diff --git a/draft-ietf-acme-onion.xml b/draft-ietf-acme-onion.xml index 0f0639b..c006fba 100644 --- a/draft-ietf-acme-onion.xml +++ b/draft-ietf-acme-onion.xml @@ -8,7 +8,8 @@ ]> + ipr="trust200902" submissionType="IETF" category="std" version="3" docName="draft-ietf-acme-onion-latest" + consensus="true"> Automated Certificate Management Environment (ACME) Extensions for ".onion" Special-Use Domain Names @@ -22,7 +23,7 @@ CF23 9EU United Kingdom - q@as207970.net + q@as207960.net q@magicalcodewit.ch https://magicalcodewit.ch @@ -65,8 +66,8 @@ The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, NOT RECOMMENDED, MAY, and OPTIONAL in this document are to be - interpreted as described in when, and only when, they appear in all capitals, - as shown here. + interpreted as described in (, ) when, + and only when, they appear in all capitals, as shown here. @@ -113,7 +114,9 @@ ".onion" Special-Use Domain Names, with the modifications defined in this standard, namely , and . The ACME server SHOULD follow redirects; note that these MAY be redirects to - non ".onion" services, and the server SHOULD honour these. + non ".onion" services, and the server SHOULD honour these. See + for security considerations on why a server might not want to + follow redirects.
Existing "tls-alpn-01" Challenge @@ -136,8 +139,9 @@
The string onion-csr-01
nonce (required, string)
A Base64 encoded nonce, including padding characters. - It MUST contain at least 64 bits of entropy. A response generating using this nonce - MUST NOT be accepted by the ACME server if the nonce was generated more than 30 days ago.
+ It MUST contain at least 64 bits of entropy. A response generated using this nonce + MUST NOT be accepted by the ACME server if the nonce used was generated by the server more + than 30 days ago.
authKey (optional, object)
The Ed25519 public key encoded as per .
@@ -187,7 +191,7 @@ applicantSigningNonce ATTRIBUTE ::= { The public key presented in this CSR MUST be the public key corresponding to the ".onion" Special-Use Domain Name being validated. It MUST NOT be the same public key presented in the CSR to finalize the order. - Client respond with the following object to validate the challenge: + Clients respond with the following object to validate the challenge:
csr (required, string)
@@ -296,7 +300,7 @@ introduction-point AwAGsAk5nSMpAhRqhMHbTFCTSlfhP8f5PqUhe6DatgMgk7kSL3 there is in the DNS there is no need, nor indeed any method available, to search up the DNS tree for a relevant CAA record set. Similarly, it is also impossible to check CAA records on the "onion" Special-Use TLD, as it does not exist in any form except as described in , so implementors - MUST not look here either. + MUST NOT look here either. Instead all subdomains under a ".onion" Special-Use Domain Name share the same CAA record set. That is, all of these share a CAA record set with "a.onion":
    diff --git a/lib b/lib index c35bd65..329c20b 160000 --- a/lib +++ b/lib @@ -1 +1 @@ -Subproject commit c35bd65c0239cc39a8376bb2bc6a160a4a85f367 +Subproject commit 329c20bc039eb3278df377bdd545e6466fae3fc7