--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/servercert-wg/SA1PR17MB65037D6C291F84AEF90C3396E30CA%40SA1PR17MB6503.namprd17.prod.outlook.com.
I think both points raised here highlight a fundamental tension between requirements language and practical implementation realities.
On the one hand, Section 5.4.1’s broad phrasing (“all verification activities”) could indeed be read to imply that every step of DNSSEC validation must be logged. If interpreted strictly, that would mean CAs need resolver-level logging of trust chains, RRSIGs, and DS/DNSKEY validations — functionality most DNS resolvers do not provide and were never designed to provide. As noted, this would require modifying core resolver code, which seems disproportionate to the intent of the requirement.
On the other hand, DNSSEC validation is already designed to provide signals of success or failure. The AD (Authenticated Data) flag is a well-established and widely supported marker that a record was validated successfully against the DNSSEC chain. Similarly, resolver error codes capture cases where DNSSEC validation fails. These signals may not provide a full forensic log of the entire validation process, but they are evidence that validation was performed correctly by a compliant resolver.
From a compliance and audit perspective, it seems reasonable to aim for evidence of DNSSEC validation having occurred, rather than exhaustive logging of every cryptographic check. A carve-out in Section 5.4.1 clarifying that logging DNSSEC verification activities may be satisfied by recording resolver signals (AD flag, error codes, resolver configuration details) would align the requirement with industry practice while avoiding unnecessary operational burdens.
This approach also creates room for improvement: if, in the future, DNS software evolves to support verifiable trust chain logging, the requirement could encourage adoption without forcing immediate changes that are impractical today.
Happy to discuss more in detail and work together to bring in the change.
Does it make sense to log "resolver configuration details" with every request? How would a DNS-Client get the resolver's configuration? It would need extra access to the system where the resolver is running… that would create additional attack surface that I'm not sure is worth the risk.
Resolver configuration is certainly something that needs to be controlled, versioned and audited. But does it have to be in the logs with each request?
Rgds
Roman