Dear Wayne,
Thanks for the proposal. It is clear, that some customers want /need these CAA enhancements. But does it have to be a MUST requirement? Can we rephrase it so that CAs must be able to parse CAA entries that contain these enhancements but don't have to offer them for their customers?
If that is not an option, then I must say that the suggested effective date of 2025-09-15 is very tight for a change in such a critical component as the CAA processing. I would then suggest to at least change the effective date to 2026-03-15.
Kind regards
Roman
--
You received this message because you are subscribed to the Google Groups "Validation Subcommittee (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
validation+...@groups.cabforum.org.
To view this discussion visit
https://groups.google.com/a/groups.cabforum.org/d/msgid/validation/CAPh8bk-AA%3DyT8dcXs%2Bv9VV%2BKC72MM60GUfvZpuyozReV_H5ynQ%40mail.gmail.com.
Hi Wayne,
We also discussed perhaps making this a SHOULD vs. a MUST. Setting standards for how to define the acccounturi and validation method is a great idea and something we need to standardize on, but I’d recommend making this a SHOULD for the time being. It doesn’t seem like a mandatory/security related feature that all CAs need to support immediately, unless I missed something in the preamble around the need for this.
Doug
Jan 9, 2025 20:54:04 Wayne Thayer <wth...@gmail.com>:
Taken together, the desired result is achieved: CA's MUST adhere to the requirements in the second paragraph whenever they process these parameters.
In a previous discussion, I was asked to relax the requirement for documenting the accounturi format in section 3.2.2.8 of the CA's CPS because that specific subsection and preceding subsections might not exist. While reviewing this I realized that other CAA information is required to be placed in CP/CPS section 4.2, so I've updated this proposal to match.
Hi Wayne,
There is some very good information here. On a somewhat tangential note, I have a question. I noticed that we removed 2 of the required checks regarding CAA failures in the ballot, specifically:
*if the failure is outside the CA's infrastructure; and |
* if the lookup has been retried at least once;
If MPIC is being used to validate CAA records in a mode that is at least as strong as the September 15, 2025 MUST requirement, can we assume that these checks are inherently satisfied because of MPIC? I’m thinking yes, but wanted to get that confirmed with others.
Thanks!
Doug
Hi Wayne,
There is some very good information here. On a somewhat tangential note, I have a question. I noticed that we removed 2 of the required checks regarding CAA failures in the ballot, specifically:
*if the failure is outside the CA's infrastructure; and
* if the lookup has been retried at least once;
CAs are permitted to treat a record lookup failure as permission to issue if:
* the failure is outside the CA's infrastructure; and
* the lookup has been retried at least once; and
* the domain's zone does not have a DNSSEC validation chain to the ICANN root.
If MPIC is being used to validate CAA records in a mode that is at least as strong as the September 15, 2025 MUST requirement, can we assume that these checks are inherently satisfied because of MPIC? I’m thinking yes, but wanted to get that confirmed with others.
Hi Wayne,
I can share how our supplier has implemented it (maybe others can share too?):
We have scheduled jobs to do domain validation. Validation is retried several times. On every try:
So, the way it's implemented right now (not audited yet!) is that all the checks have to pass during the same try.
Rgds
Roman
From: Wayne Thayer <wth...@gmail.com>
Sent: Mittwoch, 12. Februar 2025 00:51
To: valid...@groups.cabforum.org
Subject: Re: [cabf_validation] Draft Language for CAA accounturi and validationmethods Processing Requirement
Hi Doug,
--
You received this message because you are subscribed to the Google Groups "Validation Subcommittee (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
Wouldn't it be more "robust" to omit the requirement for a specific section altogether? Just require it to be in the CP/CPS without any section.
Cheers
Roman
From: Wayne Thayer <wth...@gmail.com>
Sent: Dienstag, 11. Februar 2025 23:24
To: valid...@groups.cabforum.org
Subject: Re: [cabf_validation] Draft Language for CAA accounturi and validationmethods Processing Requirement
On Thu, Feb 6, 2025 at 5:54 PM 'Ben Wilson' via Validation Subcommittee (CA/B Forum) <valid...@groups.cabforum.org> wrote:
--
You received this message because you are subscribed to the Google Groups "Validation Subcommittee (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
validation+...@groups.cabforum.org.
Hi all,
surely this has already been widely
discussed, so I beg your pardon for putting it on the table
again :)
The transition to mandatory DNSSEC-support will have its drawbacks, as it introduces overhead at various levels (larger size of DNS responses, need for multiple DNS queries to build the trust path, signature verifications). This increased protocol overhead, combined with the progressive reduction in certificate lifetime which means a significant increase in the volume of domain validations, I fear could lead to a huge increase in the workload that CAs, CT logs, Firewalls, etc. will have to sustain.
I am /not/ saying that mandatory DNSSEC support in domain validation is wrong, but only that it will also lead to problems...
Adriano
NOTICE: Pay attention - external email - Sender is validation+bncBDTOBIEW...@groups.cabforum.org
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/validation/f2c0473d-3921-4154-b7c9-f197b7c8847f%40staff.aruba.it.