Automated Certificate Management Environment (ACME) Renewal Information (ARI) Extension
draft-ietf-acme-ari-08
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2025-06-17
|
(System) | Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-acme-ari and RFC 9773, changed IESG state to RFC … Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-acme-ari and RFC 9773, changed IESG state to RFC Published) |
|
|
2025-06-13
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
|
2025-04-23
|
08 | (System) | RFC Editor state changed to AUTH48 |
|
2025-03-06
|
08 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
|
2025-03-06
|
08 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
|
2025-03-06
|
08 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
|
2025-03-06
|
08 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
|
2025-02-27
|
08 | (System) | RFC Editor state changed to EDIT |
|
2025-02-27
|
08 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-02-27
|
08 | (System) | Announcement was received by RFC Editor |
|
2025-02-27
|
08 | (System) | IANA Action state changed to In Progress |
|
2025-02-27
|
08 | Jenny Bui | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-02-27
|
08 | Jenny Bui | IESG has approved the document |
|
2025-02-27
|
08 | Jenny Bui | Closed "Approve" ballot |
|
2025-02-27
|
08 | Jenny Bui | Ballot approval text was generated |
|
2025-02-27
|
08 | (System) | Removed all action holders (IESG state changed) |
|
2025-02-27
|
08 | Deb Cooley | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
|
2025-02-27
|
08 | Murray Kucherawy | [Ballot comment] Thanks for fixing the IANA stuff. == [previous comments] == I support Eric's DISCUSS. Why is the SHOULD in Section 4.3 only a … [Ballot comment] Thanks for fixing the IANA stuff. == [previous comments] == I support Eric's DISCUSS. Why is the SHOULD in Section 4.3 only a SHOULD? When would you legitimately do something other than what it says? I have the same question about the SHOULDs in Sections 4.3.2, 4.3.3, and 5. |
|
2025-02-27
|
08 | Murray Kucherawy | [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from Discuss |
|
2025-02-27
|
08 | Paul Wouters | [Ballot comment] Thanks for the discussion. It was very informative. I've updated my ballot to Yes.h |
|
2025-02-27
|
08 | Paul Wouters | [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss |
|
2025-02-26
|
08 | Éric Vyncke | [Ballot comment] Thanks for addressing my previous blocking DISCUSS points, see https://mailarchive.ietf.org/arch/msg/acme/39amfomGbjKAMTDeAP_Q7mEpg54/ The points below were and are still non-blocking but I sincerely think that … [Ballot comment] Thanks for addressing my previous blocking DISCUSS points, see https://mailarchive.ietf.org/arch/msg/acme/39amfomGbjKAMTDeAP_Q7mEpg54/ The points below were and are still non-blocking but I sincerely think that the document readability will be improved if addressed. The text sent by Aaron about these 2 points would be beneficial to the readers/implementers if included in a -09. The choice is really up to the author at this point. ## COMMENTS (non-blocking) ### Section 4.1 Also in this section, should the note about prefixing a "00" when the serial number is a negative number be more than a simple note but normative ? Or if this is per default in ACME, adding a reference ? ### Section 4.2 Is the first `Conforming clients SHOULD provide this URL to their operator` correct ? I would assume that this JSON reply is sent by the ACME server and not by the client. |
|
2025-02-26
|
08 | Éric Vyncke | [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Discuss |
|
2025-02-26
|
08 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2025-02-26
|
08 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-02-26
|
08 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-02-26
|
08 | Aaron Gable | New version available: draft-ietf-acme-ari-08.txt |
|
2025-02-26
|
08 | Aaron Gable | New version approved |
|
2025-02-26
|
08 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2025-02-26
|
08 | Aaron Gable | Uploaded new revision |
|
2025-01-14
|
07 | Barry Leiba | Closed request for Last Call review by ARTART with state 'Overtaken by Events' |
|
2025-01-14
|
07 | Barry Leiba | Assignment of request for Last Call review by ARTART to Joseph Yee was marked no-response |
|
2025-01-09
|
07 | (System) | Changed action holders to Aaron Gable (IESG state changed) |
|
2025-01-09
|
07 | Jenny Bui | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2025-01-09
|
07 | Murray Kucherawy | [Ballot comment] I support Eric's DISCUSS. Why is the SHOULD in Section 4.3 only a SHOULD? When would you legitimately do something other than what … [Ballot comment] I support Eric's DISCUSS. Why is the SHOULD in Section 4.3 only a SHOULD? When would you legitimately do something other than what it says? I have the same question about the SHOULDs in Sections 4.3.2, 4.3.3, and 5. |
|
2025-01-09
|
07 | Murray Kucherawy | Ballot comment text updated for Murray Kucherawy |
|
2025-01-08
|
07 | Murray Kucherawy | [Ballot discuss] Section 7.2 declares a new "Specification Required" registry. However, it doesn't provide any advice to the Designated Experts, which is strongly recommended by … [Ballot discuss] Section 7.2 declares a new "Specification Required" registry. However, it doesn't provide any advice to the Designated Experts, which is strongly recommended by RFC 8126, Section 4.6. |
|
2025-01-08
|
07 | Murray Kucherawy | [Ballot comment] Why is the SHOULD in Section 4.3 only a SHOULD? When would you legitimately do something other than what it says? I have … [Ballot comment] Why is the SHOULD in Section 4.3 only a SHOULD? When would you legitimately do something other than what it says? I have the same question about the SHOULDs in Sections 4.3.2, 4.3.3, and 5. |
|
2025-01-08
|
07 | Murray Kucherawy | [Ballot Position Update] New position, Discuss, has been recorded for Murray Kucherawy |
|
2025-01-08
|
07 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
|
2025-01-08
|
07 | Roman Danyliw | [Ballot comment] Thank you to Susan Hares for the GENART review. |
|
2025-01-08
|
07 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
|
2025-01-08
|
07 | Yoav Nir | This is the shepherd write-up for draft-ietf-acme-ari Current version is 06 Document author is Aaron Gable (aaron@letsencrypt.org) Document shepherd is Yoav Nir ( … This is the shepherd write-up for draft-ietf-acme-ari Current version is 06 Document author is Aaron Gable (aaron@letsencrypt.org) Document shepherd is Yoav Nir (ynir.ietf@gmail.com) Responsible AD is Deb Cooley (debcooley1@gmail.com) ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG discussed this heavily in F2F meetings, with somewhat less discussion on the mailing list. For the WGLC more people did speak up in favor, with none objecting. For ACME, this is what consensus looks like. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? No 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Both Google and Let's Encrypt have server implementations in production. The draft lists 4 client implementations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. The only formatted specification in the draft is a bit of json. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? No YANG module 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, this draft is understandable, well-written. It's needed as evidenced by the multiple existing implementations. I believe it's ready to be handed over. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? For the Security Area, common issues have been addressed. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. All the datatracker state attributes are correct. ARI is an extension to RFC 8555 which is standards track. There are also some implementations for it, so “Proposed Standard” is the right status. It’s too mature for “Experimental”. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) No nits. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. No 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft requests changes to four registries: "ACME Resource Types", "ACME Renewal Info Object Fields", "ACME Order Object Fields", and "ACME Error Types" - all four are ACME registries, and all assignments look OK. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. All four registries listed above require designated expert review. The request is straight forward. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2025-01-07
|
07 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this specification. Thanks to Michael Tüxen for the TSVART review. |
|
2025-01-07
|
07 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
|
2025-01-06
|
07 | Orie Steele | [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele |
|
2025-01-06
|
07 | Paul Wouters | [Ballot discuss] Thanks for this document. It can be a useful extension but I do have some issues I would like to discuss / clarify … [Ballot discuss] Thanks for this document. It can be a useful extension but I do have some issues I would like to discuss / clarify Query the renewalInfo resource to get a suggested renewal window. Select a uniform random time within the suggested window. If the selected time is in the past, attempt renewal immediately. This seems to skew to "now" which would only cause the ACME server more load than without this extension (one GET and one actual renewal). Why not let the client select a uniform random time between "now" and "end" if "now" > "start" ? it indicates both the earliest time and a target time. It is really not the "earliest time" because an ACME server isn't going to refuse it? I would rewrite this to just say "it indicates the desired target time". This does bring up a point of concern. Clients who do not implement this have an advantage on an overloaded server compared to clients who do implement this. For example, let's say some new industry certification license says "certifiates MUST always be valid for at least two more weeks". Wouldn't it make more sense for the server to check the "urgency" of the client request and when (too) busy, start rejecting to renew those with plenty of lifetime left? I am also not sure about the argument of revocation for timing. Either the owner of the cert to be revoked knows this and is already in the process of replacing the cert/private key, and it wants to get a new cert issued "now", or it is completely unaware, and most likely whatever caused the leak of the current cert/private key, would also leak this renewed one. I don't think an ACME server can help with either cases by issuing shorter calls to renew. These would also be certificate specific and I understood this unauthenticated extension to be generic and based on load, and not on specific individual certificate issues. Clients SHOULD set reasonable limits on the their checking interval. For example, values under one minute could be treated as if they were one minute, and values over one day could be treated as if they were one day. This really does violate the "compliant clients MUST" clause :) Security Considerations: This document specifies that renewalInfo resources MUST be exposed and accessed via unauthenticated GET requests, a departure from RFC8555's requirement Where does it specify this, other then right here? This specification should be outside the Security Considerations section. What I can find is: To request the suggested renewal information for a certificate, the client sends a GET request to a path under the server's renewalInfo URL. Maybe a sentence can be added there that this GET request is unauthenticated, so that an implementer does not accidentally send credentials of any kind? Maybe even say that a server MUST reject any attempted authorized connections for renewalInfo to ensure such badly implemented clients cannot prosper ? Perhaps also a clarifying sentence can be added along the lines of: If an on-path attacker would force ACME clients to postpone renewal indefinately, a properly implemented client would ignore these when the lifetime of its certificate becomes critically low (eg 7 days ?). I also feel this belongs more in Section 4.3.2 with some concrete advise to implementers. As for the last paragraph in the Security Considerations, it seems to specify specific server behaviour that belongs in the formal specification instead of as security example. If we look at the protocol requirement of the server to tell the client "renew now", why not define this by either using a timestamp of unix time 0 (eg 1970) or by introducing a third keyword along the "start" and "end" in the suggestedWindow property, eg "fetch-now": "recommended" ? Using some kind of fake time seems like a poor hack for a protocol, as the text in the security considerations already admits to (but then tries to band-aid the client) Again, I feel this belongs in the base document specification and not in the Security Consideration section. |
|
2025-01-06
|
07 | Paul Wouters | [Ballot comment] Conforming clients MUST attempt renewal I find this a bit weasel wording. How about: Clients … [Ballot comment] Conforming clients MUST attempt renewal I find this a bit weasel wording. How about: Clients SHOULD attempet renewal Clearly, a client can have some overriding local policy concern that trumps the ACME servers The keyIdentifier field of the certificate's AKI extension has the hexadecimal bytes 69:88:5B:6B:87:46:40:41:E1:B3:7B:84:7B:A0:AE:2C:DE:01:C8:D4 as its ASN.1 Octet String value. The base64url encoding of those bytes is aYhba4dGQEHhs3uEe6CuLN4ByNQ= There seems to be an endian swap in here? Perhaps this text should be clarified? The same for the the certificate's Serial Number field in the next paragraph. Maybe instead of: GET https://example.com/.... Use: GET https://acme-server.example.com/..... Similar for the explanationURL value. Clients MUST stop checking RenewalInfo after a certificate is expired. I would stay "MUST skip checking RenewalInfo after a certificate is expired and immediately request a renewal." Clients MUST stop checking RenewalInfo after they consider a certificate to be replaced (for instance, after a new certificate for the same identifiers has been received and configured). I would also avoid the "MUST stop" construct here. Perhaps: RenewalInfo MUST NOT be attempted for any certificate that has been replaced (for instance, after a new certificate for the same identifiers has been received and configured) |
