, Porkuni küla, Lossi tn 1,
>>> 46001, trading as Glauca Digital, is a company registered in Estonia
>>> under № 16755226. Estonian VAT №: EE102625532. Glauca Digital and the
>>> Glauca logo are registered trademarks in the UK, under №
>>> UK00003718474 and № UK00003718468, respectively.
>>> 
>>> 
>>> 
>>> Ar Gwen, 6 Meh 2025 am 18:26 Megan Ferguson <mfergu...@staff.rfc-
>>> editor.org> ysgrifennodd:
>>> Hi Q,
>>> 
>>> Thank you for the prompt reply.  We have updated the redundant text
>>> (with a few punctuation tweaks pulled back in from our previous
>>> edits).  Please review and approve.
>>> 
>>> We have also noted your request to wait for tooling to handle the
>>> name issue at the AUTH48 status page for this document.  Once we
>>> receive your approval of the last update, we will move this document
>>> to TI state (Tooling Issue) to await resolution.
>>> 
>>> Please review the files carefully as we do not make changes after
>>> publication.
>>> 
>>> The files have been posted here (please refresh):
>>>  https://www.rfc-editor.org/authors/rfc9799.txt
>>>  https://www.rfc-editor.org/authors/rfc9799.pdf
>>>  https://www.rfc-editor.org/authors/rfc9799.html
>>>  https://www.rfc-editor.org/authors/rfc9799.xml
>>> 
>>> The relevant diff files have been posted here (please refresh):
>>>  https://www.rfc-editor.org/authors/rfc9799-diff.html (comprehensive
>>> diff)
>>>  https://www.rfc-editor.org/authors/rfc9799-auth48diff.html (AUTH48
>>> changes only)
>>>  https://www.rfc-editor.org/authors/rfc9799-lastdiff.html (last
>>> version to this)
>>> 
>>> Please contact us with any further updates/questions/comments you may
>>> have.
>>> 
>>> The AUTH48 status page for this document is available here:
>>> 
>>> https://www.rfc-editor.org/auth48/rfc9799
>>> 
>>> Thank you.
>>> 
>>> RFC Editor/mf
>>> 
>>>> On Jun 6, 2025, at 4:54 AM, Q Misell <q...@as207960.net> wrote:
>>>> 
>>>> Hi Megan,
>>>> 
>>>> I'd rather wait a bit longer for the discussion on pull #1246 to
>>>> conclude. I don't mind if this RFC takes a little longer to
>>>> publish, but with my name shown correctly.
>>>> 
>>>> In re the redundant text, indeed I did get confused with other
>>>> questions. You are right, it is redundant. I propose the following
>>>> text instead:
>>>> 
>>>> Tor directory servers are inherently untrusted entities, and as
>>>> such there is no difference in the security model for accepting CAA
>>>> records directly from the ACME client or fetching them over Tor;
>>>> the CAA records are verified using the same hidden service key in
>>>> either case.
>>>> 
>>>> Q
>>>> Any statements contained in this email are personal to the author
>>>> and are not necessarily the statements of the company unless
>>>> specifically stated. AS207960 Cyfyngedig, having a registered
>>>> office at 13 Pen-y-lan Terrace, Caerdydd, Cymru, CF23 9EU, trading
>>>> as Glauca Digital, is a company registered in Wales under №
>>>> 12417574, LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876. UK
>>>> VAT №: GB378323867. EU VAT №: EU372013983. Turkish VAT №:
>>>> 0861333524. South Korean VAT №: 522-80-03080. AS207960 Ewrop OÜ,
>>>> having a registered office at Lääne-Viru maakond, Tapa vald,
>>>> Porkuni küla, Lossi tn 1, 46001, trading as Glauca Digital, is a
>>>> company registered in Estonia under № 16755226. Estonian VAT №:
>>>> EE102625532. Glauca Digital and the Glauca logo are registered
>>>> trademarks in the UK, under № UK00003718474 and № UK00003718468,
>>>> respectively.
>>>> 
>>>> 
>>>> 
>>>> Ar Iau, 5 Meh 2025 am 21:39 Megan Ferguson <mfergu...@staff.rfc-
>>>> editor.org> ysgrifennodd:
>>>> Hi Q,
>>>> 
>>>> Thanks for the prompt reply and the updated XML file.
>>>> We have adopted this version and posted to the links below.
>>>> 
>>>> A few follow-up comments/questions:
>>>> 
>>>> 1) Looks like the issue about your initial is still being discussed
>>>> (see https://github.com/ietf-tools/xml2rfc/pull/1246).
>>>> 
>>>> 2) We may have confused you with Question 14 with side edits
>>>> (sorry!). Please review the following for redundancy and let us
>>>> know if you’d like to make any changes:
>>>> 
>>>> Original:
>>>> 
>>>> Tor directory servers are inherently untrusted entities, and as
>>>> such
>>>> there is no difference in the security model for accepting CAA
>>>> records directly from the ACME client or fetching them over Tor.
>>>> There is no difference in the security model between accepting CAA
>>>> records directly from the ACME client and fetching them over Tor;
>>>> the
>>>> CAA records are verified using the same hidden service key in
>>>> either
>>>> case.
>>>> 
>>>> Please review the files carefully as we do not make changes after
>>>> publication.
>>>> 
>>>> The files have been posted here (please refresh):
>>>>   https://www.rfc-editor.org/authors/rfc9799.txt
>>>>   https://www.rfc-editor.org/authors/rfc9799.pdf
>>>>   https://www.rfc-editor.org/authors/rfc9799.html
>>>>   https://www.rfc-editor.org/authors/rfc9799.xml
>>>> 
>>>> The relevant diff files have been posted here (please refresh):
>>>>   https://www.rfc-editor.org/authors/rfc9799-diff.html
>>>> (comprehensive diff)
>>>>   https://www.rfc-editor.org/authors/rfc9799-auth48diff.html
>>>> (AUTH48 changes only)
>>>> 
>>>> Please contact us with any further updates/questions/comments you
>>>> may have.
>>>> 
>>>> We will await approvals from each of the parties listed on the
>>>> AUTH48 status page prior to moving forward to publication.
>>>> 
>>>> The AUTH48 status page for this document is available here:
>>>> 
>>>> https://www.rfc-editor.org/auth48/rfc9799
>>>> 
>>>> Thank you.
>>>> 
>>>> RFC Editor/mf
>>>> 
>>>>> On Jun 4, 2025, at 7:26 AM, Q Misell
>>>>> <q=40as207960....@dmarc.ietf.org> wrote:
>>>>> 
>>>>> 
>>>>> Thank you for your copy editing; as always, much appreciated!
>>>>> 
>>>>> Attached is my edited XML source, incorporating changes relating
>>>>> to your comments. Below are my responses to all comments.
>>>>> 
>>>>>> The short title that appears in the running header of the pdf
>>>>>> output has been updated to use double quotes around ".onion" to
>>>>>> match the use in the full title.
>>>>> 
>>>>> LGTM.
>>>>> 
>>>>>> Q - currently our tooling does not support the request to
>>>>>> remove the period from following your first name.
>>>>> 
>>>>> I have made a PR to xml2rfc (https://github.com/ietf-
>>>>> tools/xml2rfc/pull/1246) to fix this to my liking.
>>>>> I would appreciate that merged before publication.
>>>>> 
>>>>>> Please insert any keywords
>>>>> 
>>>>> Done.
>>>>> 
>>>>>> Please review our edits to the following text to ensure we have
>>>>>> maintained your intent.
>>>>>> The ACME server SHOULD follow redirects.  Note that these MAY
>>>>>> be redirects to services that are not ".onion" and that the
>>>>>> server SHOULD honor these.
>>>>> 
>>>>> LGTM.
>>>>> 
>>>>>> Please review our updates to this text carefully and let us
>>>>>> know any objections.
>>>>>> An "onion-csr-01" challenge MUST NOT be used to issue
>>>>>> certificates for Special-Use Domain Names that are not
>>>>>> ".onion".
>>>>> 
>>>>> LGTM.
>>>>> 
>>>>>> Please note that sourcecode elements in this document exceed
>>>>>> our character limit
>>>>> 
>>>>> XML edited accordingly.
>>>>> 
>>>>>> Please note that we have updated to use "flags" (plural) to
>>>>>> match the use in Section 4.1.1 of RFC 8659.
>>>>> 
>>>>> No objection.
>>>>> 
>>>>>> In the following instances, please review the use of the BCP 14
>>>>>> keyword with the surrounding text
>>>>> 
>>>>> Fixed in HTML.
>>>>> 
>>>>>> We have deleted the "it" before the comma in this sentence.
>>>>> 
>>>>> LGTM.
>>>>> 
>>>>>> Please note that we believe Section 9.7.8 should actually read
>>>>>> 9.7.4 in the following.
