On Wed, Aug 22, 2018 at 2:10 AM josselin.allemandou--- via
dev-security-policy <[email protected]> wrote:

>
>
> ----------------------------------------------------------------------------
> CPS Section 4.2.1: If the request is valid and allows to obtain with
> accuracy the authorization to issue the certificate by a legal
> representative of the entity which is owner of the domain names, the CA
> authorizes itself to issue the certificate even if the CA is not present in
> the list of authorized CA.
> This appears to directly contravene BR Section 3.2.2.8, which specifies
> the following 3 scenarios in which a CA can issue a certificate despite not
> appearing in the CAA record:
> • CAA checking is optional for certificates for which a Certificate
> Transparency pre-certificate was created and logged in at least two public
> logs, and for which CAA was checked. Forum Guideline Baseline Requirements,
> v. 1.6.0 21
>
> • CAA checking is optional for certificates issued by a Technically
> Constrained Subordinate CA Certificate as set out in Baseline Requirements
> section 7.1.5, where the lack of CAA checking is an explicit contractual
> provision in the contract with the Applicant.
>
> • CAA checking is optional if the CA or an Affiliate of the CA is the DNS
> Operator (as defined in RFC 7719) of the domain's DNS.
>
> -> Indeed, we were operating up to now a control with an alert and a
> notification to the applicant (pointing on this page
> https://www.certigna.fr/dns-caa.xhtml) to add us in the field CAA if that
> It is present, but it was not blocking for the request because we
> considered that having a signed authorization of the legal representative
> was sufficient even if the applicant not having updated the CAA
> registration.
>
> >
This response implies that Certigna has misissued certificates that failed
CAA validation. I have opened a bug [1]  asking Certigna to identify and
remediate these certificates, and to file an incident report.
>

> Now, our control processes foresee that the certificate request is blocked
> notably in the following cases:
> - The CAA DNS field is present, it contains an "issue" or "issuewild" tag
> and it does not list Certigna as an authorized CA.
> - The CAA DNS field is present, designed as critical and the tag used is
> not supported by the CA (so if it is not an "issue" or "issuewild").
>
> We will be releasing the CP / CPS update to clarify these practices being
> implemented now. If this is enough for you, we will immediately publish the
> documents.
>

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1485413
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to