|
2025-01-06
|
07 | Paul Wouters | [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters |
|
2025-01-06
|
07 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2025-01-05
|
07 | Mahesh Jethanandani | [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani |
|
2025-01-03
|
07 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2025-01-02
|
07 | Éric Vyncke | [Ballot discuss] # Éric Vyncke, INT AD, comments for draft-ietf-acme-ari-07 CC @evyncke Thank you for the work put into this document. I can easily imagine … [Ballot discuss] # Éric Vyncke, INT AD, comments for draft-ietf-acme-ari-07 CC @evyncke Thank you for the work put into this document. I can easily imagine that it is really useful. Please find below one blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits. Special thanks to Yoav Nir for the shepherd's detailed write-up including the WG consensus ***but it lacks*** the justification of the intended status. Other thanks to Carlos Bernardos, the Internet directorate reviewer (at my request), thanks for having considered his int-dir review: https://datatracker.ietf.org/doc/review-ietf-acme-ari-07-dnsdir-telechat-huston-2024-12-15/ https://datatracker.ietf.org/doc/review-ietf-acme-ari-06-dnsdir-lc-huston-2024-11-23/ I hope that this review helps to improve the document, Regards, -éric ## DISCUSS (blocking) As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is just a request to have a discussion on the following topics: ### Section 4.1 I think that the example is wrong for HTTP request, rather than ``` GET https://example.com/acme/renewal-info/ aYhba4dGQEHhs3uEe6CuLN4ByNQ.AIdlQyE ``` it should probably be " GET /acme/renewal-info/ aYhba4dGQEHhs3uEe6CuLN4ByNQ.AIdlQyE Host: example.com " Also in this section, should the note about prefixing a "00" when the serial number is a negative number be more than a simple note but normative ? Or if this is per default in ACME, adding a reference ? |
|
2025-01-02
|
07 | Éric Vyncke | [Ballot comment] ## COMMENTS (non-blocking) ### Lack of HTTP-dir reviews I can only regret that there was no HTTP directorate review for this document as … [Ballot comment] ## COMMENTS (non-blocking) ### Lack of HTTP-dir reviews I can only regret that there was no HTTP directorate review for this document as one of my DISCUSS and one of my COMMENT are related to HTTP. ### url should be in uppercase I have detected some "url" that should be "URL" as it is an acronym. ### Section 4.2 Is the first `Conforming clients SHOULD provide this URL to their operator` correct ? I would assume that this JSON reply is sent by the ACME server and not by the client. Is the `Retry-After` the most suitable HTTP header ? I.e., while RFC 9110 section 10.2.3 is not really specific, [Mozilla spec](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Retry-After) seems to indicate that it is not appropriate for a 200 response code. As I am not an HTTP expert, I am ready to be corrected of course but I would think that using a new key in the returned object would be neater. ## NITS (non-blocking / cosmetic) ### Appendix A It seems that the year of this certificate is 0000, was it the intent ? ### Section 4.2 Suggest to use a more recent date (rather than 2021) in the example. |
|
2025-01-02
|
07 | Éric Vyncke | [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke |
|
2024-12-30
|
07 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2024-12-15
|
07 | Geoff Huston | Request for Telechat review by DNSDIR Completed: Ready. Reviewer: Geoff Huston. Sent review to list. |
|
2024-12-14
|
07 | Shawn Emery | Request for Telechat review by SECDIR Completed: Has Nits. Reviewer: Shawn Emery. Sent review to list. |
|
2024-12-12
|
07 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Shawn Emery |
|
2024-12-12
|
07 | Geoff Huston | Request for Telechat review by DNSDIR is assigned to Geoff Huston |
|
2024-12-12
|
07 | Jenny Bui | Placed on agenda for telechat - 2025-01-09 |
|
2024-12-12
|
07 | Deb Cooley | Ballot has been issued |
|
2024-12-12
|
