-
-
Notifications
You must be signed in to change notification settings - Fork 614
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement RFC 8738: ACME IP Identifier Validation #2706
Comments
Yes, CPS 7.1.5 restricts issuance of certs for IP addresses. |
Definitely yep to both. |
Any thoughts on determining the values of either? Not really sure how we'd go about figuring out which CIDRs to block, is there a public CIDR list? |
Oh, I misread; was thinking of private CIDRs, which of course we want to block. Blocking CIDRs belonging to ISPs seems counterproductive; I expect home servers to be a popular use case for IP certs. You should also ping the Technical Advisory Board for thoughts. |
copied from forum: After my PR for add support for draft-acme-ip on pebble merged, I looked at boulder code to implement on it too and searched possible problems about it.(like what’s the point of pebble only support?), and this is what I found in first hour…
and from discussion on top … it looks like wfe check there is no identifier type other then DNS, then just send names to RA, and RA recreate identifiers with hard-corded identfiertype dns I think update wfe1 and 2 to send full identifiers to RA, and update RA do deal with it. |
@orangepizza One thing I forgot to mention on the forum thread: We would only want to implement ACME-IP for the ACME v2 RFC 8555 API, not the legacy ACME v1 API. |
it was more about as current WFE send order domains as []string and RA rebuild []Identifier with hard-corded dns type, but it need to change WFEs to send []Identifier and RA receive []Identifier as input if we want to handle anything other then DNS. by the way why it does this unpack-and-repack? |
And KVM over IP switches. |
I can see Can we do something to speed things up a bit around implementing support for IPs in ACME? |
Also, Let's Encrypt CP is updated in that direction: letsencrypt/cp-cps@b9e9a56...bc0499a#diff-43f79d14d36303bbae3da9268d7a2238R361-R399 |
@tdelmas thanks for the pointer. So the certificate policy for IPs seems to be there. That's always good news. Do you happen to know whether there is any (preliminary/subject_to_change) schedule when this new policy could get implemented? |
The RFC is progressing through the IETF process, there is nothing we can do to speed that process up ourselves, we just have to wait. We also don't have any specific timeline for implementing support for acme-ip, although it is likely it will happen sometime this year. |
Ok, didn't expect there is no plan currently. Anyway, thanks for the valuable info. If anything should change, keep us posted. |
RFC 8738 is now published. |
Apple iOS 16 (fall 2022) will autodiscover and use encrypted DNS provided by “designated dns resolvers” when the resolver’s IP address provided in DHCP is included as SAN in the resolver’s certificate for DNS over TLS or DNS over HTTPS. Boulder support may help make this encrypted DNS upgrade more accessible. |
I see this as a very powerful solution against DNS hijacking cases. |
To add to what @maertsen said: DDR has now been published as a full-blown RFC (RFC9462 - https://datatracker.ietf.org/doc/html/rfc9462) and requires IPs to be in the certificate. It will auto-upgrade plain-unencrypted-dns to DoH when implemented. Can we please move forward with this? |
Implementation before standardization, it's a thing we should probably do.
For LE would this require a CP/CPS update before it could be deployed?
The text was updated successfully, but these errors were encountered: