Internet DRAFT - draft-suchan-acme-onion
draft-suchan-acme-onion
ACME Working Group S. Seo
Internet-Draft 10 May 2022
Intended status: Standards Track
Expires: 11 November 2022
Automated Certificate Management Environment (ACME) Onion Identifier
Validation Extension
draft-suchan-acme-onion-00
Abstract
This document specifies identifiers and challenges required to enable
the Automated Certificate Management Environment (ACME) to issue
certificates for Tor Project's onion V3 addresses.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 11 November 2022.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Seo Expires 11 November 2022 [Page 1]
Internet-Draft ACME-ONION May 2022
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Onion Identifier . . . . . . . . . . . . . . . . . . . . . . 2
4. Validation Challenges for Onion address . . . . . . . . . . . 3
4.1. Identify Key Possession Challenge . . . . . . . . . . . . 3
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
5.1. Identifier Types . . . . . . . . . . . . . . . . . . . . 5
5.2. Challenge Types . . . . . . . . . . . . . . . . . . . . . 5
6. Security Considerations . . . . . . . . . . . . . . . . . . . 5
7. Normative References . . . . . . . . . . . . . . . . . . . . 5
Appendix A. Notes and Questions to reviews . . . . . . . . . . . 6
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
While onion addresses [RFC7686] are in form of DNS address, they
aren't in part of ICANN hierarchy, and onion name's self-verifying
construction warrants different verification, duce different
identifier type for them is worth consider.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
3. Onion Identifier
[RFC8555] only defines the identifier type "dns", that assumes it's
on public CA/B hierarchy, so to make clear Onion addresses are not
using normal DNS verification methods, we assign a new identifier
type for onion v3 addresses, "onion-v3".
This document only handles V3 version of onion address as defined in
[Toraddr], identified by 56 letters base domain name ends with d.
This document doesn't handle about verification of version 2 of onion
addresses, as they are retired already
An identifier for the onion address
aeceulkebl5...4zcuv5hk7fqwad.onion would be formatted like:
{"type": "onion-v3", "value": "aeceulkebl5...4zcuv5hk7fqwad.onion"}
Seo Expires 11 November 2022 [Page 2]
Internet-Draft ACME-ONION May 2022
Keep mind in CSR this address still treated as DNS.
4. Validation Challenges for Onion address
Onion-v3 identifiers MAY be used with the existing "http-01" and
"tls-alpn-01" challenges from [RFC8555] Section 8.3 and [RFC8737]
Section 3 respectively. To use Onion identifiers with these
challenges their initial DNS resolution step MUST be skipped and the
appropriate Tor daemon that in control of CA MUST used to proxy such
request.
The existing "dns-01" challenge MUST NOT be used to validate onion
addresses.
In addition to challenges earlier RFC defined, This document create
an additional challenge called "onion-v3-csr". This challenge can be
used for wildcard subdomain of Onion address.
4.1. Identify Key Possession Challenge
With onion-csr-01 validation, the client in an ACME transaction
proves its control of an Onion address or subdomain of it by proving
the possession of Onion hidden service's identity key. The ACME
server challenges the client to sign CSR that includes the nonce it
gave as challenge.
The onion-csr-01 ACME challenge object has the following format:
type (required, string): The string "onion-v3-csr"
token (required, string): A random value that uniquely identifies
the challenge. This value MUST have at least 128 bits of entropy.
It MUST NOT contain any characters outside the base64url alphabet
as described in [RFC4648] Section 5. Trailing '=' padding
characters MUST be stripped. See [RFC4086] for additional
information on randomness requirements.
The client prepares for validation by constructing a self-signed CSR
that MUST contain an cabf caSigningNonce Attribute and a
subjectAlternativeName extension [RFC5280]. The
subjectAlternativeName extension MUST contain a single dNSName entry
where the value is the domain name being validated. The cabf
caSigningNonce Attribute MUST contain the token string as ascii
encoded for the challenge.
The cabf caSigningNonce Attribute is identified by the cabf-
caSigningNonce object identifier (OID) in the cabf arc [RFC5280].
consult [cabr] appendix B for how to construct CSR itself in detail.
Seo Expires 11 November 2022 [Page 3]
Internet-Draft ACME-ONION May 2022
cabf OBJECT IDENTIFIER ::= 2.23.140
{
joint-iso-itu-t(2)
internationalorganizations(23)
a-browser-forum(140)
}
caSigningNonce ATTRIBUTE ::= {
WITH SYNTAX OCTET STRING
EQUALITY MATCHING RULE octetStringMatch
SINGLE VALUE TRUE
ID { cabf-caSigningNonce }
}
cabf-caSigningNonce OBJECT IDENTIFIER ::= { cabf 41 }
applicantSigningNonce ATTRIBUTE ::= {
WITH SYNTAX OCTET STRING
EQUALITY MATCHING RULE octetStringMatch
SINGLE VALUE TRUE
ID { cabf-applicantSigningNonce }
}
cabf-applicantSigningNonce OBJECT IDENTIFIER ::= { cabf 42 }
A client fulfills this challenge by construct the challenge CSR from
the "token" value provided in the challenge, then POST on challenge
URL with crafted CSR as payload to request validated by the server.
POST /acme/authz/1234/1
Host: example.com
Content-Type: application/jose+json
{
"protected": base64url({
"alg": "ES256",
"kid": "https://example.com/acme/acct/1",
"nonce": "XaYcb5XoTUgRWbTWw_NwkcP",
"url": "https://example.com/acme/authz/1234/1"
}),
"payload": base64url({
"csr": "MIIBBzCBugIBADAAMCo...gRYTMAhRP8nIH",
}),
"signature": "0wSzBJBgNVHREEQ...gYJKoZIhvcNAQkOM"
}
On receiving this request from client, the server verifies client's
control over the onion address by verify that CSR is crafted with
expected properties:
Seo Expires 11 November 2022 [Page 4]
Internet-Draft ACME-ONION May 2022
1. CSR is signed with private part of identity key the requested
onion address made from.
2. A caSigningNonce attribute that contains token Value that
challenge object provided.
3. existence of applicantSigningNonce attribute. This value SHOULD
include random value from client side with at least 64bits of
entropy, and CA MUST recommend to client do so, but servers are
not expected verify such claim, as by nature it's impossible to
verify such claim of randomness.
5. IANA Considerations
5.1. Identifier Types
Adds a new type to the Identifier list in ACME Identifier Types with
the label "onion-v3" and reference I-D.THISDOC.
5.2. Challenge Types
in the ACME Validation Methods list:
Adds the raw "onion-v3-csr" to the Validation Methods.
Adds the value "onion-v3" to the Identifier Type column for the
"http-01", "onion-challenge-csr", and "tls-alpn-01" challenges. , and
reference I-D.THISDOC each of them.
6. Security Considerations
As onion addresses are able to generated in massive quantity without
financial cost, it bypasses the normal ratelimit CAs imposes. CAs
SHOULD adapt some measure to prevent DoS of CA by create hugh amount
of request for onion address. For example, imposing limit per ACME
account or require order to have at least one non-onion domain.
7. Normative References
[cabr] Forum, C., "CA/B forum baseline requirement", 26 April
2022, <https://cabforum.org/wp-content/uploads/CA-Browser-
Forum-BR-1.8.4.pdf>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
Seo Expires 11 November 2022 [Page 5]
Internet-Draft ACME-ONION May 2022
[RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker,
"Randomness Requirements for Security", BCP 106, RFC 4086,
DOI 10.17487/RFC4086, June 2005,
<https://www.rfc-editor.org/info/rfc4086>.
[RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data
Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006,
<https://www.rfc-editor.org/info/rfc4648>.
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
<https://www.rfc-editor.org/info/rfc5280>.
[RFC7686] Appelbaum, J. and A. Muffett, "The ".onion" Special-Use
Domain Name", RFC 7686, DOI 10.17487/RFC7686, October
2015, <https://www.rfc-editor.org/info/rfc7686>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8555] Barnes, R., Hoffman-Andrews, J., McCarney, D., and J.
Kasten, "Automatic Certificate Management Environment
(ACME)", RFC 8555, DOI 10.17487/RFC8555, March 2019,
<https://www.rfc-editor.org/info/rfc8555>.
[RFC8737] Shoemaker, R.B., "Automated Certificate Management
Environment (ACME) TLS Application-Layer Protocol
Negotiation (ALPN) Challenge Extension", RFC 8737,
DOI 10.17487/RFC8737, February 2020,
<https://www.rfc-editor.org/info/rfc8737>.
[Toraddr] Mathewson, N., "Tor address spec", 24 August 2021,
<https://github.com/torproject/torspec/blob/main/address-
spec.txt>.
Appendix A. Notes and Questions to reviews
should this be about onion address, or all kind of alternative DNS
systems? should identifier type and challenge type include or strip
-v3 tag from its name? if we include that how about this doc name
itself? http-01 and tls-alpn-01 over tor will work as well for like
onion address V2 or V12, but csr challenge may not. but it's
reasonable to ask same identifier type should give same set of
challenges. should the as rigid as complying this will make comply
CA/B Baseline requirement? while type onion domain name just full
Seo Expires 11 November 2022 [Page 6]
Internet-Draft ACME-ONION May 2022
onion v3 name itself with example subdomain will exceed rfc line
limit. but using ... doesn't right in context of domain name. any
alternative to express truncated FQDN? would "example.onion" work
while it wouldn't be valid onion name?
Author's Address
Seo Suchan
Email: tjtncks@gmail.com
Seo Expires 11 November 2022 [Page 7]