Ballot SC-082 is proposed by Michael Slaughter (Amazon Trust Services) and endorsed by Martijn Katerbarg (Sectigo) and Wayne Thayer (Fastly).
— Purpose of Ballot SC-082 —
The purpose of this ballot is to clarify the practice of CA Assisted DNS Validation and add constraints under Method 7 (3.2.4.4.7 DNS Change). Modification of other domain validation methods and the introduction of new domain validation methods are not in scope of this ballot but may be addressed in a future ballot.
Background:
CA Assisted DNS Validation is the practice where Certification Authorities (CAs) instruct Applicants to create Canonical Name (CNAME) records specifically for the purpose of assisting the Applicant with Domain Control Verification (DCV) of their domain.
At F2F 59 (July 23’), the Validation Subcommittee of the Server Certificate WG presented the following conclusions on the practice of CA Assisted DNS Validation:
A tiger team was formed to threat model CA Assisted DNS Validation and propose modifications to the BRs to add clarity and constraints around the practice under section 3.2.2.4.7. The results of the threat model exercise [1] were presented and discussed at F2F 60 [2] and F2F 61 [3].
Overview of Changes:
References:
[1] Validation SC Threat Modeling Doc: https://docs.google.com/document/d/1G2GYb0eg0rqE23f844J8qs7RYGU1jFVDsU5Pf7UYg3g/edit
[2] F2F-60 Presentation: https://docs.google.com/presentation/d/1M80h1N7MpBuqvZS0FdtJ_zj-AsaFxu7BNBSUJ6Ia5jU/edit?usp=sharing
[3] F2F-61 Presentation: https://docs.google.com/presentation/d/1rKW7I5jOYh37jQFtd1S-fKIs0j-dCAyUUU-fq_C8UKw/edit?usp=sharing
[4] https://github.com/cabforum/servercert/pull/501
The following motion has been proposed by Michael Slaughter (Amazon Trust Services) and endorsed by Martijn Katerbarg (Sectigo) and Wayne Thayer (Fastly)
GitHub pull request for this ballot: https://github.com/cabforum/servercert/pull/501
— Motion Begins —
MODIFY the "Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates" ("TLS Baseline Requirements") based on Version 2.0.9 as specified in the following redline:
— Motion Ends —
This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:
Discussion (7 days)
- Start: 2024-11-12 17:30:00 UTC
- End no earlier than: 2024-11-19 17:30:00 UTC
Vote for approval (7 days)
- Start: TBD
- End: TBD
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/CF06C88E-922A-47D9-A34F-382EDC82BB95%40amazon.com.
DigiCert votes YES on SC-082
--
Buypass ABSTAINS from voting on ballot SC-082. We agree with Dimitris that more discussion is required.
Regards
Mads
From: 'Slaughter, Michael' via Server Certificate WG (CA/B Forum) <server...@groups.cabforum.org>
Sent: tirsdag 12. november 2024 18:33
To: server...@groups.cabforum.org
Subject: [Servercert-wg] Discussion Period Begins - Ballot SC-082: "Clarify CA Assisted DNS Validation under 3.2.2.4.7"
Ballot SC-082 is proposed by Michael Slaughter (Amazon Trust Services) and endorsed by Martijn Katerbarg (Sectigo) and Wayne Thayer (Fastly).
--
SwissSign votes 'yes' on SC-082
Mike
Note: Second try as I believe that the first one was not sent correctly
From: 'Slaughter, Michael' via Server Certificate WG (CA/B Forum) <server...@groups.cabforum.org>
Sent: Tuesday, November 12, 2024 6:33 PM
To: server...@groups.cabforum.org
Subject: [Servercert-wg] Discussion Period Begins - Ballot SC-082: "Clarify CA Assisted DNS Validation under 3.2.2.4.7"
Ballot SC-082 is proposed by Michael Slaughter (Amazon Trust Services) and endorsed by Martijn Katerbarg (Sectigo) and Wayne Thayer (Fastly).
--
Right.
People are already doing this. A few years ago, we decided that it would be better to clarify explicitly that it is allowed, and to remove some unclear wording that could be misread as disallowing it.
We need to stop discussing the same points over and over for years on end and get this ballot passed.
-Tim
Dear Aaron,
Thanks for this possible way forward.
One thing to consider: Binding to the public key of the certificate will make it impossible for some CAs to use this method as they don't allow to re-use a keypair at all.
Thx
Roman
From: 'Aaron Gable' via Server Certificate WG (CA/B Forum) <server...@groups.cabforum.org>
Sent: Dienstag, 3. Dezember 2024 00:19
To: server...@groups.cabforum.org
Subject: Re: [Servercert-wg] Discussion Period Begins - Ballot SC-082: "Clarify CA Assisted DNS Validation under 3.2.2.4.7"
Well, SC-082 has failed during the voting period. I'd like to put down some thoughts about how I think something in this same direction could be improved.
