[Acme] Re: WGLC for draft-ietf-acme-ari

2024-10-28 Thread Yoav Nir
Hi, Again. On 7 Oct 2024, at 20:56, Yoav Nir wrote: > Hi, all > > This begins a working group last call for the ARI draft [1] > > If you haven’t done so recently, please read the latest (-05) version of the > draft, and send comments to the list. > > Due to the Jewish holidays and my upcomi

[Acme] Re-confirming draft-ietf-acme-dtnnodeid-15

2024-10-28 Thread Yoav Nir
Hi, folks. The subject draft was approved in the ACME group back in 2021. Since then it has been waiting on a dependency from the DTN group. This is finally resolved, and our (former) AD asked us to re-confirm consensus before proceeding it. If you have any objectsions to having this draft pr

[Acme] Re: ACME validation methods naming consistency

2024-10-28 Thread Q Misell
Hi Brian, I don't think we ever really decided what a challenge name in ACME is *supposed* to be - it's merely a string of characters that happen to refer to a particular standard. Given this it's pretty much up to you. If you don't feel very strongly about it leave it as "dtn-nodeid-01", otherwis

[Acme] Re: ACME validation methods naming consistency

2024-10-28 Thread Michael Richardson
Q Misell wrote: > Given this it's pretty much up to you. If you don't feel very strongly > about it leave it as "dtn-nodeid-01", otherwise changing it to > "bp-nodeid-00" also seems fine to me. While the thing being authorized is a DTN BundleEID, it seems that the transport used for

[Acme] Re: new acme draft -- rats identifier and challenge

2024-10-28 Thread Liuchunchi(Peter)
Hi Meiling, >> Problem: Certificate forgery issue It’s not exactly about certificate forgery. It’s about issuing certificates to posture/trustworthiness-checked accessing devices, more like an authorization challenge. So maybe this answers Q1? >> The certificate verifier verifies that the holder