[cabfpub] Ballot 187 - Make CAA Checking Mandatory

Moudrick M. Dadashov md at ssc.lt
Wed Mar 8 08:14:42 UTC 2017


SSC votes: "Yes".

Thanks,
M.D.

On 3/7/2017 9:09 PM, cornelia.enke--- via Public wrote:
>
> SwissSign votes “yes” on ballot 187.
>
> Best Regards Conny
>
> *Von:*Public [mailto:public-bounces at cabforum.org] *Im Auftrag von 
> *Gervase Markham via Public
> *Gesendet:* Mittwoch, 22. Februar 2017 22:35
> *An:* CABFPub
> *Cc:* Gervase Markham
> *Betreff:* [cabfpub] Ballot 187 - Make CAA Checking Mandatory
>
> Hi everyone,
>
> This ballot is now entering its seven-day discussion period. My 
> sincere thanks to everyone who helped shape the text into what it is 
> today.
>
> Changes from draft 3:
>
> * 1 hour changed to 8 hours as minimum caching time, to make manual 
> issuance easier.
>
> * Added text from Ryan, at Doug's suggestion, of exactly which 
> properties need to be supported.
>
> * Marked Jeremy and Ryan as endorsers (assuming they don't object to 
> the above changes).
>
> Gerv
>
> *Ballot 187 - Make CAA Checking Mandatory*
>
> The following motion has been proposed by Gervase Markham of Mozilla 
> and endorsed by Jeremy Rowley of DigiCert and Ryan Sleevi of Google:
>
> *Statement of Intent*
>
> Certificate Authority Authorization (CAA) is a DNS Resource Record 
> defined in RFC 6844 - https://datatracker.ietf.org/doc/rfc6844/ , 
> published in January 2013. It allows a DNS domain name holder to 
> specify one or more Certification Authorities (CAs) authorized to 
> issue certificates for that domain and, by implication, that no other 
> CAs are authorized.
>
> The intent of this motion is to make it mandatory for CAs to check CAA 
> records at issuance time for all certificates issued (except in a few 
> special cases), and to prevent issuance if a CAA record is found which 
> does not permit issuance by that CA. This therefore allows domain 
> owners to set an issuance policy which will be respected by all 
> publicly-trusted CAs, and allows them to mitigate the problem that the 
> public CA trust system is only as strong as its weakest CA.
>
> Note that CAA is already a defined term in the BRs and so does not 
> need definitional text to be provided by this motion.
>
> *-- MOTION BEGINS --*
>
> Add the following text as a new section 3.2.2.8 (titled "CAA Records") 
> of the Baseline Requirements:
>
> This section is effective as of 8 September 2017.
>
> As part of the issuance process, the CA must check for a CAA record 
> for each dNSName in the subjectAltName extension of the certificate to 
> be issued, according to the procedure in RFC 6844, following the 
> processing instructions set down in RFC 6844 for any records found. If 
> the CA issues, they must do so within the TTL of the CAA record, or 8 
> hours, whichever is greater.
>
> This stipulation does not prevent the CA from checking CAA records at 
> any other time.
>
> When processing CAA records, CAs MUST process the issue, issuewild, 
> and iodef property tags as specified in RFC 6844. Additional property 
> tags MAY be supported, but MUST NOT conflict with or supersede the 
> mandatory property tags set out in this document. CAs MUST respect the 
> critical flag and reject any unrecognized properties with this flag set.
>
>
> RFC 6844 requires that CAs "MUST NOT issue a certificate unless either 
> (1) the certificate request is consistent with the applicable CAA 
> Resource Record set or (2) an exception specified in the relevant 
> Certificate Policy or Certification Practices Statement applies." For 
> issuances conforming to these Baseline Requirements, CAs MUST NOT rely 
> on any exceptions specified in their CP or CPS unless they are one of 
> the following:
>
>   * CAA checking is optional for certificates for which a Certificate
>     Transparency pre-certificate was created and logged in at least
>     two public logs, and for which CAA was checked.
>   * CAA checking is optional for certificates issued by an Technically
>     Constrained Subordinate CA Certificate as set out in Baseline
>     Requirements section 7.1.5, where the lack of CAA checking is an
>     explicit contractual provision in the contract with the Applicant.
>   * CAA checking is optional if the domain's DNS is operated by the CA
>     or an Affiliate of the CA.
>
> CAs are permitted to treat a record lookup failure as permission to 
> issue if:
>
>   * the failure is outside the CA's infrastructure;
