-
Notifications
You must be signed in to change notification settings - Fork 18k
x/crypto/acme/autocert: client should deactivate authzs that failed in a non-recoverable cases #23426
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Milestone
Comments
Yeah, we should definitely delete unused authorizations. |
Change https://golang.org/cl/100078 mentions this issue: |
hey @x1ddos, maybe you have a couple of minutes to go over the CL? :) |
c-expert-zigbee
pushed a commit
to c-expert-zigbee/crypto_go
that referenced
this issue
Mar 28, 2022
We now keep track of pending authorization requests during verify() and defer the asynchronous revocation of the ones that failed. This should help avoid letsencrypt's "too many currently pending authorizations" error. Fixes golang/go#23426 Change-Id: Ibffb10f59733962d45e43b67fc42a2ec7c5faf51 Reviewed-on: https://go-review.googlesource.com/100078 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Leo Antunes <costela@gmail.com> Reviewed-by: Filippo Valsorda <filippo@golang.org>
c-expert-zigbee
pushed a commit
to c-expert-zigbee/crypto_go
that referenced
this issue
Mar 29, 2022
We now keep track of pending authorization requests during verify() and defer the asynchronous revocation of the ones that failed. This should help avoid letsencrypt's "too many currently pending authorizations" error. Fixes golang/go#23426 Change-Id: Ibffb10f59733962d45e43b67fc42a2ec7c5faf51 Reviewed-on: https://go-review.googlesource.com/100078 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Leo Antunes <costela@gmail.com> Reviewed-by: Filippo Valsorda <filippo@golang.org>
c-expert-zigbee
pushed a commit
to c-expert-zigbee/crypto_go
that referenced
this issue
Mar 29, 2022
We now keep track of pending authorization requests during verify() and defer the asynchronous revocation of the ones that failed. This should help avoid letsencrypt's "too many currently pending authorizations" error. Fixes golang/go#23426 Change-Id: Ibffb10f59733962d45e43b67fc42a2ec7c5faf51 Reviewed-on: https://go-review.googlesource.com/100078 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Leo Antunes <costela@gmail.com> Reviewed-by: Filippo Valsorda <filippo@golang.org>
LewiGoddard
pushed a commit
to LewiGoddard/crypto
that referenced
this issue
Feb 16, 2023
We now keep track of pending authorization requests during verify() and defer the asynchronous revocation of the ones that failed. This should help avoid letsencrypt's "too many currently pending authorizations" error. Fixes golang/go#23426 Change-Id: Ibffb10f59733962d45e43b67fc42a2ec7c5faf51 Reviewed-on: https://go-review.googlesource.com/100078 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Leo Antunes <costela@gmail.com> Reviewed-by: Filippo Valsorda <filippo@golang.org>
BiiChris
pushed a commit
to BiiChris/crypto
that referenced
this issue
Sep 15, 2023
We now keep track of pending authorization requests during verify() and defer the asynchronous revocation of the ones that failed. This should help avoid letsencrypt's "too many currently pending authorizations" error. Fixes golang/go#23426 Change-Id: Ibffb10f59733962d45e43b67fc42a2ec7c5faf51 Reviewed-on: https://go-review.googlesource.com/100078 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Leo Antunes <costela@gmail.com> Reviewed-by: Filippo Valsorda <filippo@golang.org>
desdeel2d0m
added a commit
to desdeel2d0m/crypto
that referenced
this issue
Jul 1, 2024
We now keep track of pending authorization requests during verify() and defer the asynchronous revocation of the ones that failed. This should help avoid letsencrypt's "too many currently pending authorizations" error. Fixes golang/go#23426 Change-Id: Ibffb10f59733962d45e43b67fc42a2ec7c5faf51 Reviewed-on: https://go-review.googlesource.com/100078 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Leo Antunes <costela@gmail.com> Reviewed-by: Filippo Valsorda <filippo@golang.org>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
During the TLS-SNI incident,
autocert
generated a lot of dangling authorization requests because of "no supported challenge type found" errors. In this case, these authorization requests would never be fulfilled, because reference to the challenge gets discarded after the error and before anything gets put in the cache. These dangling authzs, in turn, lead to rate-limiting on the side of Let's Encrypt ("too many currently pending authorizations").Since ACMEv1 AFAICT doesn't support querying pending authorization requests, there is no way to clean up these authzs, short of waiting for the rate limit window to pass. This may become less important after #21081, if ACMEv2 supports querying.
It would be nice if the client would deactivate the authorization requests in these unrecoverable cases . Even though the certificate wouldn't be generated, at least we would steer clear of this specific rate-limit.
The text was updated successfully, but these errors were encountered: