-
-
Notifications
You must be signed in to change notification settings - Fork 616
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for FQDNs under .onion #4620
Comments
Developing a ACME challenge for the CSR verification method seems complicated mainly because of the It seems like the proposed ballot leaves out the |
Also worth noting: In term of translation into ACME, it probably makes sense for the authorizations to be for a different identifier type (e.g. |
Good point, updated the issue title accordingly. |
Because ACME protocol server only ask CSR after domain client asked passed validation, Is it possible to do CSR based challenge in current protocol? otherwise VA have to be able to talk to the client to get the client. |
Seems nope, and it's a related question of https://community.letsencrypt.org/t/why-acme-requires-domain-auth-first-before-csr/98482 |
Quick update: The CABF ballot based on this proposal has passed. |
One way to solve this issue would be to require at least one non-onion Subject Alternative Name or Common Name in any certificate issued. The usual limits could then be applied to these names and onion names ignored for rate-limiting purposes. Granted, this would not cater to people who do not want to associate their hidden services with a clearnet identity, but this demographic's only benefit from CA-issued certificates would be to have browsers enable secure content restrictions. Given that users of such services generally do not have anything other than an onion v3 address to identify them, their users should have no reason not to trust a self-signed certificate, optionally signed with the onion service's Tor private key. If widely adopted, this would also permit people to write browser extensions (and other software) that display the subject CN or the first SAN in addition to the onion service address in the UI of a particular application. Such software could further choose to automatically trust self-signed certificates for onion services that have been signed with the onion service's Tor private key. |
As someone looking at it from the user side, I reckon the feature would be greatly appreciated by many. Also, I reckon, most of us could live with a stricter rate limit for plain However, mandating that also a "normal" DNS name needs to be present is pretty much defeating the purpose of a hidden service. Also, I myself have a couple of home automation project, that I do not want to expose to the open internet, hence there's no way, I can have a proper DNS name for it. The only way in for maintenance and emergency is a Tor hidden service. I reckon, that's another valid use-case for onion-only names. |
First, thanks for putting ticket together :) I imagine we're on the same page, but because there's so much "you don't need https for Personally, I'm trying to add a There's huge privacy benefits to be gained by site admins making their existing websites accessible to tor users through onion services, but--since all our great efforts to migrate from http to https in the past years--it's not always trivial to just point a If ACME could support issuing certs for |
Besides redirects as mentioned above, here's a few other technologies that modern browsers may not let clients use over http when a sysadmin tries to make their existing clearnet site accessible over a tor onion service:
In response to the original post's "gauging demand" section, the following resources may be helpful: Mainstream websites using https on a
|
My issue is that a lot of existing infrastructure needs to be modified to work with http only. Remember let's encrypt does not verify entities if they are good, bad, or neutral. Let's encrypt only adds the SSL bits and nothing else. That's all I want, I don't care about EV I just need something so a TLS connection can be made and the browser won't throw an error. Please just let me register a cert, digicert has too many requirements I just want the SSL bits I don't have a clearnet site. |
Also, I think, ZeroSSL started to issue 90-day certificates for |
@fancsali can you please post a link with more info about ZeroSSL's |
I just tried creating a cert for a |
Well, you can type in a
Interesting, I might have just assumed, they do, as they would let me go through the whole process. Didn't bother to set up an HTTP server last time, though. Nevertheless, now I did, and it seems to fail, as described. My bad then. |
They even try to verify certificate for internal ip (10.123.123.123) and just 192.168.0.0/16 get special treatment, I think their web is just too lex at inpit varification |
I am afraid so, apologies for assuming otherwise... ;) I still see the value in certificates for the |
Is it possible to just do the SSL portion w/o ev validation? Should I make a seperate issue for this? |
That's exactly what this issue is for in the first place. |
Thanks to the In fact I'd say, having a clearnet DNS name in the same cert is even desirable for the cases where onion service is used to protect the client location/identity, and not so much the server one. This way you can additionally validate if the onion address you use really corresponds to the clearnet one. |
Is there any news regarding .onion support? |
made a draft on IETF: |
Is there any news regarding .onion support? |
while not directly related IETF ACME working group just adopted a draft about it |
Unfortunately, I missed out on the promotional discounted price. The current cost is 30€ per year. |
Current IETF work is at https://datatracker.ietf.org/doc/draft-ietf-acme-onion/ |
Thank you for that. |
I'm still waiting for onion certificates from letsencrypt... |
Background
Historically the CABF baseline requirements have considered FQDNs with
.onion
as the rightmost label "internal names" because the TLD is not registered in IANA's root zone database:To support HTTPS for
.onion
sites the "Extended Validation Certificate Guidelines" specify a carve-out that allows issuing EV certificates for.onion
FQDNs if extra steps specified in an Appendix are followed:The EV requirement and the additional
cabf-TorServiceDescriptor
certificate extension in Appendix F were largely intended to address weak cryptography used by tor v2.onion
addresses. Since the v3 address specification addresses those weaknesses there is now a proposal in the CABF validation working group in the works by Wayne Thayer of Mozilla to change the CABF baseline requirements to allow DV issuance for.onion
FQDNs that are implemented with the "v3".onion
address specification.Implementation notes
If a ballot based on this proposal were to be approved Let's Encrypt/Boulder could in theory issue for
.onion
domains. This issue is to track some of the things we'd need to figure out to support that. It isn't a commitment to implement, but a collection of notes particularly focused on some challenges we would face.Domain control
From an operational perspective adding a tor daemon adjacent to each of our VA instances to allow outbound
tor
communication to.onion
sites to verify an agreed upon change to a website (via HTTP-01) is a substantial burden. It's a complex daemon in a memory unsafe language and we would need new monitoring and a lot of general SRE work to deploy it.We would probably prefer to implement proof of domain control support based on the "CSR validation" method described in Wayne's draft ballot since there would be no requirement to make an outbound connection to the
.onion
FQDN. Probably implementing the CSR validation properly would require the definition of a new ACME challenge type since there is a need to relay and verify additional information in the CSR (thecaSigningNonce
and theapplicantSigningNonce
).Rate limits
Our rate limits are primarily based around the notion that folks can't create infinite eTLD+1's because of the cost associated with domain registration. In contrast
.onion
names can be minted infinitely without any substantial cost. We would need to think of a way to apply fair rate limits for.onion
names in order to ensure fair distribution of our resources.We could have a global rate limit for
.onion
names but that invites DoSing the availability of these certificates for others by continually issuing until the global rate limit is reached. Making the rate limit per-account would shift the burden to the new registration per IP rate limit which today is quite generous. Similarly we could affect a rate limit by requester IP but this would also be generous (and IPv6 addresses are cheap/plentiful).Gauging demand
It's difficult to gauge subscriber demand for
.onion
certificates because to date the requirement for EV certificates with a custom extension meant only ~1 commercial CA implemented support and the cost was likely prohibitive for most users. Without knowing the demand it's difficult to make a decision on how important allocating resources to the work required is.The text was updated successfully, but these errors were encountered: