Hi everyone,
Motivated by (1) the proposed 3.2.2.4.22 included in draft SC-088, (2) Henry Birge-Lee’s recent presentation on risk introduced by ‘crossover’ validation methods, and (3) Chrome’s proposal to sunset those methods - Google Trust Services has drafted a complementary ‘persistent’ IP address validation method for the group’s consideration.
The method is closely modeled after the proposed 3.2.2.4.22, and is intended to offer parity across domain and IP address validation methods in the TLS BRs.
While certificates for IP addresses constitute a small portion of the WebPKI, they are fundamental to the secure operation of critical internet infrastructure. Notable examples include:
Emergency Access Infrastructure: SSH front-ends, designed for network recovery during major outages (such as the incident affecting Facebook), depend on IP certificates for secure, direct access when domain resolution might be unavailable.
DNS-over-HTTPS (DoH) services: Systems like 8.8.8.8 (Google Public DNS), 1.1.1.1 (Cloudflare), and 9.9.9.9 (Quad9) rely on IP certificates to establish secure, authenticated channels.
If ultimately 3.2.2.5.3 is sunset due to security concerns, the ecosystem would be without any means to validate IP address control using DNS-based challenges. The remaining HTTP-based methods necessitate running web services on ports 80 or 443, which is sometimes not feasible or desirable for some systems.
Request for feedback:
Do members have concerns about this proposed method (e.g., security / threat model, usability, etc.)?
Do members have concern with including it in the scope of SC-088? Or, should it instead be deferred for a later proposal (like Chrome’s, or a dedicated ballot). Combining it with SC-088 makes sense given the subject, but we’d like to ensure members are comfortable with doing so before possibly slowing SC-088’s progress.
Any other feedback is welcome.
Thank you,
Gurleen Grewal, on behalf of Google Trust Services
--
You received this message because you are subscribed to the Google Groups "Validation Subcommittee (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to validation+...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/validation/CAHidiLEM7ht3S1pyTH7D3mg2Vr3xuw8UF2Cx2o4S47CocRvvUQ%40mail.gmail.com.
Hi Gurleen,
Thank for you circulating this proposal. I think this proposal is useful for explicitly defining a DNS-based IP address validation method. Since this idea is new (although it’s an extension of the method in SC-88), my personal (non-chair) opinion is that SC-88 should proceed as-is and this IP address validation method can be proposed in its own ballot.
I believe going this route enables more focused conversation on this specific method. It also helps the group with creating smaller, more focused ballots that are easier to understand.
Thanks,
Corey
From: 'Gurleen Grewal' via Validation Subcommittee (CA/B Forum) <valid...@groups.cabforum.org>
Sent: Friday, August 22, 2025 12:07 PM
To: valid...@groups.cabforum.org
Subject: [cabf_validation] Feedback on extending SC-088 to include a persistent method for IP Address validation
Hi everyone,
Motivated by (1) the proposed 3.2.2.4.22 included in draft SC-088, (2) Henry Birge-Lee’s recent presentation on risk introduced by ‘crossover’ validation methods, and (3) Chrome’s proposal to sunset those methods - Google Trust Services has drafted a complementary ‘persistent’ IP address validation method for the group’s consideration.
The method is closely modeled after the proposed 3.2.2.4.22, and is intended to offer parity across domain and IP address validation methods in the TLS BRs.
While certificates for IP addresses constitute a small portion of the WebPKI, they are fundamental to the secure operation of critical internet infrastructure. Notable examples include:
If ultimately 3.2.2.5.3 is sunset due to security concerns, the ecosystem would be without any means to validate IP address control using DNS-based challenges. The remaining HTTP-based methods necessitate running web services on ports 80 or 443, which is sometimes not feasible or desirable for some systems.
Request for feedback:
2. Do members have concern with including it in the scope of SC-088? Or, should it instead be deferred for a later proposal (like Chrome’s, or a dedicated ballot). Combining it with SC-088 makes sense given the subject, but we’d like to ensure members are comfortable with doing so before possibly slowing SC-088’s progress.
Any other feedback is welcome.
Thank you,
Gurleen Grewal, on behalf of Google Trust Services
--
>Since this idea is new (although it’s an extension of the method in SC-88), my personal (non-chair) opinion is that SC-88 should proceed as-is and this IP address validation method can be proposed in its own ballot.
--
You received this message because you are subscribed to the Google Groups "Validation Subcommittee (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to validation+...@groups.cabforum.org.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/validation/2ca71376-96e1-4e91-aa01-195a7452aa28%40thomassen.io.