Markdown Version | Session Recording
Session Date/Time: 28 Jul 2022 20:00
acme
Summary
The ACME working group meeting at IETF 114 discussed the status of several existing drafts, including the acme-authority-token, acme-client, tnoth-list, dtn-node-id, integrations, and subdomains. Key discussions revolved around progressing the long-stalled tnoth-list and its interdependent acme-authority-token documents. The acme-detail-node-id draft received a request for further review following recent changes. The acme-revocation-information (ARI) draft, after an in-room poll demonstrating strong support, was decided to be adopted as a working group document. Finally, a new proposal was presented by Brandon Weeks to integrate WebAuthn attestation statements with ACME for client certificate issuance, which garnered significant interest and a call for adoption.
Key Discussion Points
- Administrative: A note-taker (Aaron Gable) was secured. Standard IETF Note Well and in-person/remote participation guidelines were reviewed.
- Document Status Update:
acme-authority-token(draft-ietf-acme-authority-token): New version 08 released this month to address Ben Kaduk's discusses. It requires coordinated progress withtnoth-list.acme-client(draft-ietf-acme-client): New version 05 from April, with light discussion.tnoth-list(draft-ietf-acme-tnoth-list): Current version is from March 2021 with three outstanding discusses. It needs a new editor to take the pen and significant revisions. The document is intertwined withacme-authority-tokenand should progress in lockstep. Given the substantial changes anticipated and the 15-month delay, a working group re-confirmation of consensus is required.dtn-node-id(draft-ietf-acme-dtn-node-id): Current version from just before IETF 113, waiting for external write-ups since March 2022.integrations(draft-ietf-acme-integrations): Went through Working Group Last Call (WGLC) with little discussion. Ready to be pushed to IESG.subdomains(draft-ietf-acme-subdomains): Just finished WGLC. Ready to be pushed to IESG.ari(draft-ietf-acme-revocation-information): Previous adoption call on the mailing list yielded little response.
- Current Work Items Presentations:
acme-detail-node-id(Bryan): No new feedback since IETF 113. The COSE document is in RFC 48. Previous WGLC made breaking changes related to algorithm agility and conformance with RFC 8823 (email challenge). A consensus re-check is needed. Aaron Gable volunteered to re-review the document, having requested some of the changes. The chairs will reiterate a request for reviews.acme-revocation-information(ARI) (Aaron Gable): Version 03, with minor changes to fix typos and clarify introductory text regarding alternative solutions. The suggested renewal algorithm text was updated from "client must perform specific calculations and should renew" to "client must attempt renewal based on suggested window and we recommend a specific algorithm." The author seeks feedback on this change. An in-room poll was conducted for adoption, showing strong support.
- New Proposed Work (Brandon Weeks - ACME with WebAuthn Attestation):
- Proposal: A specification to combine the WebAuthn attestation statement format with ACME for issuing client certificates, primarily for devices like laptops, workstations, and servers.
- Rationale: ACME is widely adopted and well-designed, unlike other certificate enrollment protocols (SCEP, CMP, EST, CMC). Modern devices (Android, Apple, Chrome OS, TPMs) increasingly support hardware-backed device attestation. WebAuthn is gaining mindshare as a de facto format for abstracting attestation.
- Draft Changes: Adds a new ACME challenge type where the client returns a WebAuthn attestation statement. Uses ACME key authorization as the nonce. Specifies identifiers (RFC 4043 for platform, RFC 4108 for hardware module, though the latter received feedback). Includes informative text on using External Account Binding for pre-authentication in enterprise environments.
- Discussion Points:
- Integration with
acme-clientdraft: Author suggests keeping it separate due to narrower focus on devices and specific use of attestation statements. - Clarifying "Attestation": Hank requested clearer differentiation between key provenance and broader system trustworthiness evidence, and precise definitions of terms.
- Information in Client Certificate: Discussion on reflecting device/security chip identity and key generation properties into certificates. Monty Wiseman and Sean Turner suggested defining a registry for quality distinctions rather than embedding detailed specification here due to complexity.
- Verification Procedures: The document does not specify how CAs should verify attestations, which is a complex and often underspecified problem. Participants (Sean Turner, Aaron Gable, Carl Wallace) agreed that the document should acknowledge this complexity and refer to external documentation/best practices, rather than trying to fully specify verification. The chairs emphasized the need for verifiability and assurance against self-assertion.
- Integration with
- Implementation: A fork of the Smallstep CA and client exist, implementing TPM attestation. Apple iOS 16 betas use this encoding in ACME. Android has it on their roadmap.
- Call for Adoption: Brandon Weeks formally requested a call for adoption, citing existing vendor support and broad interest.
Decisions and Action Items
- Decision: The
acme-revocation-information(ARI) draft (draft-ietf-acme-ari) will be adopted as a working group document. This was based on an in-room poll showing 17 votes for adoption and 0 against. - Action Item (Chairs): Send out a call for objections on the ACME mailing list for the adoption of
acme-revocation-information(ARI). - Action Item (Chairs): Contact the authors of
tnoth-listto identify the current editor and establish a timeline for updating the document. - Action Item (Chairs): Once
tnoth-listis updated and a new version is issued, bring bothtnoth-listandacme-authority-tokenback to the working group for a short (e.g., two-week) last call to reconfirm consensus, including STIR on the CC list for broader review. - Decision: The
acme-integrationsandacme-subdomainsdrafts, having completed WGLC, are ready to be pushed to the IESG. - Action Item (Bryan -
acme-detail-node-idauthor): Reiterate the request for working group review of theacme-detail-node-iddraft to confirm breaking changes. - Action Item (Aaron Gable -
acme-detail-node-idreviewer): Perform a review ofacme-detail-node-idand provide feedback to the list. - Action Item (Brandon Weeks - ACME with WebAuthn Attestation author): Add informative text to the draft acknowledging the complexities of attestation verification and the need for CAs to correctly implement verification procedures.
- Action Item (Chairs): Send out a call for adoption for Brandon Weeks's ACME with WebAuthn Attestation draft on the mailing list.
Next Steps
- The ACME chairs will initiate the mailing list processes for the adoption of the ARI draft and the new WebAuthn Attestation proposal.
- The chairs will follow up with the authors of
tnoth-listto unblock its progress and coordinate withacme-authority-token. - The
acme-detail-node-iddraft awaits further working group reviews. integrationsandsubdomainsdrafts will be forwarded to the IESG.