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
When a third party -- such as "acme-dns" -- operates a DNS service to which the Applicant delegates the DCV process, that delegation involves the Applicant providing the token to the third-party every time they attempt validation. The token travels from the CA, to the Applicant, to the third-party: the Applicant is actively participating in the process, demonstrating that they still desire for this delegation to be in place at the time validation occurs.
When a CA operates a DNS service to which the Applicant delegates the DCV process, the token is potentially never even provided to the Applicant at all. It travels from the CA directly into the CA's DNS service, thus demonstrating nothing about the Applicant's desires at the time validation occurs -- it only demonstrates that the Applicant wished to delegate DCV at some time in the past.
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/82d59d63-0a50-4d60-8f41-9a75f4272478%40harica.gr.
--
You received this message because you are subscribed to a topic in the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this topic, visit https://groups.google.com/a/groups.cabforum.org/d/topic/servercert-wg/ctYFczlzT5Y/unsubscribe.
To unsubscribe from this group and all its topics, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/0f4e0640-6012-96bd-2631-ec9090b9f821%40opera.com.
However, I think there are actually several aspects of static identifiers for domain control validation that largely align with certificate consumers' stated objectives of improved security, improved automation, and validation methods that rely on modern protocols/cryptography. In fact, I even feel there are some superior security properties of a hypothetical validation method using such static identifiers over several existing methods.
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/CADQzZqvaxCQufKQE%2BodUc6L5Z7tJPOm_F%3Dc1SUDkD0uOL07wTg%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/CADQzZqvaxCQufKQE%2BodUc6L5Z7tJPOm_F%3Dc1SUDkD0uOL07wTg%40mail.gmail.com.
Hi Aaron,I like this proposal. There were a couple minor points I wanted to clarify:1. You explicitly mention an RFC 8657, Section 3 account URI. This is fine for ACME clients but I personally do not see any reason this method should be exclusive to ACME. Digicert uses an account specifier format of "account=<ACCOUNT_NUMBER>" in CAA records, and I think a similar approach would work OK in this context (particularly since the ca= field already uniquely identifies the CA, so we do not run the risk of account number collisions). Would it make sense to change this language to "a value that uniquely identifies a subscriber account (e.g., an RFC 8657, Section 3 account URI)" to permit non-ACME values?
2. You have an optional ability to specify a public key which I presume is the public key of a certificate request. The P256 you give as an example is pretty short, but an RSA 2048 key is a good amount longer and a post-quantum key could be quite long. Additionally, the way DNS works, when a resolver retrieves a TXT record set (even if it is just to retrieve an SPF value), the DNS infrastructure must return the entire TXT RRSET. If the RRSET contains multiple RSA 2048 or post quantium keys, this could easily degrade DNS performance causing TCP fallback for the query. There is also some recent research about DNS's (in)ability to deliver responses signed by very large key sizes in the context of DNSSEC. With this in mind, would it make sense to just replace this field with the SHA256 hash of a public key or at least allow for the option of specifying a key hash?
3. I personally think the most secure way to enable this is actually not to bind the authorization to an account but instead authorize a particular secret token/key pair that is provisioned within that account. Somewhat like an API key that has only the restricted privilege of requesting certificates for the domain(s) that contain the corresponding static authorization token. This has more elegant scoped security and (presuming tokens cannot be redownloaded) security even in the event of a subscriber account compromise. Even in the ACME case where an accounturi is bound to a private key, there is still a benefit of using some other token system. In part due to the Let's Encrypt rate limit exemption system, several organizations process millions of certificate requests from one ACME account. Binding domain authorization for millions of domains to this single account creates somewhat of a one-key-to-rule-them-all phenomena. I would personally prefer if there was the option to have a layer of indirection here where domain authorizations could be tied to a secret that was more fine-grained than an ACME account. Would it make sense to explicitly permit this use case by adding something like "authtoken=X" where X uniquely identifies a certificate requesting agent authorized to obtain a certificate for this domain.
Also, an auxiliary note on syntax, it may be helpful to start the record with a token identifying the purposes of the record and not just go directly into ca= . Something like "static-dcv ca=...." Aslo, SPF1 records use ":" between keys and values, CAA records use ";" between different properties. This seems to be a bit in the middle (equals signs between keys and values but spaces between different properties). Finally, for the eventual standard an ABNF syntax definition may be helpful as this would allow the generation of auto parsers and validators.
Thanks again Aaron and all for the proposal. I think this is a great direction to go in.Best,Henry
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.