Hi Mark,
This was discussed during the previous Servercert meeting. While there was interest in adopting a requirement for this, a few potential issues were raised by having a requirement to follow iodef mailto URL schemes. Among this was the potential
for a CA to be DDoS’ed on their mailserver, be blocked by spamfilters, and most critical, there’s a potential issue from a privacy / GDPR perspective.
In short: Just because there’s an email address within an iodef tag, doesn’t mean that the owner of that email address put it there himself. If such a recipient demands that a CA stops sending these emails, a CA could then be put in the position of having to
violate either BR requirements, or violate the opt-out by such a recipient.
Having said that, it was discussed that a possible path forward could be to make this a requirement, but
only for http/https URL schemes. That would allow any party who does want to receive notifications to implement such a mechanism on a pre-defined URL, without CAs running the risk of violating privacy laws.
Regards,
Martijn Katerbarg
Sectigo
From: Mark Gamache <ma...@markgamache.com>
Date: Friday, 18 April 2025 at 00:15
To: server...@groups.cabforum.org <server...@groups.cabforum.org>
Subject: [Servercert-wg] Re: CAA iodef mailto
Anyone? From: Mark Gamache <mark@ markgamache. com> Sent: Monday, March 31, 2025 2: 00 PM To: servercert-wg@ groups. cabforum. org <servercert-wg@ groups. cabforum. org> Subject: [Servercert-wg] CAA iodef mailto Hi, Has there been talk about
ZjQcmQRYFpfptBannerStart
This Message Is From an Untrusted Sender
You have not previously corresponded with this sender.
ZjQcmQRYFpfptBannerEnd
Anyone?
Thanks for pointing me to those RFCs Aaron. I was already wondering if we needed a specification for this. It would be best if all CAs followed the same standard for sending notifications, so that a Subscribers single end-point could process a message from any CA. I may need to take a dive into these.
> What does it take to get a design approved and a roadmap and timeline ?
Essentially, proposed language by a member, two endorsing members, and then a discussion/voting period. However, there’s no roadmap or timeline that CABF can provide, until any voting period has concluded.
Regards,
Martijn
From:
'Aaron Gable' via Server Certificate WG (CA/B Forum) <server...@groups.cabforum.org>
Date: Friday, 18 April 2025 at 18:38
To: server...@groups.cabforum.org <server...@groups.cabforum.org>
Subject: Re: [E] Re: [Servercert-wg] Re: CAA iodef mailto
Sorry, I was asking if any CA has implemented RFCs 6546, 5070, and 6545 in order to provide HTTP(S) notifications, not mailto: notifications. Aaron On Fri, Apr 18, 2025 at 8: 53 AM 'Kyle Duren' via Server Certificate WG (CA/B Forum) <servercert-wg@ groups. cabforum. org>
ZjQcmQRYFpfptBannerStart
This Message Is From an External Sender
This message came from outside your organization.
ZjQcmQRYFpfptBannerEnd
Sorry, I was asking if any CA has implemented RFCs 6546, 5070, and 6545 in order to provide HTTP(S) notifications, not mailto: notifications.
Aaron
On Fri, Apr 18, 2025 at 8:53 AM 'Kyle Duren' via Server Certificate WG (CA/B Forum) <server...@groups.cabforum.org> wrote:
I've seen one, a single report from Buypass CA in the recent past about a CAA failure, I think that's the only CA we've ever received an alert email from a root operator.
Kyle Duren
Edge Security Architect
Paranoids: Network Access and Identity
M 310 467 5183