07 | Deb Cooley | [Ballot Position Update] New position, Yes, has been recorded for Deb Cooley |
|
2024-12-12
|
07 | Deb Cooley | Created "Approve" ballot |
|
2024-12-12
|
07 | Deb Cooley | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2024-12-12
|
07 | David Dong | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
|
2024-12-12
|
07 | David Dong | IANA Experts State changed to Expert Reviews OK from Reviews assigned |
|
2024-12-08
|
07 | Sue Hares | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Susan Hares. Sent review to list. |
|
2024-12-06
|
07 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
|
2024-12-06
|
07 | Aaron Gable | New version available: draft-ietf-acme-ari-07.txt |
|
2024-12-06
|
07 | Aaron Gable | New version approved |
|
2024-12-06
|
07 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2024-12-06
|
07 | Aaron Gable | Uploaded new revision |
|
2024-12-06
|
06 | Michael Tüxen | Request for Last Call review by TSVART Completed: Ready with Issues. Reviewer: Michael Tüxen. Sent review to list. |
|
2024-12-06
|
06 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2024-12-04
|
06 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-acme-ari-06. If any part of this review is inaccurate, please let us know. IANA understands that, upon … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-acme-ari-06. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there are four actions which we must complete. First, in the ACME Resource Types registry in the Automated Certificate Management Environment (ACME) Protocol registry group located at: https://www.iana.org/assignments/acme/ a single new registration will be made as follows: Field Name: renewalInfo Resource Type: Renewal Info object Reference: [ RFC-to-be ] As this document requests a registration in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Second, a new registry is to be created called the ACME Renewal Info Object Fields registry. The new registry will be located in the Automated Certificate Management Environment (ACME) Protocol registry group located at: https://www.iana.org/assignments/acme/ The new registry will be managed via Specification Required as defined in RFC8126. There are initial registrations in the new registry as follows: Field Name Field type Reference -----------+---------+----------- suggestedWindow object [ RFC-to-be ] explanationURL string [ RFC-to-be ] Third, in the ACME Order Object Fields registry in the Automated Certificate Management Environment (ACME) Protocol registry group located at: https://www.iana.org/assignments/acme/ a single new registration will be made as follows: Field Name: replaces Field Type: string Configurable: true Reference: [ RFC-to-be ] As this also requests a registration in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Fourth, in the ACME Error Types registry in the Automated Certificate Management Environment (ACME) Protocol registry group located at: https://www.iana.org/assignments/acme/ a single new registration will be made as follows: Type: alreadyReplaced Description: The request specified a predecessor certificate which has already been marked as replaced Reference: [ RFC-to-be ] As this also requests a registration in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2024-12-04
|
06 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
|
2024-11-27
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Susan Hares |
|
2024-11-26
|
06 | David Dong | IANA Experts State changed to Reviews assigned |
|
2024-11-26
|
06 | Shawn Emery | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Shawn Emery. Sent review to list. |
|
2024-11-25
|
06 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Michael Tüxen |
|
2024-11-24
|
06 | Barry Leiba | Request for Last Call review by ARTART is assigned to Joseph Yee |
|
2024-11-24
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Shawn Emery |
|
2024-11-23
|
06 | Geoff Huston | Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Geoff Huston. Sent review to list. Submission of review completed at an earlier … Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Geoff Huston. Sent review to list. Submission of review completed at an earlier date. |
|
2024-11-23
|
06 | Geoff Huston | Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Geoff Huston. |
|
2024-11-22
|
06 | Geoff Huston | Request for Last Call review by DNSDIR is assigned to Geoff Huston |
|
2024-11-22
|
06 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
|
2024-11-22
|
