<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><div class="gmail_default">I concur with a few quibbles.</div><div class="gmail_default"><br class=""></div><div class="gmail_default">Given the use of DNS for domain validation, an attacker who can successfully spoof DNS can apply for a cert from the authorized CA. The ability to get a bogus cert from the CA of their choice does increase the attack surface but not by a huge amount.</div><div class="gmail_default"><br class=""></div><div class="gmail_default">DNSSEC may improve things or it may not. If DNSSEC is in place then it can be used to lock down DV as well as CAA. But that doth not necessarily make the system secure. The security of DNSSEC depends on the security of DNS registrars and it is not clear that these people understand the issues. </div><div class="gmail_default"><br class=""></div><div class="gmail_default">[Right now, my private Web sites are all off line because the hosting provider has made an unauthorized change to the config and done so incompetently.]</div><div class="gmail_default"><br class=""></div><div class="gmail_default"><br class=""></div><div class="gmail_default">I have maintained from the start that CAs can choose to implement strict CAA checking now or wait until it becomes a requirement. Unless of course you happen to be the CA that is the cause of CAA becoming a mandatory requirement in which case you might not have any need to implement anything ever at all.</div><div class="gmail_default" style="font-size: small;"><br class=""></div><div class="gmail_default" style="font-size: small;"><br class=""></div><div><blockquote type="cite" class=""><div class="">On Sep 9, 2016, at 3:41 PM, Gervase Markham <<a href="mailto:gerv@mozilla.org" class="">gerv@mozilla.org</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><div class="">Everything Ryan says seems to make sense to me, except I have a further<br class="">comment here:<br class=""><br class="">On 08/09/16 23:34, Ryan Sleevi wrote:<br class=""><blockquote type="cite" class="">#3 is clearly a sticking point. I think we're all pretty aware of CAs'<br class="">objections to this, but I do feel strongly that, without this, CAA is<br class="">not an effective security mitigation. As you know, Google holds a<br class="">variety of domains, and we routinely receive requests from other CAs<br class="">attempting to confirm that an applicant was duly authorized to make a<br class="">request, and we routinely have to contact CAs and request revocation for<br class="">certificates that were not authorized according to our company policy.<br class="">Allowing escape clauses, even at the EVGL level, significantly weaken<br class="">our ability to proactively prevent this, which we believe would reduce<br class="">both ours and CAs' administrative burdens.<br class=""></blockquote><br class="">This seems to be sort of a question of whether CAA is actually like HPKP<br class="">("deny access, come what may, if things get configured wrong") or more<br class="">like an expired cert is currently treated in browsers ("allow an<br class="">override with a warning/extra care").<br class=""><br class="">As I see it, we have three options:<br class=""><br class="">1) Strict is the only way to go - Ryan's preference.<br class="">2) Loose(r) is the only way to go - let's pick one of Rick's 4 options.<br class="">3) Allow domain owner to decide, with loose(r) as default.<br class=""><br class="">There may be better extension mechanisms than this in CAA, but 3) could<br class="">be achieved by adding a CAB Forum-defined domain ("<a href="http://strict.cabforum.org" class="">strict.cabforum.org</a>")<br class="">to the CAA record. If a CA sees this, they may not under any<br class="">circumstances issue the certificate until they see the CAA record<br class="">change, and to do so is a misissuance. If they don't see it, we use the<br class="">High Risk process, or some EV process, or whichever of Rick's options we<br class="">decide. I don't think this is much extra complexity - if we are going to<br class="">require CAA checking, we can require CAA checking and<br class=""><a href="http://strict.cabforum.org" class="">strict.cabforum.org</a> recognition too.<br class=""><br class="">I suggest this because I think it might be a good way to meet Google's<br class="">needs for absolute bans, without making CAA, like HPKP, a technology<br class="">that only large sites will deploy because of the near-"bricking" potential.<br class=""><br class="">I agree with Ryan that, even if the process is loose, we need proper<br class="">audit trails to make sure the CA does the checks and follows the<br class="">exception process properly.<br class=""><br class="">Gerv<br class="">_______________________________________________<br class="">Public mailing list<br class=""><a href="mailto:Public@cabforum.org" class="">Public@cabforum.org</a><br class="">https://cabforum.org/mailman/listinfo/public<br class=""></div></div></blockquote></div><br class=""></body></html>