>>>>> 
>>>>> That is correct.
>>>>> 
>>>>>> We believe "ACME Directory Metadata Fields" registry is defined
>>>>>> in Section 9.7.6 of [RFC8555], not Section 9.7.8.
>>>>> 
>>>>> That is correct.
>>>>> 
>>>>>> Please review our update to this text to expand MAC and avoid
>>>>>> using an abbreviation as a verb.
>>>>> 
>>>>> LGTM
>>>>> 
>>>>>> These sentences seem redundant. Please review.
>>>>> 
>>>>> Edits LGTM
>>>>> 
>>>>>> Please note that we have changed the URL of the [spoiled-
>>>>>> onions] reference to point use the DOI rather than the original
>>>>>> URL, which took the reader to a preview page that they couldn't
>>>>>> back out of.
>>>>> 
>>>>> LGTM
>>>>> 
>>>>>> Please review. We found an open-access version of [spoiled-
>>>>>> onions] on arXiv. The information appears to match the current
>>>>>> reference; however, some author names are missing. Would you
>>>>>> prefer to use this open-access version of this reference?
>>>>> 
>>>>> The version I worked from whilst writing this RFC was the one
>>>>> published by Springer. The version on the arXiv appears to be a
>>>>> draft before the paper underwent peer-review, and as such I would
>>>>> rather not use it.
>>>>> 
>>>>>> We assume ".onion" is pronounced as "dot onion" and have thus
>>>>>> left instances of "a ".onion" as they were.
>>>>> 
>>>>> That is correct.
>>>>> 
>>>>>> We see the following similar terms used. Please let us know if
>>>>>> these should be made uniform or if they should remain distinct
>>>>>> terms.
>>>>> 
>>>>> They are all equivalent, I have edited the XML accordingly.
>>>>> 
>>>>>> We note that <tt> tags were used to enclose the following terms
>>>>>> in this document.
>>>>> 
>>>>> XML edited accordingly.
>>>>> 
>>>>>> Please note we have expanded these abbreviations as follows
>>>>> 
>>>>> LGTM
>>>>> 
>>>>>> We note that the original xml file submitted used <eref> to
>>>>>> point to specific sections in the [tor-spec].  Please review if
>>>>>> these links should remain with the following in mind. Please
>>>>>> let us know how you would like to proceed.
>>>>> 
>>>>> As, even during the course of drafting this RFC, the links became
>>>>> outdated, I have opted to remove any <eref>s to Tor spec
>>>>> documents.
>>>>> 
>>>>>> Please consider whether the “type" attribute of any sourcecode
>>>>>> element should be set and/or has been set correctly.
>>>>> 
>>>>> I'm happy with the type attributes as they are.
>>>>> 
>>>>>> Please note that CSR (the abbreviation at least) is not used in
>>>>>> either Appendix B.2.b of [cabf-br] or [RFC2986].  Please review
>>>>>> the citations in this document and let us know if any updates
>>>>>> are necessary/desirable.
>>>>> 
>>>>> I've expanded the abbreviation to Certificate Request where
>>>>> appropriate in the XML.
>>>>> Any statements contained in this email are personal to the author
>>>>> and are not necessarily the statements of the company unless
>>>>> specifically stated. AS207960 Cyfyngedig, having a registered
>>>>> office at 13 Pen-y-lan Terrace, Caerdydd, Cymru, CF23 9EU,
>>>>> trading as Glauca Digital, is a company registered in Wales under
>>>>> № 12417574, LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876.
>>>>> UK VAT №: GB378323867. EU VAT №: EU372013983. Turkish VAT №:
>>>>> 0861333524. South Korean VAT №: 522-80-03080. AS207960 Ewrop OÜ,
>>>>> having a registered office at Lääne-Viru maakond, Tapa vald,
>>>>> Porkuni küla, Lossi tn 1, 46001, trading as Glauca Digital, is a
>>>>> company registered in Estonia under № 16755226. Estonian VAT №:
>>>>> EE102625532. Glauca Digital and the Glauca logo are registered
>>>>> trademarks in the UK, under № UK00003718474 and № UK00003718468,
>>>>> respectively.
>>>>> 
>>>>> 
>>>>> 
>>>>> Ar Llun, 2 Meh 2025 am 22:53 <rfc-edi...@rfc-editor.org>
>>>>> ysgrifennodd:
>>>>> Q,
>>>>> 
>>>>> While reviewing this document during AUTH48, please resolve (as
>>>>> necessary) the following questions, which are also in the XML
>>>>> file.
>>>>> 
>>>>> 1) <!-- [rfced] Please note that the title of the document has
>>>>> been
>>>>>     updated as follows:
>>>>> 
>>>>> The short title that appears in the running header of the pdf
>>>>> output has been updated to use double quotes around ".onion" to
>>>>> match the use in the full title.
>>>>> 
>>>>> Original:
>>>>> 
>>>>> ACME for .onion
>>>>> Current:
>>>>> ACME for ".onion"
>>>>> -->
>>>>> 
>>>>> 
>>>>> 2) <!--[rfced] Q - currently our tooling does not support the
>>>>> request to
>>>>>     remove the period from following your first name.  Please
>>>>> see
>>>>>     https://github.com/ietf-tools/xml2rfc/issues/1204.  We have
>>>>>     commented on this issue to raise awareness that you document
>>>>> is
>>>>>     now in AUTH48 and publication is nearing.
>>>>> 
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 3) <!-- [rfced] Please insert any keywords (beyond those that
>>>>> appear in
>>>>> the title) for use on https://www.rfc-editor.org/search. -->
>>>>> 
>>>>> 
>>>>> 4) <!--[rfced] Please review our edits to the following text to
>>>>> ensure we
>>>>>     have maintained your intent.
>>>>> 
>>>>> Original:
>>>>>   The ACME server SHOULD follow redirects; note that these MAY
>>>>> be
>>>>>   redirects to non-".onion" services, and the server SHOULD
>>>>> honour
>>>>>   these.
>>>>> 
>>>>> Current:
>>>>>   The ACME server SHOULD follow redirects.  Note that these MAY
>>>>> be
>>>>>   redirects to services that are not ".onion" and that the
>>>>> server
>>>>>   SHOULD honor these.
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 5) <!--[rfced] Please review our updates to this text carefully
>>>>> and let
>>>>>     us know any objections.
>>>>> 
>>>>> Original:
>>>>> 
>>>>> An "onion-csr-01" MUST NOT be used to issue certificates for non
>>>>> ".onion" Special-Use Domain Names.
>>>>> 
>>>>> Current:
>>>>>    An "onion-csr-01" challenge MUST NOT be used to issue
>>>>> certificates for
>>>>>   Special-Use Domain Names that are not ".onion".
>>>>> -->
>>>>> 
>>>>> 
>>>>> 6) <!--[rfced] Please note that sourcecode elements in this
>>>>> document
>>>>>     exceed our character limit (see
>>>>>     https://authors.ietf.org/en/drafting-in-plaintext for the 69
>>>>>     character limit on sourcecode elements).  Please review
>>>>>     throughout the document and let us know how these may be
>>>>> changed
>>>>>     (or feel free to update/replace in the edited XML file
>>>>> yourself
>>>>>     if this is more convenient).-->
>>>>> 
>>>>> 
>>>>> 7) <!--[rfced] Please note that we have updated to use "flags"
>>>>> (plural)
>>>>>     to match the use in Section 4.1.1 of RFC 8659.  Please let
>>>>> us
>>>>>     know any objections.
>>>>> 
>>>>> 
>>>>> Original:
>>>>>   The contents of "flag", "tag", and "value" are as per Section
>>>>> 4.1.1
>>>>>   of [RFC8659].
>>>>> 
>>>>> Current:
>>>>>   The contents of "flags", "tag", and "value" are as per Section
>>>>> 4.1.1
>>>>>    of [RFC8659].
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 8) <!--[rfced] In the following instances, please review the use
>>>>> of the
>>>>>     BCP 14 keyword with the surrounding text (i.e., also and
>>>>> always
>>>>>     specifically).
>>>>> 
>>>>> 
>>>>> Original:
>>>>> 
>>>>> A hidden service operator MAY also not wish to publish a CAA
>>>>> record
>>>>> set in its service descriptor to avoid revealing information
>>>>> about the
>>>>> service operator.
>>>>> 
>>>>> Perhaps:
>>>>> Also, a hidden service operator MAY not wish to publish a CAA
>>>>> record
>>>>> set in its service descriptor to avoid revealing information
>>>>> about the
>>>>> service operator.
>>>>> 
>>>>> 
>>>>> 
>>>>> Original:
>>>>> In any case, the server always MAY fetch the record set from the
>>>>> service descriptor.
