Closed thomas-fossati closed 3 years ago
Should be configurable
, because it is negotiated with the server, just like all other configurable parameters. The server is free to refuse per its policy, of course. However for Delegation, we need to add an error signal from the IdO to the NDC in such cases, because the NDC would not be able to pull the new certificate.
cc @bifurcation.
In general, I don't think have the luxury of a synchronous transaction on which to attach an explicit error response. So I propose we say something along the following lines:
allow-certificate-get
at the required level (i.e., meta.allow-cert-get
(!STAR) or meta.auto-renewal.allow-cert-get
(STAR));allow-cert-get
for the specific order (STAR or !STAR), then it MUST NOT forward the request to the CA and instead goto: err
;allow-cert-get
setting, again goto: err
;err:
the IdO MUST set the "allow-certificate-get": false
(at the appropriate nesting level, depending on the client's request) and move the order state to invalid
.
The combination of "status": "invalid"
and "allow-cert-get": false
tells (unambiguously) the NDC that the reason why the order failed is because of unsupported allow-cert-get on the CA side.
From IANA Designated Expert review (Richard Barnes)