Skip to content
This repository has been archived by the owner on Apr 24, 2020. It is now read-only.

Commit

Permalink
Address XSS risk from #470
Browse files Browse the repository at this point in the history
  • Loading branch information
bifurcation committed Dec 14, 2018
1 parent 729a9ef commit 447d4fe
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions draft-ietf-acme-acme.md
Original file line number Diff line number Diff line change
Expand Up @@ -2589,6 +2589,16 @@ The client SHOULD de-provision the resource provisioned for this
challenge once the challenge is complete, i.e., once the "status"
field of the challenge has the value "valid" or "invalid".

Note that becuase the token appears both in the request sent by the
ACME server and in the key authorization in the response, it is
possible to build clients that copy the token from request to
response. Clients should avoid this behavior, because it can lead
to cross-site scripting vulnerabilities; instead, clients should be
explicitly configured on a per-challenge basis. A client that does
copy tokens from requests to responses MUST validate that the token
in the request matches the token syntax above (e.g., that it
includes only characters from the base64url alphabet).

## DNS Challenge

When the identifier being validated is a domain name, the client can prove
Expand Down

0 comments on commit 447d4fe

Please sign in to comment.