Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SC46: Sunset the CAA exception for DNS operator #271

Merged
merged 2 commits into from Jun 9, 2021

Conversation

sleevi
Copy link
Contributor

@sleevi sleevi commented Apr 23, 2021

Purpose of Ballot

This Ballot addresses security issues with Section 3.2.2.8 regarding CAA checking.

Currently, Section 3.2.2.8 permits a CA to bypass CAA checking if the CA or an Affiliate of the CA is the DNS Operator. This term is referred to through RFC 7719, and involves a precise technical definition regarding how a zone's authoritative servers are configured and expressed (e.g. NS records). While this allows a CA to skip looking up the CAA record, it does not absolve them of the need to look up these other records on every issuance.

As practiced by CAs, this has clearly caused some confusion. For example, some CAs have incorrectly implemented policies that determine they're authoritative based on self-assertion that they are authoritative, which is not consistent with the current requirements.

To avoid these issues, this sunsets the CAA exception on 2021-07-01 for the DNS Operator, simplifying the requirements and reducing ambiguities for CAs performing validation.

The following motion has been proposed by Ryan Sleevi of Google and endorsed by Ben Wilson of Mozilla and Jacob Hoffman-Andrews of ISRG/Let's Encrypt.

@sleevi
Copy link
Contributor Author

sleevi commented Apr 23, 2021

@jsha @BenWilson-Mozilla For your review and sign-off before submitting as a Ballot.

Copy link
Contributor

@jsha jsha left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me.

Copy link
Contributor

@BenWilson-Mozilla BenWilson-Mozilla left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Thanks.

@sleevi sleevi changed the title Draft SC46: Sunset the CAA exception for DNS operator SC46: Sunset the CAA exception for DNS operator May 12, 2021
@castillar castillar changed the base branch from main to SC46 June 4, 2021 17:41
@castillar castillar merged commit 698c53a into cabforum:SC46 Jun 9, 2021
castillar added a commit that referenced this pull request Jul 12, 2021
…291)

* Sunset the CAA exception for DNS operator (#271)

Co-authored-by: Jos <castillar@melete.org>

* Update version for publication

* Updating effective date to provide time for review

Co-authored-by: Ryan Sleevi <sleevi@google.com>
Co-authored-by: Jos Purvis <jopurvis@cisco.com>
@sleevi sleevi deleted the caa_exception branch July 20, 2021 17:28
Copy link

@martn123446 martn123446 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -158,6 +158,7 @@ The following Certificate Policy identifiers are reserved for use by CAs as an o
| 2020-09-30 | 7.1.4.1 | Subject and Issuer Names for all possible certification paths MUST be byte-for-byte identical. |
| 2020-09-30 | 7.1.6.4 | Subscriber Certificates MUST include a CA/Browser Form Reserved Policy Identifier in the Certificate Policies extension. |
| 2020-09-30 | 7.2 and 7.3 | All OCSP and CRL responses for Subordinate CA Certificates MUST include a meaningful reason code. |
| 2021-07-01 | 3.2.2.8 | CAA checking is no longer optional if the CA is the DNS Operator or an Affiliate. |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Muy

Copy link

@martn123446 martn123446 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants