[cabfpub] Ballot 187 - Make CAA Checking Mandatory
Dimitris Zacharopoulos
jimmy at it.auth.gr
Tue Mar 7 09:15:32 UTC 2017
HARICA votes "yes" to ballot 187.
Dimitris.
On 3/3/2017 11:18 πμ, Gervase Markham via Public wrote:
>
> On 03/03/17 02:06, Dean Coclin wrote:
>
>> Hi Gerv,
>> Did you already publish a revised ballot somewhere? I recall seeing the original ballot but not a revised one. It would be helpful just to have a full, final ballot.
>
> I did not, as the change was so minor. But your wish is my command :-)
>
> Gerv
>
> *Ballot 187 v2 - Make CAA Checking Mandatory
> *
>
> The following motion has been proposed by Gervase Markham of Mozilla
> and endorsed by Jeremy Rowley of DigiCert and Ryan Sleevi of Google:
>
> *Statement of Intent*
>
> Certificate Authority Authorization (CAA) is a DNS Resource Record
> defined in RFC 6844 - https://datatracker.ietf.org/doc/rfc6844/ ,
> published in January 2013. It allows a DNS domain name holder to
> specify one or more Certification Authorities (CAs) authorized to
> issue certificates for that domain and, by implication, that no other
> CAs are authorized.
>
> The intent of this motion is to make it mandatory for CAs to check CAA
> records at issuance time for all certificates issued (except in a few
> special cases), and to prevent issuance if a CAA record is found which
> does not permit issuance by that CA. This therefore allows domain
> owners to set an issuance policy which will be respected by all
> publicly-trusted CAs, and allows them to mitigate the problem that the
> public CA trust system is only as strong as its weakest CA.
>
> Note that CAA is already a defined term in the BRs and so does not
> need definitional text to be provided by this motion.
>
> *-- MOTION BEGINS --*
>
> Add the following text as a new section 3.2.2.8 (titled "CAA Records")
> of the Baseline Requirements:
>
> This section is effective as of 8 September 2017.
>
> As part of the issuance process, the CA must check for a CAA
> record for each dNSName in the subjectAltName extension of the
> certificate to be issued, according to the procedure in RFC 6844,
> following the processing instructions set down in RFC 6844 for any
> records found. If the CA issues, they must do so within the TTL of
> the CAA record, or 8 hours, whichever is greater.
>
> This stipulation does not prevent the CA from checking CAA records
> at any other time.
>
> When processing CAA records, CAs MUST process the issue,
> issuewild, and iodef property tags as specified in RFC 6844.
> Additional property tags MAY be supported, but MUST NOT conflict
> with or supersede the mandatory property tags set out in this
> document. CAs MUST respect the critical flag and reject any
> unrecognized properties with this flag set.
>
> RFC 6844 requires that CAs "MUST NOT issue a certificate unless
> either (1) the certificate request is consistent with the
> applicable CAA Resource Record set or (2) an exception specified
> in the relevant Certificate Policy or Certification Practices
> Statement applies." For issuances conforming to these Baseline
> Requirements, CAs MUST NOT rely on any exceptions specified in
> their CP or CPS unless they are one of the following:
>
> * CAA checking is optional for certificates for which a
> Certificate Transparency pre-certificate was created and
> logged in at least two public logs, and for which CAA was checked.
> * CAA checking is optional for certificates issued by an
> Technically Constrained Subordinate CA Certificate as set out
> in Baseline Requirements section 7.1.5, where the lack of CAA
> checking is an explicit contractual provision in the contract
> with the Applicant.
> * CAA checking is optional if the CA or an Affiliate of the CA
> is the DNS Operator (as defined in RFC 7719
> <https://tools.ietf.org/html/rfc7719>) of the domain's DNS.
>
> CAs are permitted to treat a record lookup failure as permission
> to issue if:
>
> * the failure is outside the CA's infrastructure;
> * the lookup has been retried at least once; and
> * the domain's zone does not have a DNSSEC validation chain to
> the ICANN root.