>   * the lookup has been retried at least once; and
>   * the domain's zone does not have a DNSSEC validation chain to the
>     ICANN root.
>
> CAs MUST document potential issuances that were prevented by a CAA 
> record in sufficient detail to provide feedback to the CAB Forum on 
> the circumstances, and SHOULD dispatch reports of such issuance 
> requests to the contact(s) stipulated in the CAA iodef record(s), if 
> present. CAs are not expected to support URL schemes in the iodef 
> record other than mailto: or https:.
>
> Update section 2.2 ("Publication of Information") of the Baseline 
> Requirements, to remove the following text:
>
>      Effective as of 15 April 2015, section 4.2 of a CA's Certificate Policy and/or Certification
>      Practice Statement (section 4.1 for CAs still conforming to RFC 2527) SHALL state whether
>      the CA reviews CAA Records, and if so, the CA’s policy or practice on processing CAA Records
>      for Fully Qualified Domain Names. The CA SHALL log all actions taken, if any, consistent with
>      its processing practice.
>
> and replace it with:
>
>      Effective as of 8 September 2017, section 4.2 of a CA's Certificate Policy and/or Certification
>      Practice Statement (section 4.1 for CAs still conforming to RFC 2527) SHALL state the CA’s policy or
>      practice on processing CAA Records for Fully Qualified Domain Names; that policy shall be consistent
>      with these Requirements. It shall clearly specify the set of Issuer Domain Names that the CA
>      recognises in CAA "issue" or "issuewild" records as permitting it to issue. The CA SHALL log all actions
>      taken, if any, consistent with its processing practice.
> Add the following text to the appropriate place in section 1.6.3 ("References"):
>
>     RFC6844, Request for Comments: 6844, DNS Certification Authority
>     Authorization (CAA) Resource Record, Hallam-Baker, Stradling,
>     January 2013.
>
> *-- MOTION ENDS --
>
> *
>
> The procedure for approval of this Final Maintenance Guideline ballot 
> is as follows:
>
> BALLOT 187
>
> Status: Maintenance Guideline
>
> 	
>
> Start time (22:00 UTC)
>
> 	
>
> End time (22:00 UTC)
>
> Discussion (7 to 14 calendar days)
>
> 	
>
> 2017-02-22
>
> 	
>
> 2017-03-01
>
> Vote for approval (7 calendar days)
>
> 	
>
> 2017-03-01
>
> 	
>
> 2017-03-08
>
> If vote approves ballot: Review Period (Chair to send Review Notice) 
> (30 calendar days).
>
> If Exclusion Notice(s) filed, ballot approval is rescinded and PAG to 
> be created.
>
> If no Exclusion Notices filed, ballot becomes effective at end of 
> Review Period.
>
> 	
>
> Upon filing of Review Notice by Chair
>
> 	
>
> 30 days after filing of Review Notice by Chair
>
> From Section 2.3 of the Bylaws: If the Draft Guideline Ballot is 
> proposing a Final Maintenance Guideline, such ballot will include a 
> redline or comparison showing the set of changes from the Final 
> Guideline section(s) intended to become a Final Maintenance Guideline, 
> and need not include a copy of the full set of guidelines. Such 
> redline or comparison shall be made against the Final Guideline 
> section(s) as they exist at the time a ballot is proposed, and need 
> not take into consideration other ballots that may be proposed 
> subsequently, except as provided in Section 2.3(j) of the Bylaws.
>
> Votes must be cast by posting an on-list reply to this thread on the 
> Public Mail List.  A vote in favor of the motion must indicate a clear 
> “yes” in the response. A vote against must indicate a clear “no” in 
> the response. A vote to abstain must indicate a clear “abstain” in the 
> response. Unclear responses will not be counted. The latest vote 
> received from any representative of a voting member before the close 
> of the voting period will be counted. Voting members are listed here: 
> https://cabforum.org/members/
>
> In order for the motion to be adopted, two thirds (2/3) or more of the 
> votes cast by members in the CA category and greater than 50% of the 
> votes cast by members in the browser category must vote “yes”. Quorum 
> is shown on CA/Browser Forum wiki.  Under Section 2.2(g) of the 
> Bylaws, at least the required quorum number of voting members must 
> participate in the ballot for the ballot to be valid, either by voting 
> in favor, voting against, or abstaining.
>
>
>
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20170308/f250dd06/attachment-0002.html>


More information about the Public mailing list