On Sat, Jun 18, 2016 at 01:53:20PM +0800, Aaron Zauner wrote:

> RFC6844 defines a method by which domain owners can limit the CA allowed
> to issue certificates for their domain.

Critically, this signalling channel is *exclusively* between the
domain and any CA that might consider issuing a certificate for
the domain.  It MUST NOT be used by relying parties.

Unfortunately, the CA/B forum voted to make support for this
optional, so this standard is stillborn.

> As far as I can tell this isn't widely implemented in DNS Daemons (KnotDNS
> and Bind9 [urgh]) do have support though. Is this something that might
> make sense including in the MTA-STS document?

See above, CAA does not apply to relying parties, and has no
relevance to STS.

> i.e. one could effectively restrict validation to a certain CA (say for 
> example Let's Encrypt).

One could attempt to ask other CAs to not issue certificate for
one's domain.  In practice, this is mostly useless.

-- 
        Viktor.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to