>
> CAs MUST document potential issuances that were prevented by a CAA
> record in sufficient detail to provide feedback to the CAB Forum
> on the circumstances, and SHOULD dispatch reports of such issuance
> requests to the contact(s) stipulated in the CAA iodef record(s),
> if present. CAs are not expected to support URL schemes in the
> iodef record other than mailto: or https:.
>
> Update section 2.2 ("Publication of Information") of the Baseline
> Requirements, to remove the following text:
> Effective as of 15 April 2015, section 4.2 of a CA's Certificate Policy and/or Certification
> Practice Statement (section 4.1 for CAs still conforming to RFC 2527) SHALL state whether
> the CA reviews CAA Records, and if so, the CA’s policy or practice on processing CAA Records
> for Fully Qualified Domain Names. The CA SHALL log all actions taken, if any, consistent with
> its processing practice.
> and replace it with:
> Effective as of 8 September 2017, section 4.2 of a CA's Certificate Policy and/or Certification
> Practice Statement (section 4.1 for CAs still conforming to RFC 2527) SHALL state the CA’s policy or
> practice on processing CAA Records for Fully Qualified Domain Names; that policy shall be consistent
> with these Requirements. It shall clearly specify the set of Issuer Domain Names that the CA
> recognises in CAA "issue" or "issuewild" records as permitting it to issue. The CA SHALL log all actions
> taken, if any, consistent with its processing practice.
>
> Add the following text to the appropriate place in section 1.6.3 ("References"):
>
> RFC6844, Request for Comments: 6844, DNS Certification Authority
> Authorization (CAA) Resource Record, Hallam-Baker, Stradling,
> January 2013.
>
> *-- MOTION ENDS --
> *
>
> The procedure for approval of this Final Maintenance Guideline ballot
> is as follows:
>
> BALLOT 187
>
> Status: Maintenance Guideline
>
>
>
> Start time (22:00 UTC)
>
>
>
> End time (22:00 UTC)
>
> Discussion (7 to 14 calendar days)
>
>
>
> 2017-02-22
>
>
>
> 2017-03-01
>
> Vote for approval (7 calendar days)
>
>
>
> 2017-03-01
>
>
>
> 2017-03-08
>
> If vote approves ballot: Review Period (Chair to send Review Notice)
> (30 calendar days).
>
> If Exclusion Notice(s) filed, ballot approval is rescinded and PAG to
> be created.
>
> If no Exclusion Notices filed, ballot becomes effective at end of
> Review Period.
>
>
>
> Upon filing of Review Notice by Chair
>
>
>
> 30 days after filing of Review Notice by Chair
>
> From Section 2.3 of the Bylaws: If the Draft Guideline Ballot is
> proposing a Final Maintenance Guideline, such ballot will include a
> redline or comparison showing the set of changes from the Final
> Guideline section(s) intended to become a Final Maintenance Guideline,
> and need not include a copy of the full set of guidelines. Such
> redline or comparison shall be made against the Final Guideline
> section(s) as they exist at the time a ballot is proposed, and need
> not take into consideration other ballots that may be proposed
> subsequently, except as provided in Section 2.3(j) of the Bylaws.
>
> Votes must be cast by posting an on-list reply to this thread on the
> Public Mail List. A vote in favor of the motion must indicate a clear
> “yes” in the response. A vote against must indicate a clear “no” in
> the response. A vote to abstain must indicate a clear “abstain” in the
> response. Unclear responses will not be counted. The latest vote
> received from any representative of a voting member before the close
> of the voting period will be counted. Voting members are listed here:
> https://cabforum.org/members/
>
> In order for the motion to be adopted, two thirds (2/3) or more of the
> votes cast by members in the CA category and greater than 50% of the
> votes cast by members in the browser category must vote “yes”. Quorum
> is shown on CA/Browser Forum wiki. Under Section 2.2(g) of the Bylaws,
> at least the required quorum number of voting members must participate
> in the ballot for the ballot to be valid, either by voting in favor,
> voting against, or abstaining.
>
>
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20170307/12458edc/attachment-0002.html>
More information about the Public
mailing list