Summary:
After
discussions around DNSSEC enforcement [1] [2] for all Domain
Validation methods, and with the WG's decision that the e-mail
Domain Validation methods are scheduled to be deprecated (SC090),
in order to reduce complexity and confusion around the way to
enforce DNSSEC checks on the various email service agents, an
exception to the DNSSEC enforcement is proposed for those methods.
More information is available in this pull request.
[1]: https://groups.google.com/a/groups.cabforum.org/g/validation/c/zIKy6Qffw3w/m/qYDGYDQLBAAJ
[2]: https://groups.google.com/a/groups.cabforum.org/g/servercert-wg/c/g4G7WF6uCHo/m/gX2Ek4S-BAAJ
[3]: https://groups.google.com/a/groups.cabforum.org/g/servercert-wg/c/226_yZ8Lp4c/m/9bJhRHGpAAAJ
The following motion has been proposed by Dimitris Zacharopoulos (HARICA) and endorsed by Roman Fischer (SwissSign) and Adriano Santoni (Actalis).
--- Motion Begins
---
This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates” (“Baseline Requirements”), based on Version 2.1.9.
MODIFY the Baseline Requirements as specified in the following Redline: https://github.com/cabforum/servercert/compare/d5ad450cc17ccd306ed87f790e1ef4f4ae5bfe22 .
--- Motion Ends ---
This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:
Discussion (at least 7 days)
Vote for approval (7 days)
With regards to the proposal itself, the following concerns were raised for leading to this ballot. Please see my comment for each concern:
Additionally, I would bring up that this carveout, may make the DCV process more complex for CAs. As it stands today, CAs are able to utilize a single DNS Resolver, with the
same configuration, in order to satisfy the DNSSEC requirements.
If a CA wants to scope out some DNS record types, only for specific DCV methods, then it seems the CA would need to setup new DNS Resolvers specifically for those DNS record lookups, leading to more complexity within the system itself.
Additionally, I would bring up that this carveout, may make the DCV process more complex for CAs. As it stands today, CAs are able to utilize a single DNS Resolver, with the same configuration, in order to satisfy the DNSSEC requirements.
If a CA wants to scope out some DNS record types, only for specific DCV methods, then it seems the CA would need to setup new DNS Resolvers specifically for those DNS record lookups, leading to more complexity within the system itself.
Hi Dimitris,
Sorry for not sending this out sooner. I’ve voiced concern with this proposal during the last F2F. Those haven’t changed, so I’ll outline them here during the discussion period, as well as some additional context.
Looking at the proposed language, I believe there’s a clash in the language, which renders the newly added SHOULD, pointless. Line 773 states:
“CAs MUST NOT use local policy to disable DNSSEC validation on any DNS query associated with the validation of domain authorization or control.”
If any DNS query associated with DCV must utilize DNSSEC validation (if it’s not permitted to be disabled, it must be enabled), then how could a CA ever skip DNSSEC validation for certain record types?
With regards to the proposal itself, the following concerns were raised for leading to this ballot. Please see my comment for each concern:
- Building a feedback loop between DNSSEC validation and the mail delivery process would be operationally challenging. Without such a feedback channel, failed lookups result in undelivered email and support escalations.
- I’m unsure how this is problematic purely due to the DNSSEC verification requirement. Like I mentioned previously, DNSSEC verification is something done by the DNS resolver, not the mailserver.
The statement is correct in that DNSSEC validation failure could result in undelivered emails. However, I fail to see how this a new concern at this moment.
Email delivery failures is something that we’ve presumably all been dealing with for the last XX years. The new DNSSEC verification requirement does not suddenly introduce email delivery failure as a new concept. As such, if a CA is worried about needing to track and process email delivery failures, this should already be, and have been a concern, prior to the DNSSEC ballot.- Enforcing DNSSEC at this layer could make CAs responsible for diagnosing global DNS configuration problems.
- While true, and we also see our fair share of this, I fail to see how this will see any impact specifically due to email DCV. If DNSSEC verification would fail for an MX record lookup, the likelihood of it also failing for a CAA lookup on the same domain is very high. As such, I do not see how excluding MX records from the DNSSEC verification requirement would reduce the impact.
- Email-based DCV represents only a small portion of issuance volume.
- While I expect this is correct, as Toni already mentioned during the F2F: attackers focus on the weakest link, and this method could be exploited.
If we leave one method less secure, the entire DNSSEC verification requirement is, frankly, pointless until these methods have been deprecated. I will add here that Email-based DCV is already the weakest link right now, as it has also been exempted from the MPIC requirements.
Additionally, I would bring up that this carveout, may make the DCV process more complex for CAs. As it stands today, CAs are able to utilize a single DNS Resolver, with the same configuration, in order to satisfy the DNSSEC requirements.
If a CA wants to scope out some DNS record types, only for specific DCV methods, then it seems the CA would need to setup new DNS Resolvers specifically for those DNS record lookups, leading to more complexity within the system itself.
Mike
--
You received this message because you are subscribed to the Google Groups "Server Certificate WG (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to servercert-w...@groups.cabforum.org.
On 12/12/2025 4:19 PM, 'Martijn Katerbarg' via Server Certificate WG (CA/B Forum) wrote:
Hi Martijn,Hi Dimitris,
Sorry for not sending this out sooner. I’ve voiced concern with this proposal during the last F2F. Those haven’t changed, so I’ll outline them here during the discussion period, as well as some additional context.
Looking at the proposed language, I believe there’s a clash in the language, which renders the newly added SHOULD, pointless. Line 773 states:
“CAs MUST NOT use local policy to disable DNSSEC validation on any DNS query associated with the validation of domain authorization or control.”
If any DNS query associated with DCV must utilize DNSSEC validation (if it’s not permitted to be disabled, it must be enabled), then how could a CA ever skip DNSSEC validation for certain record types?
That's a good point. I considered the entire paragraph as a combined text but I can see how it can be interpreted under a "strict reading". The intent was to require DNSSEC for the cases of CNAME, CAA and TXT queries to address Aaron's concern (about possible delegations) but not for the mail service itself. As discussed, it is very likely that a CA has a different infrastructure for handling the CA/RA operations and a separate one for the mail service. Some CAs even outsource the mail service to third-parties, as mentioned in those previous discussions. We may disagree about this being allowed or not and where the line is drawn, but the general understanding is that the management of a mail system extends beyond the scope of "CA Operations" and usually serves an entire organization (or organizations within an organization).
So, to answer your question, the CA could force DNSSEC validation in a local resolver used for CNAME, CAA, TXT and any other query, closely tied with the "CA operations" (CAA checks and non-email DCV methods), and the mail service could use a different resolver that does not validate DNSSEC because that would have a significant impact on the delivery of emails outside the scope of DCV.
In any case, I will try to propose some language to address this "MUST NOT" conflict (happy to accept contributions :) .
I reworded the section to ensure that DNSSEC validation MUST NOT be disabled for non-email DCV methods, nor for DNS CNAME, CAA, and TXT queries associated with email DCV methods. For the remaining DNS queries associated with non-email DCV methods, the requirement was relaxed so that disabling DNSSEC is now a SHOULD NOT.
https://github.com/cabforum/servercert/commit/a9f40a597e45605e499bc73a64aaa1d607bd5b0a
I hope this addresses at least the inconsistency issue. Please let me know if any further wordsmithing is needed.