Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify validation requirements for .arpa #153

Open
sleevi opened this issue Jan 7, 2020 · 9 comments
Open

Clarify validation requirements for .arpa #153

sleevi opened this issue Jan 7, 2020 · 9 comments
Labels
baseline-requirements Server Certificate CWG - Baseline Requirements validation-sc
Projects

Comments

@sleevi
Copy link
Contributor

sleevi commented Jan 7, 2020

In zmap/zlint#343, there were questions raised about whether the special use in.arpa and in6.arpa domains may make use of wildcards.

BRs section 3.2.2.6 has special provisions for when the wildcard appears to the left of particular domain labels, and it’s ambiguous whether or not that section is triggered, based on how IANA administers that root zone and delegates to the RIRs.

@dzacharo
Copy link
Contributor

Although the safest approach would be to prohibit issuance to these "special" TLDs, it might be worth considering requiring that:

  • for the ip.arpa special TLD all 4 numerical labels (with numbers from 0 to 255) separated by the dot-decimal notation
  • for the ip6.arpa special TLD all 32 labels (with hex values only) separated by the dot-decimal notation

MUST be present in the dNSName value.
Of course, this prohibits IPv6 reverse representations to be included in the subject:commonName field.

These "Domain Names" shall be validated by using the validation methods for IP addresses according to section 3.2.2.5, and wildcards shall not be allowed.

Thoughts?

@sleevi
Copy link
Contributor Author

sleevi commented Jan 18, 2020

There seemed strong consensus for forbidding, and there is a compelling argument they are already forbidden as they are registry controlled, so perhaps you can explain the use case more?

It important to explain the “why” - and not just saying “because people might want them” - as it is to figure out the how. The description of the “how” has issues, but if you’d like to articulate the “why”, that might help figure if they’re worth resolving.

@dzacharo
Copy link
Contributor

I was the one who first proposed to forbid this on the call, and there were two more voices on the call that said "ok". We need a lot more discussion to determine if there is broader consensus for this decision.

I am having second thoughts exactly because I am not aware of what might "break" if we forbid this.

Until we discuss more about the use cases (I hope others will come forward to share their experience), we could save some time if you can share your thoughts about any risks with my proposal. I think it would be very useful.

@sleevi
Copy link
Contributor Author

sleevi commented Jan 18, 2020

Thanks for clarifying. I’m not a fan of allowing something difficult to get right because it “might” be useful. I think it remains a better position to start by disallowing it, and if there are CAs with concrete use cases, they can share them so we can discuss. Absent a use case, it’s difficult to respond properly on how to address that use case.

Given we have iPAddress SANs, the use case you seem to be wanting to address is already met.

@dzacharo
Copy link
Contributor

Fair enough 🙂

@sleevi sleevi added the baseline-requirements Server Certificate CWG - Baseline Requirements label Jun 18, 2020
@CBonnell CBonnell added this to Backlog in Validation Mar 31, 2022
@CBonnell CBonnell moved this from Backlog to On Deck in Validation Mar 31, 2022
@enygren
Copy link

enygren commented Jul 26, 2022

It's also worth noting that RFC 8738 overloads .arpa as a way to validate IP address certificates,
including sending an {in-addr,in6}.arpa name as the SNI value.
While it uses a separate type ("ip" vs "dns"), it also uses this form as a way to
embed an IP address in SNI. See: https://datatracker.ietf.org/doc/html/rfc8738

Allowing these names to have certs creates some additional ambiguity.

Forbidding certs from having .arpa names also opens up some possibilities for IP address certs:

  • It might allow more general use of the .arpa names as a way to indicate an IP address via SNI
  • It might allow the {in-addr,ip6}.arpa namespace to be used for CAA records for IP address certs covering IP address prefixes

(Neither of these two items is standardized today, but it may make sense to do so.)

@CBonnell
Copy link
Member

According to this Censys query, publicly trusted CAs have not issued any certificates with a .arpa dNSName in 2023: https://search.censys.io/search?resource=certificates&q=parsed.extensions.subject_alt_name.dns_names%3A%2F.%2B%5C.arpa%2F+and+parsed.validity_period.not_before%3A%5B2023-01-01+TO+*%5D. There is always the possibility that such certificates were issued but never logged to CT, but the number of such certificates would be very small.

We should consider prohibiting the issuance of such certificates, especially since the current impact of such a prohibition would be nil.

@CBonnell
Copy link
Member

I will develop a ballot to prohibit the issuance of such domains.

@CBonnell CBonnell removed the question label Oct 19, 2023
@barrini
Copy link
Contributor

barrini commented Apr 25, 2024

Still ongoing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
baseline-requirements Server Certificate CWG - Baseline Requirements validation-sc
Projects
Status: In progress
Validation
On Deck
Development

No branches or pull requests

5 participants