> On 30. Nov 2017, at 15:52, Ryan Sleevi <[email protected]> wrote:
> 
>> On Thu, Nov 30, 2017 at 4:02 AM, Quirin Scheitle via dev-security-policy 
>> <[email protected]> wrote:
>> Similar to the GlobalSign discussion, it is well possible that the domain 
>> briefly disabled their CAA records when you did the check — and re-enabled 
>> them later.
>> 
> I think that, as CAA deployment becomes common, this pattern will be 
> not-uncommon. I would hope we don't sound false alarms when it does.
> 

Hi Ryan,

thank you for your e-mail, I hear your concern. 

We did apply tight filtering before raising any cases, and urge any other 
evaluators to do so as well. 
We reported cases to CAs/this forum that seemed to hint at issues in CAA 
validation at CAs, such as the wildcard/nonwildcard mix.
We also don’t see our reports as “alarms”, but as cases that might warrant a 
closer look.

Domain records may change on short notice, and we carefully differentiated and 
analyzed each case. 
Consistently setting “issue ;”, for example, lets one expect that a domain will 
change that for issuance.
Consistently reporting a set of CAs not including the issuing CA — not so much. 
If you have the capability to change CAA records at each issuance, why maintain 
a set of non-issuing CAs in your CAA records?
Combined with configurations that can trigger corner cases (such as the 
wildcard/non-wildcard mix), we weighed these as worth reporting at that time.
Having learned that the latter cases happen as well, we will be even more 
sceptical for these going forward.

I honestly believe that we applied the maximum diligence that can be expected 
from an external evaluator, based on data that, depending on domain and time, 
was based on 8-hour or even 4-hour scan intervals *at issuance time*. 

Kind regards
Quirin 
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to