I will endorse for Buypass. Regards Mads
From: Jacob Hoffman-Andrews [mailto:[email protected]] Sent: fredag 25. august 2017 00:01 To: Phillip <[email protected]>; CA/Browser Forum Public Discussion List <[email protected]> Cc: Ryan Sleevi <[email protected]>; Mads Egil Henriksveen <[email protected]> Subject: Re: [cabfpub] FW: [Errata Held for Document Update] RFC6844 (5065) This looks good, and I will endorse for Let's Encrypt. Do we have another endorser present? I'd like to get this to a ballot quickly to minimize any end-user confusion over the specifics. One small tweak to the new text: > As part of the issuance process, the CA MUST check for a CAA record for each > dNSName in the subjectAltName extension of the certificate to be issued, > according to the procedure in RFC 6844 as amended by Errata 5065 (Appendix > A), following the processing instructions set down in RFC 6844 for any > records found. If the CA issues, they MUST do so within the TTL of the CAA > record, or 8 hours, whichever is greater. Since this references 6844 twice, it's slightly ambiguous. I would instead just reference it once: > As part of the issuance process, the CA MUST check for a CAA record for each > dNSName in the subjectAltName extension of the certificate to be issued, > according to the procedure in RFC 6844 as amended by Errata 5065 (Appendix > A). If the CA issues, they MUST do so within the TTL of the CAA record, or 8 > hours, whichever is greater. On Wed, Aug 23, 2017 at 10:12 AM, Phillip via Public <[email protected]<mailto:[email protected]>> wrote: I am just working on wording for a proposal. Proposal: Modify the Baseline Requirements v1.4.9 as follows: 3.2.2.8. CAA Records Change: As part of the issuance process, the CA MUST check for a CAA record for each dNSName in the subjectAltName extension of the certificate to be issued, according to the procedure in RFC 6844, following the processing instructions set down in RFC 6844 for any records found. If the CA issues, they MUST do so within the TTL of the CAA record, or 8 hours, whichever is greater. To: As part of the issuance process, the CA MUST check for a CAA record for each dNSName in the subjectAltName extension of the certificate to be issued, according to the procedure in RFC 6844 as amended by Errata 5065 (Appendix A), following the processing instructions set down in RFC 6844 for any records found. If the CA issues, they MUST do so within the TTL of the CAA record, or 8 hours, whichever is greater. Add the following Appendix A: The following errata report has been held for document update for RFC6844, "DNS Certification Authority Authorization (CAA) Resource Record". -------------------------------------- You may review the report below and at: http://www.rfc-editor.org/errata/eid5065 -------------------------------------- Status: Held for Document Update Type: Technical Reported by: Phillip Hallam-Baker <[email protected]<mailto:[email protected]>> Date Reported: 2017-07-10 Held by: EKR (IESG) Section: 4 Original Text ------------- Let CAA(X) be the record set returned in response to performing a CAA record query on the label X, P(X) be the DNS label immediately above X in the DNS hierarchy, and A(X) be the target of a CNAME or DNAME alias record specified at the label X. o If CAA(X) is not empty, R(X) = CAA (X), otherwise o If A(X) is not null, and R(A(X)) is not empty, then R(X) = R(A(X)), otherwise o If X is not a top-level domain, then R(X) = R(P(X)), otherwise o R(X) is empty. Corrected Text -------------- Let CAA(X) be the record set returned in response to performing a CAA record query on the label X, P(X) be the DNS label immediately above X in the DNS hierarchy, and A(X) be the target of a CNAME or DNAME alias record chain specified at the label X. o If CAA(X) is not empty, R(X) = CAA (X), otherwise o If A(X) is not null, and CAA(A(X)) is not empty, then R(X) = CAA(A(X)), otherwise o If X is not a top-level domain, then R(X) = R(P(X)), otherwise o R(X) is empty. Thus, when a search at node X returns a CNAME record, the CA will follow the CNAME record chain to its target. If the target label contains a CAA record, it is returned. Otherwise, the CA continues the search at the parent of node X. Note that the search does not include the parent of a target of a CNAME record (except when the CNAME points back to its own path). To prevent resource exhaustion attacks, CAs SHOULD limit the length of CNAME chains that are accepted. However CAs MUST process CNAME chains that contain 8 or fewer CNAME records. From: Public [mailto:[email protected]<mailto:[email protected]>] On Behalf Of Ryan Sleevi via Public Sent: Wednesday, August 23, 2017 10:04 AM To: Mads Egil Henriksveen <[email protected]<mailto:[email protected]>>; CA/Browser Forum Public Discussion List <[email protected]<mailto:[email protected]>> Subject: Re: [cabfpub] FW: [Errata Held for Document Update] RFC6844 (5065) As currently required by the Forum, as specified in 6844. Held for document update means just that - a future version of CAA may adjust the processing rules, consistent with the IETF process. It was not rejected - that is, there was sufficient consensus that it wasn't an outright bad idea - but it's not formally adopted. However, this does give the Forum something somewhat-stable and reflecting broad-consensus and public participation to consider requiring in the interim, through a subsequent ballot, which would have the effect of 'relaxing' certain provisions of CAA. That is, should a member propose such a ballot, and should the Forum adopt it, this could be integrated - much as we have things such as non-critical nameConstraints to work around since-resolved vendor issues. On Wed, Aug 23, 2017 at 5:31 AM, Mads Egil Henriksveen via Public <[email protected]<mailto:[email protected]>> wrote: Hi What does this mean for us who are in the process of implementing support for CAA? Do we implement the CAA processing rules according to this errata or do we need to comply with the current version of RFC6844? Regards Mads -----Original Message----- From: Public [mailto:[email protected]<mailto:[email protected]>] On Behalf Of Phillip via Public Sent: tirsdag 22. august 2017 22:15 To: 'CA/Browser Forum Public Discussion List' <[email protected]<mailto:[email protected]>> Subject: [cabfpub] FW: [Errata Held for Document Update] RFC6844 (5065) We have held for document update! -----Original Message----- From: RFC Errata System [mailto:[email protected]<mailto:[email protected]>] Sent: Tuesday, August 22, 2017 12:58 PM To: [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]> Cc: [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]> Subject: [Errata Held for Document Update] RFC6844 (5065) The following errata report has been held for document update for RFC6844, "DNS Certification Authority Authorization (CAA) Resource Record". -------------------------------------- You may review the report below and at: http://www.rfc-editor.org/errata/eid5065 -------------------------------------- Status: Held for Document Update Type: Technical Reported by: Phillip Hallam-Baker <[email protected]<mailto:[email protected]>> Date Reported: 2017-07-10 Held by: EKR (IESG) Section: 4 Original Text ------------- Let CAA(X) be the record set returned in response to performing a CAA record query on the label X, P(X) be the DNS label immediately above X in the DNS hierarchy, and A(X) be the target of a CNAME or DNAME alias record specified at the label X. o If CAA(X) is not empty, R(X) = CAA (X), otherwise o If A(X) is not null, and R(A(X)) is not empty, then R(X) = R(A(X)), otherwise o If X is not a top-level domain, then R(X) = R(P(X)), otherwise o R(X) is empty. Corrected Text -------------- Let CAA(X) be the record set returned in response to performing a CAA record query on the label X, P(X) be the DNS label immediately above X in the DNS hierarchy, and A(X) be the target of a CNAME or DNAME alias record chain specified at the label X. o If CAA(X) is not empty, R(X) = CAA (X), otherwise o If A(X) is not null, and CAA(A(X)) is not empty, then R(X) = CAA(A(X)), otherwise o If X is not a top-level domain, then R(X) = R(P(X)), otherwise o R(X) is empty. Thus, when a search at node X returns a CNAME record, the CA will follow the CNAME record chain to its target. If the target label contains a CAA record, it is returned. Otherwise, the CA continues the search at the parent of node X. Note that the search does not include the parent of a target of a CNAME record (except when the CNAME points back to its own path). To prevent resource exhaustion attacks, CAs SHOULD limit the length of CNAME chains that are accepted. However CAs MUST process CNAME chains that contain 8 or fewer CNAME records. Notes ----- This is the updated errata to replace the ones previously deleted. It has been reviewed by all the parties concerned. Since this is a breaking change, this will have to go to hold for document update. The LAMPS working group is currently considering a more radical re-working of the CAA discovery scheme as a work item for its new charter. I will be in Prague to discuss... -------------------------------------- RFC6844 (draft-ietf-pkix-caa-15) -------------------------------------- Title : DNS Certification Authority Authorization (CAA) Resource Record Publication Date : January 2013 Author(s) : P. Hallam-Baker, R. Stradling Category : PROPOSED STANDARD Source : Public-Key Infrastructure (X.509) Area : Security Stream : IETF Verifying Party : IESG _______________________________________________ Public mailing list [email protected]<mailto:[email protected]> https://cabforum.org/mailman/listinfo/public _______________________________________________ Public mailing list [email protected]<mailto:[email protected]> https://cabforum.org/mailman/listinfo/public _______________________________________________ Public mailing list [email protected]<mailto:[email protected]> https://cabforum.org/mailman/listinfo/public
_______________________________________________ Public mailing list [email protected] https://cabforum.org/mailman/listinfo/public