06 | Cindy Morgan | The following Last Call announcement was sent out (ends 2024-12-06): From: The IESG To: IETF-Announce CC: acme-chairs@ietf.org, acme@ietf.org, debcooley1@gmail.com, draft-ietf-acme-ari@ietf.org, ynir.ietf@gmail.com … The following Last Call announcement was sent out (ends 2024-12-06): From: The IESG To: IETF-Announce CC: acme-chairs@ietf.org, acme@ietf.org, debcooley1@gmail.com, draft-ietf-acme-ari@ietf.org, ynir.ietf@gmail.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Automated Certificate Management Environment (ACME) Renewal Information (ARI) Extension) to Proposed Standard The IESG has received a request from the Automated Certificate Management Environment WG (acme) to consider the following document: - 'Automated Certificate Management Environment (ACME) Renewal Information (ARI) Extension' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-12-06. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies how an ACME server may provide suggestions to ACME clients as to when they should attempt to renew their certificates. This allows servers to mitigate load spikes, and ensures clients do not make false assumptions about appropriate certificate renewal periods. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-acme-ari/ No IPR declarations have been submitted directly on this I-D. |
|
2024-11-22
|
06 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
|
2024-11-22
|
06 | Deb Cooley | Last call was requested |
|
2024-11-22
|
06 | Deb Cooley | Last call announcement was generated |
|
2024-11-22
|
06 | Deb Cooley | Ballot approval text was generated |
|
2024-11-22
|
06 | Deb Cooley | IESG state changed to Last Call Requested from AD Evaluation |
|
2024-11-22
|
06 | Deb Cooley | AD Evaluation comment: https://mailarchive.ietf.org/arch/msg/acme/A1AoYFZXt0Ie8dWNi5yd7C7VGpI/ |
|
2024-11-22
|
06 | Deb Cooley | IESG state changed to AD Evaluation from Publication Requested |
|
2024-11-22
|
06 | Deb Cooley | Ballot writeup was changed |
|
2024-11-04
|
06 | Yoav Nir | This is the shepherd write-up for draft-ietf-acme-ari Current version is 06 Document author is Aaron Gable (aaron@letsencrypt.org) Document shepherd is Yoav Nir ( … This is the shepherd write-up for draft-ietf-acme-ari Current version is 06 Document author is Aaron Gable (aaron@letsencrypt.org) Document shepherd is Yoav Nir (ynir.ietf@gmail.com) Responsible AD is Deb Cooley (debcooley1@gmail.com) ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG discussed this heavily in F2F meetings, with somewhat less discussion on the mailing list. For the WGLC more people did speak up in favor, with none objecting. For ACME, this is what consensus looks like. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? No 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Both Google and Let's Encrypt have server implementations in production. The draft lists 4 client implementations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. The only formatted specification in the draft is a bit of json. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? No YANG module 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, this draft is understandable, well-written. It's needed as evidenced by the multiple existing implementations. I believe it's ready to be handed over. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? For the Security Area, common issues have been addressed. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. All the datatracker state attributes are correct. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) No nits. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. No 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft requests changes to four registries: "ACME Resource Types", "ACME Renewal Info Object Fields", "ACME Order Object Fields", and "ACME Error Types" - all four are ACME registries, and all assignments look OK. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. All four registries listed above require designated expert review. The request is straight forward. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-11-04
|
06 | Yoav Nir | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
|
2024-11-04
|
06 | Yoav Nir | IESG state changed to Publication Requested from I-D Exists |
|
2024-11-04
|
06 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2024-11-04
|
06 | Yoav Nir | Responsible AD changed to Deb Cooley |
|
2024-11-04
|
06 | Yoav Nir | Document is now in IESG state Publication Requested |
|
2024-11-04
|
06 | Yoav Nir | Tag Doc Shepherd Follow-up Underway cleared. |
|
2024-11-04
|
06 | Yoav Nir | This is the shepherd write-up for draft-ietf-acme-ari Current version is 06 Document author is Aaron Gable (aaron@letsencrypt.org) Document shepherd is Yoav Nir ( … This is the shepherd write-up for draft-ietf-acme-ari Current version is 06 Document author is Aaron Gable (aaron@letsencrypt.org) Document shepherd is Yoav Nir (ynir.ietf@gmail.com) Responsible AD is Deb Cooley (debcooley1@gmail.com) ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG discussed this heavily in F2F meetings, with somewhat less discussion on the mailing list. For the WGLC more people did speak up in favor, with none objecting. For ACME, this is what consensus looks like. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? No 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Both Google and Let's Encrypt have server implementations in production. The draft lists 4 client implementations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. The only formatted specification in the draft is a bit of json. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? No YANG module 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, this draft is understandable, well-written. It's needed as evidenced by the multiple existing implementations. I believe it's ready to be handed over. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? For the Security Area, common issues have been addressed. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. All the datatracker state attributes are correct. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) No nits. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. No 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft requests changes to four registries: "ACME Resource Types", "ACME Renewal Info Object Fields", "ACME Order Object Fields", and "ACME Error Types" - all four are ACME registries, and all assignments look OK. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. All four registries listed above require designated expert review. The request is straight forward. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-10-28
|
06 | Yoav Nir | Tag Doc Shepherd Follow-up Underway set. |
|
2024-10-28
|
06 | Yoav Nir | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
|
2024-10-17
|
06 | Aaron Gable | New version available: draft-ietf-acme-ari-06.txt |
|
2024-10-17
|
06 | (System) | New version approved |
|
2024-10-17
|
06 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2024-10-17
|
06 | Aaron Gable | Uploaded new revision |
|
2024-10-07
|
05 | Yoav Nir | Notification list changed to ynir.ietf@gmail.com because the document shepherd was set |
|
2024-10-07
|
05 | Yoav Nir | Document shepherd changed to Yoav Nir |
|
2024-10-07
|
05 | Yoav Nir | IETF WG state changed to In WG Last Call from WG Document |
|
2024-10-07
|
05 | Yoav Nir | Changed consensus to Yes from Unknown |
|
2024-10-07
|
05 | Yoav Nir | Intended Status changed to Proposed Standard from None |
|
2024-08-23
|
05 | Aaron Gable | New version available: draft-ietf-acme-ari-05.txt |
|
2024-08-23
|
05 | (System) | New version approved |
|
2024-08-23
|
05 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2024-08-23
|
05 | Aaron Gable | Uploaded new revision |
|
2024-07-25
|
04 | Yoav Nir | Added to session: IETF-120: acme Fri-1630 |
|
2024-05-31
|
04 | Aaron Gable | New version available: draft-ietf-acme-ari-04.txt |
|
2024-05-31
|
04 | (System) | New version approved |
|
2024-05-31
|
04 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2024-05-31
|
04 | Aaron Gable | Uploaded new revision |
|
2024-02-08
|
03 | Aaron Gable | New version available: draft-ietf-acme-ari-03.txt |
|
2024-02-08
|
03 | (System) | New version approved |
|
2024-02-08
|
03 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2024-02-08
|
03 | Aaron Gable | Uploaded new revision |
|
2023-08-10
|
02 | Aaron Gable | New version available: draft-ietf-acme-ari-02.txt |
|
2023-08-10
|
02 | (System) | New version approved |
|
2023-08-10
|
02 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2023-08-10
|
02 | Aaron Gable | Uploaded new revision |
|
2023-02-08
|
01 | Aaron Gable | New version available: draft-ietf-acme-ari-01.txt |
|
2023-02-08
|
01 | (System) | New version approved |
|
2023-02-08
|
01 | (System) | Request for posting confirmation emailed to previous authors: Aaron Gable |
|
2023-02-08
|
01 | Aaron Gable | Uploaded new revision |
|
2022-08-25
|
00 | Yoav Nir | This document now replaces draft-aaron-acme-ari instead of None |
|
2022-08-25
|
00 | Aaron Gable | New version available: draft-ietf-acme-ari-00.txt |
|
2022-08-25
|
00 | Yoav Nir | WG -00 approved |
|
2022-08-24
|
00 | Aaron Gable | Set submitter to "Aaron Gable ", replaces to (none) and sent approval email to group chairs: acme-chairs@ietf.org |
|
2022-08-24
|
00 | Aaron Gable | Uploaded new revision |