Hi, Tobi,

     Please see inline.

[email protected] 在 2021年9月2日 星期四上午7:30:55 [UTC+8] 的信中寫道:

> On Tue, Aug 24, 2021 at 6:16 PM Li-Chun CHEN <[email protected]> wrote: 
> > 
> > => Our RA system performs the CAA record lookup by using the Dig 
> command, which is not performed by our RAOs manually, and the query request 
> is send to our HiNET DNS resolver (Chunghwa Telecom is a domain name 
> registrar as well) which supports the checking of DNSSEC validation chain 
> to the ICANN root. If the status response of Dig request is not ‘NOERROR’, 
> our system will treat it as a record lookup failure and can therefore issue 
> the certificate. 
>
> Does this mean that 
>
> 1) the dig output is parsed to determine whether the response is of 
> status: NOERROR or some other status


=>Yes.  
 

>
> 2) if a status of NOERROR is detected, the dig output is then 
> presented to a RAO,


=> Yes, our RA system logs all dig outputs that are also presented to our 
RAO. 

>
> 3) if some other status is detected, the system skips over this step - 
> i.e. does not consult a RAO, but assumes issuance is permitted as far 
> as CAA records are concerned?
>

Our RA system will made the CAA checking in accordance with Section 3.2.2.8 
of the BR, and a certificate is permitted to issue if the following 
conditions are met: 

a.      if the dig output is ‘NOERROR’ or some other status (except 
‘ERROR’); and 

b.     the lookup has been retried at least once; and 

c.      there does not have a DNSSEC validation chain to the ICANN root.
 

> Regards, 
>
> Tobi


Sincerely Yours,

           Li-Chun 
           Chunghwa Telecom  
 

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c9823f19-8d7a-4a85-8ffd-bf9473402a06n%40mozilla.org.

Reply via email to