ACME Working Group S. Seo Internet-Draft 10 May 2022 Intended status: Standards Track Expires: 11 November 2022 Automated Certificate Management Environment (ACME) Onion Identifier Validation Extension draft-suchan-acme-onion-00 Abstract This document specifies identifiers and challenges required to enable the Automated Certificate Management Environment (ACME) to issue certificates for Tor Project's onion V3 addresses. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 11 November 2022. Copyright Notice Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Seo Expires 11 November 2022 [Page 1] Internet-Draft ACME-ONION May 2022 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2 3. Onion Identifier . . . . . . . . . . . . . . . . . . . . . . 2 4. Validation Challenges for Onion address . . . . . . . . . . . 3 4.1. Identify Key Possession Challenge . . . . . . . . . . . . 3 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 5.1. Identifier Types . . . . . . . . . . . . . . . . . . . . 5 5.2. Challenge Types . . . . . . . . . . . . . . . . . . . . . 5 6. Security Considerations . . . . . . . . . . . . . . . . . . . 5 7. Normative References . . . . . . . . . . . . . . . . . . . . 5 Appendix A. Notes and Questions to reviews . . . . . . . . . . . 6 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 7 1. Introduction While onion addresses [RFC7686] are in form of DNS address, they aren't in part of ICANN hierarchy, and onion name's self-verifying construction warrants different verification, duce different identifier type for them is worth consider. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Onion Identifier [RFC8555] only defines the identifier type "dns", that assumes it's on public CA/B hierarchy, so to make clear Onion addresses are not using normal DNS verification methods, we assign a new identifier type for onion v3 addresses, "onion-v3". This document only handles V3 version of onion address as defined in [Toraddr], identified by 56 letters base domain name ends with d. This document doesn't handle about verification of version 2 of onion addresses, as they are retired already An identifier for the onion address aeceulkebl5...4zcuv5hk7fqwad.onion would be formatted like: {"type": "onion-v3", "value": "aeceulkebl5...4zcuv5hk7fqwad.onion"} Seo Expires 11 November 2022 [Page 2] Internet-Draft ACME-ONION May 2022 Keep mind in CSR this address still treated as DNS. 4. Validation Challenges for Onion address Onion-v3 identifiers MAY be used with the existing "http-01" and "tls-alpn-01" challenges from [RFC8555] Section 8.3 and [RFC8737] Section 3 respectively. To use Onion identifiers with these challenges their initial DNS resolution step MUST be skipped and the appropriate Tor daemon that in control of CA MUST used to proxy such request. The existing "dns-01" challenge MUST NOT be used to validate onion addresses. In addition to challenges earlier RFC defined, This document create an additional challenge called "onion-v3-csr". This challenge can be used for wildcard subdomain of Onion address. 4.1. Identify Key Possession Challenge With onion-csr-01 validation, the client in an ACME transaction proves its control of an Onion address or subdomain of it by proving the possession of Onion hidden service's identity key. The ACME server challenges the client to sign CSR that includes the nonce it gave as challenge. The onion-csr-01 ACME challenge object has the following format: type (required, string): The string "onion-v3-csr" token (required, string): A random value that uniquely identifies the challenge. This value MUST have at least 128 bits of entropy. It MUST NOT contain any characters outside the base64url alphabet as described in [RFC4648] Section 5. Trailing '=' padding characters MUST be stripped. See [RFC4086] for additional information on randomness requirements. The client prepares for validation by constructing a self-signed CSR that MUST contain an cabf caSigningNonce Attribute and a subjectAlternativeName extension [RFC5280]. The subjectAlternativeName extension MUST contain a single dNSName entry where the value is the domain name being validated. The cabf caSigningNonce Attribute MUST contain the token string as ascii encoded for the challenge. The cabf caSigningNonce Attribute is identified by the cabf- caSigningNonce object identifier (OID) in the cabf arc [RFC5280]. consult [cabr] appendix B for how to construct CSR itself in detail. Seo Expires 11 November 2022 [Page 3] Internet-Draft ACME-ONION May 2022 cabf OBJECT IDENTIFIER ::= 2.23.140 { joint-iso-itu-t(2) internationalorganizations(23) a-browser-forum(140) } caSigningNonce ATTRIBUTE ::= { WITH SYNTAX OCTET STRING EQUALITY MATCHING RULE octetStringMatch SINGLE VALUE TRUE ID { cabf-caSigningNonce } } cabf-caSigningNonce OBJECT IDENTIFIER ::= { cabf 41 } applicantSigningNonce ATTRIBUTE ::= { WITH SYNTAX OCTET STRING EQUALITY MATCHING RULE octetStringMatch SINGLE VALUE TRUE ID { cabf-applicantSigningNonce } } cabf-applicantSigningNonce OBJECT IDENTIFIER ::= { cabf 42 } A client fulfills this challenge by construct the challenge CSR from the "token" value provided in the challenge, then POST on challenge URL with crafted CSR as payload to request validated by the server. POST /acme/authz/1234/1 Host: example.com Content-Type: application/jose+json { "protected": base64url({ "alg": "ES256", "kid": "https://example.com/acme/acct/1", "nonce": "XaYcb5XoTUgRWbTWw_NwkcP", "url": "https://example.com/acme/authz/1234/1" }), "payload": base64url({ "csr": "MIIBBzCBugIBADAAMCo...gRYTMAhRP8nIH", }), "signature": "0wSzBJBgNVHREEQ...gYJKoZIhvcNAQkOM" } On receiving this request from client, the server verifies client's control over the onion address by verify that CSR is crafted with expected properties: Seo Expires 11 November 2022 [Page 4] Internet-Draft ACME-ONION May 2022 1. CSR is signed with private part of identity key the requested onion address made from. 2. A caSigningNonce attribute that contains token Value that challenge object provided. 3. existence of applicantSigningNonce attribute. This value SHOULD include random value from client side with at least 64bits of entropy, and CA MUST recommend to client do so, but servers are not expected verify such claim, as by nature it's impossible to verify such claim of randomness. 5. IANA Considerations 5.1. Identifier Types Adds a new type to the Identifier list in ACME Identifier Types with the label "onion-v3" and reference I-D.THISDOC. 5.2. Challenge Types in the ACME Validation Methods list: Adds the raw "onion-v3-csr" to the Validation Methods. Adds the value "onion-v3" to the Identifier Type column for the "http-01", "onion-challenge-csr", and "tls-alpn-01" challenges. , and reference I-D.THISDOC each of them. 6. Security Considerations As onion addresses are able to generated in massive quantity without financial cost, it bypasses the normal ratelimit CAs imposes. CAs SHOULD adapt some measure to prevent DoS of CA by create hugh amount of request for onion address. For example, imposing limit per ACME account or require order to have at least one non-onion domain. 7. Normative References [cabr] Forum, C., "CA/B forum baseline requirement", 26 April 2022, . [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . Seo Expires 11 November 2022 [Page 5] Internet-Draft ACME-ONION May 2022 [RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, "Randomness Requirements for Security", BCP 106, RFC 4086, DOI 10.17487/RFC4086, June 2005, . [RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006, . [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, . [RFC7686] Appelbaum, J. and A. Muffett, "The ".onion" Special-Use Domain Name", RFC 7686, DOI 10.17487/RFC7686, October 2015, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8555] Barnes, R., Hoffman-Andrews, J., McCarney, D., and J. Kasten, "Automatic Certificate Management Environment (ACME)", RFC 8555, DOI 10.17487/RFC8555, March 2019, . [RFC8737] Shoemaker, R.B., "Automated Certificate Management Environment (ACME) TLS Application-Layer Protocol Negotiation (ALPN) Challenge Extension", RFC 8737, DOI 10.17487/RFC8737, February 2020, . [Toraddr] Mathewson, N., "Tor address spec", 24 August 2021, . Appendix A. Notes and Questions to reviews should this be about onion address, or all kind of alternative DNS systems? should identifier type and challenge type include or strip -v3 tag from its name? if we include that how about this doc name itself? http-01 and tls-alpn-01 over tor will work as well for like onion address V2 or V12, but csr challenge may not. but it's reasonable to ask same identifier type should give same set of challenges. should the as rigid as complying this will make comply CA/B Baseline requirement? while type onion domain name just full Seo Expires 11 November 2022 [Page 6] Internet-Draft ACME-ONION May 2022 onion v3 name itself with example subdomain will exceed rfc line limit. but using ... doesn't right in context of domain name. any alternative to express truncated FQDN? would "example.onion" work while it wouldn't be valid onion name? Author's Address Seo Suchan Email: tjtncks@gmail.com Seo Expires 11 November 2022 [Page 7]