Ballot SC-098: Process RFC 8657 CAA Parameters
Summary of the Ballot
This ballot adds the requirement that CAs process the Certification Authority Authorization (CAA) parameters defined in RFC 8657. These parameters allow the issuance policy specified by a CAA record to include the account and domain validation methods that may be used to issue a certificate for the subject domain.
The ballot defines a syntax for specifying non-ACME domain validation methods in section 4.2.2.1.3.
CAs supporting non-ACME accounts must document the accepted accounturi format in their CP or CPS.
These requirements take effect on March 15, 2027.
The ballot also moves and consolidates CAA requirements into section 4.2.1.
Summary of Discussion
This ballot has undergone extensive discussion in the Validation Working Group dating back to 2024, and in https://github.com/cabforum/servercert/pull/567.
The value of the CAA extensions defined in RFC 8657 will only be realized if CAs process the parameters rather than ignoring them.
We originally considered including DNSSEC requirements in this ballot but decided to separate them into ballot SC-085.
Consensus formed that Non-ACME validation methods must use a specific syntax to avoid conflicts and provide consistency across CAs.
Special thanks to Grace Cimaszewski for helping to move this ballot forward.
The following motion has been proposed by Wayne Thayer (Fastly) and endorsed by Chris Clements (Google) and Ben Wilson (Mozilla).
--- Motion Begins ---
This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates” (“Baseline Requirements”), based on Version 2.2.6
--- Motion Ends ---
This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:
Discussion (at least 7 days)
Start time: 2026-04-02 15:00 UTC
End time: no earlier than 2026-04-09 15:00 UTC
Vote for approval (7 days)
Start time: TBD
End time: TBD
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/CAPh8bk-n6kpuRqL3yKK64SQb6w0sBR79WuaLLnd6qNGp5GdU7Q%40mail.gmail.com.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/1aa10ad2-3b01-40ef-9d07-735f08a9e11b%40harica.gr.
//Antti
I went through RFC 8657 and didn’t see any allowance for case-insensitive matching. Since RFC 8657 is silent on this, the required behavior is an exact case-sensitive match. There’s no benefit in allowing case-insensitivity, so I think CAs must perform an exact match and reject labels such as “DNS-01” or “Ca-TbR-7”.
Thanks,
Corey
Hi Wayne,
> - The format of the label was debated when this ballot was first introduced. My recollection is that we chose the 'tls-br-' prefix to ensure that the label is not confused with other standards such as the S/MIME BRs. In practice, the EVGLs, S/MIME BRs, and Code Signing BRs do not currently appear to have any practical conflicts with the proposal to use '3.2.2.4.n' as the label. I'm not opposed to this change, but I'd like to hear from others if there is a preference for it over the current approach.
RFC 8657 only allows letters, digits, and the hyphen character in validationmethods labels. Also, non-ACME validationmethod labels must be prefixed with “ca-“.
I think the way the ballot currently defines the labels is a good approach.