draft-ietf-acme-onion
IETF 118, Wednesday 8th of November 2023
Fedi: @q@glauca.space
Email: q@as207960.net
Extra field in the Tor hidden service descriptor
Tor directory authorities are already untrusted in the security model.
The HS descriptor is verified purely using the service's public key.
The ACME client can send the signed CAA records in the ACME exchange without reducing cryptographic guarantees.
inBandOnionCAARequired
to signal the CA requires this method.
{
"csr": "MIIBPTCBxAIBADBFMQ...FS6aKdZeGsysoCo4H9P",
"onionCAA": {
"5anebu2...2qd.onion": {
"caa": "caa 128 issue \"...",
"expiry": 1697210719,
"signature": "u_iP6JZ4JZB...pxAA=="
}
}
}
"onion-caa|" || expiry || "|" || caa
Is this the right way to do it?
Slide deck available at magicalcodewit.ch/ietf118-slides/
Fedi: @q@glauca.space
Email: q@as207960.net