On Tuesday, September 12, 2017 at 5:36:56 AM UTC-5, Gervase Markham wrote:

> 
> As the drafter of the section :-), my intent was to make it so that if a
> site owner were concerned about the possibility that their CAA record or
> DNS could be spoofed, they could use DNSSEC to solve the problem. I
> agree that there is an implicit assumption in this requirement, that it
> is possible to efficiently determine the presence or absence of what we
> might call "attempted DNSSEC" for a particular domain. (That's not the
> same thing as "correct, valid, properly-signed, whatever DNSSEC.) If
> that assumption is not true, we may have to reconsider.

The proper mechanism is, of course, proper DNSSEC validation of each step of 
each of the CAA queries.

The only "light" mechanism I can imagine is likely to shave only a little time 
off of common cases and is more likely to introduce bugs and errors for edge 
cases than it will help, but here goes:

I _think_ the only "light" DNSSEC validation shortcut that might pass muster 
would be:

1.  Chase validation to TLD from root zone.
2.  Query for DS record delegation for second-level-domain from the TLD 
servers, validating proper signature on the DS results or proper signature on 
the proof-of-non-existence of the DS records for the SLD.
3.  If the SLD has DS records at the registry and these DS results are signed 
by the registry, assume that the SLD and all downline subordinates of the SLD 
have DNSSEC configured and perform full DNSSEC validation on each CAA query.  
If the SLD has no DS records in the TLD registry and this has been _proven_ by 
a validly signed proof-of-nonexistence by the TLD registry servers, then DNSSEC 
for the SLD and subordinate zones is moot and could be ignored.

For the common case, I don't think that will shave off much time.  
Additionally, in terms of complexity, if you implement the above correctly, 
you've written the vast majority of the code necessary to finish it out the 
rest of the way.

Ultimately, a decision must be made as to whether or not the CA is responsible 
to ensure that the CAA records (or in the alternative that the non-existence of 
the CAA records) are fully DNSSEC validated wherever there is not a 
cryptographic proof that the zone doesn't support DNSSEC (Exempting for TLDs 
not supporting DNSSEC).

Matt Hardeman
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
              • RE: C... Jeremy Rowley via dev-security-policy
              • Re: C... Ryan Sleevi via dev-security-policy
              • RE: C... Jeremy Rowley via dev-security-policy
              • Re: C... Jonathan Rudenberg via dev-security-policy
              • Re: C... Ryan Sleevi via dev-security-policy
              • Re: C... Jonathan Rudenberg via dev-security-policy
              • Re: C... Adriano Santoni via dev-security-policy
              • Re: C... Gervase Markham via dev-security-policy
              • Re: C... Nick Lamb via dev-security-policy
              • Re: C... Matthew Hardeman via dev-security-policy
              • Re: C... Matthew Hardeman via dev-security-policy
              • Re: C... Jakob Bohm via dev-security-policy
              • Re: C... Gervase Markham via dev-security-policy
              • Re: C... Patrick Figel via dev-security-policy
              • Re: C... Gervase Markham via dev-security-policy
              • Re: C... Nick Lamb via dev-security-policy
              • Re: C... Gervase Markham via dev-security-policy
              • Re: C... Matthew Hardeman via dev-security-policy
              • Re: C... Matthew Hardeman via dev-security-policy
              • RE: C... Nick Lamb via dev-security-policy
  • Re: CAA Certificate Problem Rep... Jonathan Rudenberg via dev-security-policy

Reply via email to