2025-11-04 13:30-15:30 CST
Implementation status update:
CA/BF passed ballot SC-088v3 on Oct 9, 2025
Fastly/Certainly in 2026
Changes since IETF 123:
CAs can use SC-088v3 outside of ACME
Trades freshness for operational simplicity
Validation Reuse
persistUntil parameterDNSSEC
Discussion on SHOULD vs MUST validate
Trades off security vs private PKI flexibility
Seeking working group input:
Tim Geoghegan: how does renewal work?
Corey Bonnell: the syntax for controlling wildcard issuance could be
simplified
Michael Richardson: does the presence of a DNS Persist record affect
whether other validation methods can be used?
Stefan Ubbink: are you aware of the dnsop DNS Verification draft?
Deb Cooley: Why two drafts (LAMPS vs ACME) - CAA used more widely
Recent Changes:
Next Steps
Want to return to Call for Adoption
Chair asking working group if they are willing to review the draft.
A number of people indicated they are willing to review.
OpenID Federation is a trust hierarchy not wholly dissimilar to an
x509 PKI, but in the JWT ecosystem
Some orgs, e.g. European universities, want to use both at the same
time
Since IETF 123:
Implementation status:
Challenge: OpenID Federation v1.0 is not yet finalized
Some similarity to DNS Persist (delegating to another set of keys)
Stefan Santesson:
Why do we send the OIDF trust chain in the challenge response?
Why use a specific ACME key instead of the entity key?
Why does the client have to use OIDF to find the issuer's
directory?
What does the embedding of the OIDF info in the cert look like?
Jan-Frederik Rieckers: eduroam already has a federation
Mike Ounsworth: the confusing part is how validation works
Kathleen Moriarty: This kind of work definitely fits in the original
vision for ACME
Michael Richardson: Additional use-case: third-party mechanic
authenticating to a busted mobile tower's local network
Stefan Santesson: Concrete use-case is the European digital wallet
project
Aaron Gable: The exact same thing for this draft as the JWT claim
constraints: ACME wire protocol stuff is great, the people in this
room have a hard time viewing the GUTS of the description of the
challenge.
Chair (Mike) - Will take draft to the List for a call for adoption!
A client is configured with a profile name. If that name is actually
a profile set, then it makes one Order for each profile in that set.
Stefan Santesson: How do you get old ACME clients to participate?
Aaron Gable: Should this be part of the extant profiles draft, or a
separate draft? Bringing to working group for advice.
Mike Ounsworth: Should we adopt?
Purpose is to attest to security properties in the certificate
Since IETF 123:
The new "trustworthy" identifier is a sentinel value
Yaov Nir: Are there any implementations?
Aaron Gable: Minor comment about examples in the document.
Bob Beck: Should this be split into two documents, since half of it
is closer to ready for implementation?
None