That's shifting the goalposts in order to argue against a strawman.

The minimum necessary for CAA for email is to restrict the domain access.

Might some people desire more feature-rich syntax? Perhaps. Is that a
necessary requirement? No.

On Tue, May 15, 2018 at 12:22 PM, Matthew Hardeman via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> They certainly do share a common namespace.  The trouble is that the email
> address has more than just that common namespace.
>
> If CAA is proposed for email certificates, I should be able to define a CAA
> policy that prevents any CA from issuing for
> particular.maligned.user.undeserving.of.email.secur...@mydomain.com while
> allowing the following CAs to issue for any email address over the same
> domain.
>
> On Tue, May 15, 2018 at 11:15 AM, Ryan Sleevi <r...@sleevi.com> wrote:
>
> > Both types share a common namespace. The domain name space.
> >
> > On Tue, May 15, 2018 at 12:10 PM, Matthew Hardeman via
> dev-security-policy
> > <dev-security-policy@lists.mozilla.org> wrote:
> >
> >> Agreed.  My point was to query the position of the administration of a
> >> large generic email service as to their understanding of the
> implications
> >> of CAA on their domains.
> >>
> >> Certificates have different types of SANs for good cause: the nuances of
> >> the name space differ.
> >>
> >> For example, SAN rfc822Names versus SAN dnsNames.  The X.509 certificate
> >> distinguishes these names as belonging to separate name spaces.  CAA
> does
> >> not presently have this concept.  Yet the proposal here would have us
> >> relying upon the more simplistic DNS names expressed in CAA records.
> >>
> >> On Tue, May 15, 2018 at 10:57 AM, Neil Dunbar via dev-security-policy <
> >> dev-security-policy@lists.mozilla.org> wrote:
> >>
> >> >
> >> > > On 15 May 2018, at 07:59, Matthew Hardeman <mharde...@gmail.com>
> >> wrote:
> >> > >
> >> > > For that matter, can whoever is in charge of gmail.com <
> >> > http://gmail.com/> speak to their intent as to CAA for S/MIME?
> >> > >
> >> > > I've certainly held certificates which include my personal gmail
> >> address
> >> > before.  At no point did I need or seek Google's blessing to do so.  I
> >> can
> >> > not imagine that was an uncommon case.  (At least, not uncommon
> >> relative to
> >> > the universe of issued S/MIME certificates.)
> >> >
> >> > Well, I don’t see a CAA record for gmail.com <http://gmail.com/>,
> thus
> >> > even if CAA issue tags were reinterpreted, as suggested, to cover
> >> S/MIME,
> >> > such issuance would not be prohibited (unlike, say, google.com <
> >> > http://google.com/>, which does have a CAA record).
> >> >
> >> > In other words, those certificates that you were issued hitherto could
> >> not
> >> > have violated CAA policy, since there was no such expression of
> policy.
> >> >
> >> > Regards,
> >> >
> >> > Neil
> >> > _______________________________________________
> >> > dev-security-policy mailing list
> >> > dev-security-policy@lists.mozilla.org
> >> > https://lists.mozilla.org/listinfo/dev-security-policy
> >> >
> >> _______________________________________________
> >> dev-security-policy mailing list
> >> dev-security-policy@lists.mozilla.org
> >> https://lists.mozilla.org/listinfo/dev-security-policy
> >>
> >
> >
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to