Dear Community,
One of our PKI engineers brought up the following situation where we are not certain which option to implement:
The following is the implemented procedure for domain validations without DNSSEC:
· The base domain, e.g. basedomain.com, is validated.
· A certificate with the subdomain sub.basedomain.com has been requested. If the NS servers were set up correctly and the CAA check was successful, it did not matter that there was no zone or RRset for this subdomain.
· In such a case, the certificate could be issued.
Now, since DNSSEC checks have been introduced, the situation is slightly different:
· The base domain, e.g. basesecdomain.com, is validated.
· A certificate with the subdomain sub.basesecdomain.com has been requested. If the NS servers were set up correctly and the CAA check was positive, we would receive an NSEC or NSEC3 entry if there was no zone and RRset for this subdomain.
· In this case, we do not know whether a certificate can be issued or not.
Arguments in favor of issuance:
· A validly signed NSEC/NSEC3 is NOT a DNSSEC validation error (SERVFAIL or Bogus), but rather a secure statement about the absence of the CAA entry. This must trigger the mandatory CAA tree climbing to the validated base domain.
· Previous behavior for non-existent subdomain configurations are retained and do not confuse customers if they request certificates with multiple domains which may combine domains which have DNSSEC disabled or enabled.
· Certificates can be issued before valid subdomain zones and its RRset’s are set up.
· Example: The PKI manager can issue a certificate for shop.basesecdomain.com before the zone has been set up.
Arguments against issuance:
· NSEC/NSEC3 cryptographically proves the authenticated non-existence of the subdomain resource. If such negative proof exists, the name is invalid in the DNSSEC-secured zone; CAA tree climbing as policy validation cannot be considered at this level, as it has been proven that no test object exists.
· The logic behind that is that a DNSSEC RRset chain of the subdomain must be valid in order to even begin a CAA check.
· DNSSEC is supposed to be a mechanism that secures all the domains and subdomains which are used, and it makes somehow no sense to be able to issue a certificate for a subdomain that does not exist.
· Certificates can only be issued after valid subdomain RRset’s have been set up.
· Example: The PKI manager can issue shop.basesecdomain.com after the zone has been set up properly.
What is the community's view on this topic?
Kind regards
Roman
Roman Fischer
Information Security Manager
+41 76 310 12 66
SwissSign AG
Sägereistrasse 25
Postfach
CH-8152 Glattbrugg
swisssign.com
Nichts mehr verpassen: Folgen Sie uns auf LinkedIn!
Abonnieren Sie unseren Newsletter oder besuchen Sie unseren Blog.