Let’s Encrypt will no longer be offering the “simpleHttp” and “dvsni” challenges as of Thursday, November 19. If your client depends on these challenges, you will need to update to the “http-01” or “tls-sni-01” challenges by that date, or your client will no longer work. The current version of the official Let’s Encrypt client supports the new challenges.
This change is required because these older challenges have a signature reuse vulnerability, reported on the IETF ACME list by Andrew Ayer several weeks ago.
Also, please note: The “tls-sni-01” challenge currently offered by Let’s Encrypt is currently not compatible with the “tls-sni-01” challenge defined in draft-ietf-acme-acme-01. It lacks the “n” parameter. This is a known issue, and will be resolved once the IETF ACME working group decides whether to keep the “n” parameter.
@josh i think ti would be an good idea to update the “official” spec under https://letsencrypt.github.io/acme-spec/ .
Because i think that if you link an spec for the protocol it should contain an description of these two methods if
they are in the 3 days the only available ones. Only to say this is the difference to another spec i think is not optimal.
If an developer try to build an client based on the spec he should expect that it is correct and complete.
OK but as long as this move is not done there should be an place in the spec that mention for example the "n" Parameter difference. And not only in this community board.
The problem did not have anything todo with simpleHTTP only with TLS=true and defect tomcat config.
The same description i think could be true for http if the site only support for one tenant https
then the server will fall back to another default domain.
simpleHTTP require serverSide acces to the challenge or the privateKey+token the http-01 challenge only
require access to the token+publicKey this is in my eyes also an disadvantage.
As far as I can tell, the previous default was for letsencrypt-auto to copy the challenge to the web root. Is this now disabled? Letsencrypt-auto is unlikely to be able to automatically change DNS so this makes a significant barrier to entry?
no, no, there are different types of challenges that are essentially webroot, especially simpleHTTP and HTTP-01 are similar in some way but are different on the technical side (and the newer ones are more secure) so copy pasting into the webroot still works, and unless you use a rather old LE client it should already be copypasting over HTTP-01
This change is now in production. New authorizations will not have simpleHTTP and DVSNI as challenge options. Their replacements, http-01 and tls-sni-01, have been in production for a while.