>>>>> 
>>>>> Perhaps:
>>>>> In any case, the server MAY fetch the record set from the
>>>>> service descriptor.
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 9) <!--[rfced] We have deleted the "it" before the comma in this
>>>>>     sentence.  Please let us know if some other rephrase was
>>>>>     intended.
>>>>> 
>>>>> Original:
>>>>>   If an ACME server does not support fetching a service's CAA
>>>>> record
>>>>>   set from its service descriptor it, and the ACME client does
>>>>> not
>>>>>   provide an "onionCAA" object in its finalize request the ACME
>>>>> server
>>>>>   MUST respond with an "onionCAARequired" error to indicate
>>>>> this.
>>>>> 
>>>>> Current:
>>>>>   If an ACME server does not support fetching a service's CAA
>>>>> record
>>>>>   set from its service descriptor, and the ACME client does not
>>>>>   provide an "onionCAA" object in its finalize request, the ACME
>>>>> server
>>>>>   MUST respond with an "onionCAARequired" error to indicate
>>>>> this.
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 10) <!--[rfced] Please note that any changes affecting IANA
>>>>> registries
>>>>>     will be communicated to IANA by the RPC once AUTH48
>>>>> completes.-->
>>>>> 
>>>>> 
>>>>> 11) <!-- [rfced] Please note that we believe Section 9.7.8 should
>>>>> actually
>>>>>     read 9.8.4 in the following.  Please review and confirm our
>>>>>     update.
>>>>> 
>>>>> Original:
>>>>>   Per this document, one new entry has been added to the "ACME
>>>>>   Validation Methods" registry defined in Section 9.7.8 of
>>>>> [RFC8555]...
>>>>> 
>>>>> Current:
>>>>>   Per this document, one new entry has been added to the "ACME
>>>>>   Validation Methods" registry defined in Section 9.7.4 of
>>>>> [RFC8555]...
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 12) <!-- [rfced] We believe "ACME Directory Metadata Fields"
>>>>> registry is
>>>>>     defined in Section 9.7.6 of [RFC8555], not Section 9.7.8.
>>>>> Please
>>>>>     confirm our update.
>>>>>        -->
>>>>> 
>>>>> 
>>>>> 13) <!--[rfced] Please review our update to this text to expand
>>>>> MAC and
>>>>>     avoid using an abbreviation as a verb (see
>>>>>     https://www.rfc-
>>>>> editor.org/styleguide/part2/#abbrev_as_verb).  If
>>>>>     this does not correctly capture your intent, please let us
>>>>> know
>>>>>     how we may rephrase.
>>>>> 
>>>>> Original:
>>>>>   The second layer descriptor is signed, encrypted and MACed in
>>>>> a way
>>>>>   that only a party with access to the secret key of the hidden
>>>>> service
>>>>>   could manipulate what is published there.
>>>>> 
>>>>> Current:
>>>>>   The second layer descriptor is signed, encrypted, and encoded
>>>>> using
>>>>>   Message Authentication Code (MAC) in a way that only a party
>>>>> with
>>>>>   access to the secret key of the hidden service could
>>>>> manipulate
>>>>>   what is published there.
>>>>> 
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 14) <!--[rfced] These sentences seem redundant.  Please review.
>>>>> 
>>>>> Original:
>>>>> 
>>>>> Tor directory servers are inherently untrusted entities, and as
>>>>> such
>>>>> there is no difference in the security model for accepting CAA
>>>>> records directly from the ACME client or fetching them over Tor.
>>>>> There is no difference in the security model between accepting
>>>>> CAA
>>>>> records directly from the ACME client and fetching them over Tor;
>>>>> the
>>>>> CAA records are verified using the same hidden service key in
>>>>> either
>>>>> case.
>>>>> -->
>>>>> 
>>>>> 
>>>>> 15) <!-- [rfced] Please note that we have changed the URL of the
>>>>>     [spoiled-onions] reference to point use the DOI rather than
>>>>> the
>>>>>     original URL, which took the reader to a preview page that
>>>>> they
>>>>>     couldn't back out of.  Please review.
>>>>> 
>>>>> Original:
>>>>> https://rdcu.be/d1ZRp
>>>>> 
>>>>> Current:
>>>>> https://doi.org/10.1007/978-3-319-08506-7_16
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 16) <!-- [rfced] Please review. We found an open-access version
>>>>> of
>>>>> [spoiled-onions] on arXiv. The information appears to match the
>>>>> current reference; however, some author names are missing. Would
>>>>> you
>>>>> prefer to use this open-access version of this reference? -->
>>>>> 
>>>>> 
>>>>> 17)   <!--[rfced] We have the following questions related to
>>>>> terminology
>>>>>       used throughout the document:
>>>>> 
>>>>> a) We assume ".onion" is pronounced as "dot onion" and have thus
>>>>> left
>>>>> instances of "a ".onion" as they were.  If this is incorrect,
>>>>> please
>>>>> let us know and we can update to "an ".onion"" as necessary.
>>>>> 
>>>>> b) We see the following similar terms used.  Please let us know
>>>>> if these should be made uniform or if they s
>>>>> hould remain distinct terms:
>>>>> 
>>>>> first layer hidden service descriptor vs. first layer descriptor
>>>>> second layer hidden service descriptor vs. second layer
>>>>> descriptor
>>>>> Hidden Service vs. hidden service
>>>>> ".onion" service vs. "Onion Services"
>>>>> http-01 vs. "http-01"
>>>>> tls-alpn-01 vs. "tls-alpn-01"
>>>>> 
>>>>> c) We note that <tt> tags were used to enclose the following
>>>>> terms in
>>>>> this document.  Please review use for consistency as we note they
>>>>> were
>>>>> not used on every occurrence.  Please also review the output of
>>>>> the
>>>>> <tt> tags in all formats (html, pdf, text) to ensure
>>>>> satisfaction.
>>>>> 
>>>>> <tt>applicantSigningNonce</tt>
>>>>> <tt>auth-client</tt>
>>>>> <tt>caSigningNonce</tt>
>>>>> <tt>"onion-csr-01".</tt>
>>>>> -->
>>>>> 
>>>>> 
>>>>> 18) <!--[rfced] Please review the following questions/comments
>>>>> regarding
>>>>>     abbreviation use in this document:
>>>>> 
>>>>> a) Please note we have expanded these abbreviations as follows
>>>>> (per
>>>>> the reference in parentheses when applicable).  Please review and
>>>>> let
>>>>> us know any objections/corrections:
>>>>> 
>>>>> 
>>>>> CSR - Certificate Signing Request (RFC 8555)
>>>>> PEM - Privacy Enhanced Mail (RFC 4648)
>>>>> TLD - Top-Level Domain
>>>>> ECH - Encrypted ClientHello (draft-ietf-tls-esni-24)
>>>>> 
>>>>> b) Please note that CSR (the abbreviation at least) is not used
>>>>> in
>>>>> either Appendix B.2.b of [cabf-br] or [RFC2986].  Please review
>>>>> the
>>>>> citations in this document and let us know if any updates are
>>>>> necessary/desirable.
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> 19) <!--[rfced] We note that the original xml file submitted used
>>>>> <eref>
>>>>>     to point to specific sections in the [tor-spec].  Please
>>>>> review
>>>>>     if these links should remain with the following in mind:
>>>>> 
>>>>> a) These links make a difference in the output formats as
>>>>> follows:
>>>>> 
>>>>> html (where the section names are linked):
>>>>> To this end, an additional field in the challenge object is
>>>>> defined to allow the ACME server to advertise th
>>>>> e Ed25519 public key it will use (as per the "Authentication
>>>>> during the introduction phase" section of [tor-
>>>>> spec]) to authenticate itself when retrieving the hidden service
>>>>> descriptor.
>>>>> 
>>>>> txt (where the link appears in-line):
>>>>> To this end, a new field is added to the second layer hidden
>>>>> service
>>>>> descriptor, as defined in the "Second layer plaintext format"
>>>>> (https://spec.torproject.org/rend-spec/hsdesc-
>>>>> encrypt.html#second-
>>>>> layer-plaintext) section of [tor-spec] with the following format
>>>>> (defined using the notation from the "netdoc document meta-
>>>>> format"
>>>>> (https://spec.torproject.org/dir-spec/netdoc.html) section of
>>>>> [tor-spec]):
>>>>> 
>>>>> b) These links may become stale quickly as [tor-spec] mentions an
>>>>> upcoming reorganization and that it is a living document.
>>>>> 
>>>>> An alternative would be to remove the links but include the
>>>>> section
>>>>> names in the text itself (i.e., not use <eref>) and allow the
>>>>> reader
>>>>> to simply navigate to the section from the main [tor-spec] link.
>>>>> This
>>>>> would allow the html and text versions to be the same.
