Dear all,

based on my CAA issuance experiments a month ago, I have repeated an extended 
set of experiments on CAA adherence by CAs: https://github.com/quirins/caa-test 

Generally, I can confirm all tested CAs adhering to basic cases, and Comodo 
having patched their initial bug. 
Here is a summary of findings per test:

Test 1) Signed zone, issue ; — 0/7 CAs issued
Test 2) A DNSSEC-signed domain with timeouts on a restrictive CAA record — 3/7 
CAs issued
Test 3) A domain with the critical flag set, and an undefined CAA tag — 1/7 CAs 
issued
Test 4) An unsigned domain with timeout on the CAA record — 6/7 CAs issued 
(which they are allowed to)
Test 5) A domain with a CNAME pointing directly to a restrictive CAA record — 
2/7 CAs issued
Test 6) Errata 5065 / Ballot 214 test — CNAME pointing to target without CAA 
record, but restrictive CAA record at parent of CNAME target — 5/7 CAs issued 
(adopting the errata)

I have filed individual mis-issuance bug reports under bugzilla 
NSS/Mis-Issuance [1].

My interpretation is that CAA is generally widely respected by CAs.
The lookup failure on DNSSEC signed zones seems to require attention. 
Furthermore, there are occasional glitches happening, whose root causes are 
still under investigation. 

Kind regards
Quirin

[1] 
https://bugzilla.mozilla.org/buglist.cgi?product=NSS&component=CA%20Certificate%20Mis-Issuance&resolution=---&list_id=13836795

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to