Conversation

As a bonus, this would supercharge DANE deployment by making it a prerequisite for secure issuance of legacy PKI certificates. make it happen.
Quote Tweet
Replying to @DanielMicay
I wish LE/ACME would add HTTPS-only mode, where the self-referentiality is avoided by insisting on having a DANE record matching the server's key at the time of ACME request.
1
3
Replying to and
By the way, it appears you can register an account (certbot register) and then pin the account id to have ECDSA-based authentication via ACME. The accounturi and validationmethods features are only used for the staging service though. I've tested that validationmethods works.
1
1
I've now tested that accounturi works too (valid and invalid). This provides a way to properly verify via HTTP authentication using the root of trust since the communication between the ACME client and server is authenticated for the accounturi. The issue is it's staging only.
1
1
Look at the attestation.app CAA records to see the working setup I have for it now. It's not enforced by the production server yet but it should transparently start working when they deploy it now and I'll get an email if it actually fails to issue so I'm fine with that.
Replying to and
It's not supported on the real production issuance server making trusted certificates yet. The fact that it's deployed on the staging server used for dry run issuance makes it seem like it's close to being put into production though. I don't think they like to deviate much there.
1
1
Show replies