>>>>> 
>>>>> Please let us know how you would like to proceed.
>>>>> -->
>>>>> 
>>>>> 
>>>>> 20) <!-- [rfced] Please consider whether the “type" attribute of
>>>>> any
>>>>>     sourcecode element should be set and/or has been set
>>>>> correctly.
>>>>> 
>>>>> The current list of preferred values for "type" is available at
>>>>> <https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-
>>>>> types>.
>>>>> If the current list does not contain an applicable type, feel
>>>>> free to
>>>>> suggest additions for consideration. Note that it is also
>>>>> acceptable
>>>>> to leave the "type" attribute not set.
>>>>> -->
>>>>> 
>>>>> 
>>>>> 21) <!-- [rfced] Please review the "Inclusive Language" portion
>>>>> of the
>>>>>     online Style Guide
>>>>>     <https://www.rfc-
>>>>> editor.org/styleguide/part2/#inclusive_language>
>>>>>     and let us know if any changes are needed.  Updates of this
>>>>>     nature typically result in more precise language, which is
>>>>>     helpful for readers.
>>>>> 
>>>>> Note that our script did not flag any words in particular, but
>>>>> this
>>>>> should still be reviewed as a best practice.
>>>>> 
>>>>> -->
>>>>> 
>>>>> 
>>>>> Thank you.
>>>>> 
>>>>> RFC Editor/mf
>>>>> 
>>>>> *****IMPORTANT*****
>>>>> 
>>>>> Updated 2025/06/02
>>>>> 
>>>>> RFC Author(s):
>>>>> --------------
>>>>> 
>>>>> Instructions for Completing AUTH48
>>>>> 
>>>>> Your document has now entered AUTH48.  Once it has been reviewed
>>>>> and
>>>>> approved by you and all coauthors, it will be published as an
>>>>> RFC.
>>>>> If an author is no longer available, there are several remedies
>>>>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
>>>>> 
>>>>> You and you coauthors are responsible for engaging other parties
>>>>> (e.g., Contributors or Working Group) as necessary before
>>>>> providing
>>>>> your approval.
>>>>> 
>>>>> Planning your review
>>>>> ---------------------
>>>>> 
>>>>> Please review the following aspects of your document:
>>>>> 
>>>>> *  RFC Editor questions
>>>>> 
>>>>> Please review and resolve any questions raised by the RFC Editor
>>>>> that have been included in the XML file as comments marked as
>>>>> follows:
>>>>> 
>>>>> <!-- [rfced] ... -->
>>>>> 
>>>>> These questions will also be sent in a subsequent email.
>>>>> 
>>>>> *  Changes submitted by coauthors
>>>>> 
>>>>> Please ensure that you review any changes submitted by your
>>>>> coauthors.  We assume that if you do not speak up that you
>>>>> agree to changes submitted by your coauthors.
>>>>> 
>>>>> *  Content
>>>>> 
>>>>> Please review the full content of the document, as this cannot
>>>>> change once the RFC is published.  Please pay particular
>>>>> attention to:
>>>>> - IANA considerations updates (if applicable)
>>>>> - contact information
>>>>> - references
>>>>> 
>>>>> *  Copyright notices and legends
>>>>> 
>>>>> Please review the copyright notice and legends as defined in
>>>>> RFC 5378 and the Trust Legal Provisions
>>>>> (TLP – https://trustee.ietf.org/license-info).
>>>>> 
>>>>> *  Semantic markup
>>>>> 
>>>>> Please review the markup in the XML file to ensure that elements
>>>>> of
>>>>> content are correctly tagged.  For example, ensure that
>>>>> <sourcecode>
>>>>> and <artwork> are set correctly.  See details at
>>>>> <https://authors.ietf.org/rfcxml-vocabulary>.
>>>>> 
>>>>> *  Formatted output
>>>>> 
>>>>> Please review the PDF, HTML, and TXT files to ensure that the
>>>>> formatted output, as generated from the markup in the XML file,
>>>>> is
>>>>> reasonable.  Please note that the TXT will have formatting
>>>>> limitations compared to the PDF and HTML.
>>>>> 
>>>>> 
>>>>> Submitting changes
>>>>> ------------------
>>>>> 
>>>>> To submit changes, please reply to this email using ‘REPLY ALL’
>>>>> as all
>>>>> the parties CCed on this message need to see your changes. The
>>>>> parties
>>>>> include:
>>>>> 
>>>>> *  your coauthors
>>>>> 
>>>>> *  rfc-edi...@rfc-editor.org (the RPC team)
>>>>> 
>>>>> *  other document participants, depending on the stream (e.g.,
>>>>>   IETF Stream participants are your working group chairs, the
>>>>>  responsible ADs, and the document shepherd).
>>>>> 
>>>>> *  auth48archive@rfc-editor.org, which is a new archival mailing
>>>>> list
>>>>>   to preserve AUTH48 conversations; it is not an active
>>>>> discussion
>>>>>  list:
>>>>> 
>>>>> *  More info:
>>>>>   https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-
>>>>> 4Q9l2USxIAe6P8O4Zc
>>>>> 
>>>>> *  The archive itself:
>>>>>   https://mailarchive.ietf.org/arch/browse/auth48archive/
>>>>> 
>>>>> *  Note: If only absolutely necessary, you may temporarily opt
>>>>> out
>>>>>  of the archiving of messages (e.g., to discuss a sensitive
>>>>> matter).
>>>>>   If needed, please add a note at the top of the message that
>>>>> you
>>>>>   have dropped the address. When the discussion is concluded,
>>>>>   auth48archive@rfc-editor.org will be re-added to the CC list
>>>>> and
>>>>>   its addition will be noted at the top of the message.
>>>>> 
>>>>> You may submit your changes in one of two ways:
>>>>> 
>>>>> An update to the provided XML file
>>>>> — OR —
>>>>> An explicit list of changes in this format
>>>>> 
>>>>> Section # (or indicate Global)
>>>>> 
>>>>> OLD:
>>>>> old text
>>>>> 
>>>>> NEW:
>>>>> new text
>>>>> 
>>>>> You do not need to reply with both an updated XML file and an
>>>>> explicit
>>>>> list of changes, as either form is sufficient.
>>>>> 
>>>>> We will ask a stream manager to review and approve any changes
>>>>> that seem
>>>>> beyond editorial in nature, e.g., addition of new text, deletion
>>>>> of text,
>>>>> and technical changes.  Information about stream managers can be
>>>>> found in
>>>>> the FAQ.  Editorial changes do not require approval from a stream
>>>>> manager.
>>>>> 
>>>>> 
>>>>> Approving for publication
>>>>> --------------------------
>>>>> 
>>>>> To approve your RFC for publication, please reply to this email
>>>>> stating
>>>>> that you approve this RFC for publication.  Please use ‘REPLY
>>>>> ALL’,
>>>>> as all the parties CCed on this message need to see your
>>>>> approval.
>>>>> 
>>>>> 
>>>>> Files
>>>>> -----
>>>>> 
>>>>> The files are available here:
>>>>>   https://www.rfc-editor.org/authors/rfc9799.xml
>>>>>   https://www.rfc-editor.org/authors/rfc9799.html
>>>>>   https://www.rfc-editor.org/authors/rfc9799.pdf
>>>>>   https://www.rfc-editor.org/authors/rfc9799.txt
>>>>> 
>>>>> Diff file of the text:
>>>>>   https://www.rfc-editor.org/authors/rfc9799-diff.html
>>>>>   https://www.rfc-editor.org/authors/rfc9799-rfcdiff.html (side
>>>>> by side)
>>>>> 
>>>>> Diff of the XML:
>>>>>  https://www.rfc-editor.org/authors/rfc9799-xmldiff1.html
>>>>> 
>>>>> 
>>>>> Tracking progress
>>>>> -----------------
>>>>> 
>>>>> The details of the AUTH48 status of your document are here:
>>>>>   https://www.rfc-editor.org/auth48/rfc9799
>>>>> 
>>>>> Please let us know if you have any questions.
>>>>> 
>>>>> Thank you for your cooperation,
>>>>> 
>>>>> RFC Editor
>>>>> 
>>>>> --------------------------------------
>>>>> RFC9799 (draft-ietf-acme-onion-07)
>>>>> 
>>>>> Title            : Automated Certificate Management Environment
>>>>> (ACME) Extensions for ".onion" Special-Use Domain Names
>>>>> Author(s)        : Q. Misell
>>>>> WG Chair(s)      : Yoav Nir, Tomofumi Okubo
>>>>> 
>>>>> Area Director(s) : Deb Cooley, Paul Wouters
>>>>> 
>>>>> 
>>>>> <rfc9799.xml>
>>>> 
>>>> 
>>>> 
>>>> 
>>> 
> 


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to