I facing a problem with an ACME server (LiteSSL) that behave unexpectedly.
The server uses the same token for 2 authorizations (wildcard / non-wildcard).
From my reading of the RFC:
Token Entropy
The http-01 and dns-01 validation methods mandate the use of a random
token value to uniquely identify the challenge. The value of the
token is required to contain at least 128 bits of entropy for the
following security properties. RFC 8555: Automatic Certificate Management Environment (ACME)
I think this is not a valid behavior.
WDYT?
I know this is not related to Let's Encrypt, but maybe someone here will have the right pointer inside the RFC to help me.
This is actually pretty wild. It sounds like they had a bug that allowed one ACME account to obtain arbitrary wildcard certs previously issued for other accounts.
I'm looking for something inside the RFC about this specific behavior, because I don't want to implement something that doesn't conform to it.
FYI, this is an intentional behavior. I asked a user to contact LiteSSL: they intentionally reuse the same DNS-01 token/value when requesting a base domain and its wildcard in the same order.
CAB BR allows using "Request Token" for validation token, that generated per certificate request. and if those auths are from same certificate request, so I think while it's weird but legal:
Request Token: A value, derived in a method specified by the CA which binds this demonstration
of control to the certificate request. The CA SHOULD define within its CPS (or a document clearly
referenced by the CPS) the format and method of Request Tokens it accepts.
edit: but because it used same token for http-01 challenge, and it's defined differently from normal http update DCV in 3.2.2.4.18 but point to rfc 8555 which mandates using random value for this, I think it may caused misissuance.