<div dir="ltr"><div dir="ltr">Hi Pedro,<br><br>Thanks for taking the time to review the proposal - and for your question. Also, sorry for the delayed response - I’ve been out of the office for a few days. <div><br>The researchers at Princeton initially advised us to evaluate both domain validation challenges and CAA records to add resilience to the issuance process. Specifically, the goal was to make it more difficult for an adversary to launch what they described as a “downgrade attack.”<br><br>For example, let’s consider a domain owner who used CAA to restrict issuance to a set of CAs that do not support email-based domain control validation because they do not want to allow validation of their domain to occur via email. Also, suppose we aren’t checking CAA from multiple Network Perspectives. In this case, it’d be easier for an adversary to downgrade the issuance process because they would only need to launch one successful attack (the perspective used by the CA to establish the primary determination) to subvert CAA and allow a CA not included in the set of CAs permitted to issue a certificate to the domain to do so. In contrast, if CAA was checked across multiple Network Perspectives, the adversary would need to launch a global BGP attack to obtain a certificate for the target domain (harder to accomplish and not always viable by the adversary, for example, they might only have the means to accomplish a local or regional attack).<br><br>We also see layers of security built on top of CAA, for example, Account Binding and Validation Method Binding as specified by RFC 8657. These extensions allow organizations to restrict issuance to specific 1) account IDs or 2) ACME domain validation methods. Not checking CAA records from multiple perspectives allows an adversary to more easily downgrade these additional security measures (based on the same approach described above) and then target the added attack surface these records were intended to eliminate.<br><br>The “no-issue” CAA record (i.e., CAA 0 issue “;”) is another example where the CAA record has a significant impact on issuance behavior. If CAA is not being checked from multiple perspectives, this is another security control that can be more easily downgraded than if CAA is being checked from multiple perspectives. <br><br>As always, other considerations and perspectives are welcome! <br><br>Thanks,<br>Ryan<br></div></div><div><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Jun 16, 2023 at 6:43 AM Pedro FUENTES via Validation <<a href="mailto:validation@cabforum.org" target="_blank">validation@cabforum.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div>Hello,<div>Sorry as most likely this has been already discussed, but as I came “late to the party”, there are things that I surely missed.</div><div><br></div><div>About the need to consider CAA also in the MPDV… I’m thinking about this and I fail to see the risk we’re managing by doing it. My rational is that MPDV, once verifies the domain ownership/control, would also imply that records in the DNS (i.e. CAA) are legit.</div><div><br></div><div>The only situation I see where this could apply, is when someone could trick a CAA record during the reuse period of a previously validated domain, so MPDV could verify proper domain control, but the CAA check that must be done for each issuance is faked, but I’d say that faking the CAA could have as only logic purpose to enable another CA to issue the certificate, and that CA would also need to check the domain control using MPDV.</div><div><br></div><div>When you decided to include CAA in the game… what was the logic behind?</div><div><br></div><div>Most likely there’s a good reason that clever people has discussed already, so I’d appreciate if you can help me understand better.</div><div><br></div><div>Thanks!</div><div>Pedro</div><div><div>
<div dir="auto" style="text-align:start;text-indent:0px"><div dir="auto" style="text-align:start;text-indent:0px"><div dir="auto" style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><font style="color:rgb(0,0,0);letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none;font-size:12px;font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;text-align:start;text-indent:0px"><b><font color="#f62400" style="font-size:11px"><br>WISeKey SA<br></font></b></font><div style="color:rgb(0,0,0);letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none;font-variant:normal;line-height:normal;text-align:start;text-indent:0px"><font style="color:rgb(0,0,0);font-size:12px;font-weight:normal;font-style:normal"><span style="font-size:11px"><b>Pedro Fuentes<br></b>CSO - Trust Services Manager</span><br><font size="1">Office: <a href="tel:+41%2022%20594%2030%2000" value="+41225943000" target="_blank">+ 41 (0) 22 594 30 00</a><br>Mobile: + 41 (0) </font></font><span style="color:rgb(0,0,0);font-size:x-small;font-weight:normal;font-style:normal">791 274 790</span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal;text-align:start;text-indent:0px"><font style="color:rgb(0,0,0);font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none"><font size="1">Address: </font></font><font size="1">Avenue Louis-Casaï 58 | </font><span style="font-size:x-small">1216 Cointrin | Switzerland</span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal;text-align:start;text-indent:0px"><font><font size="1" style="color:rgb(0,0,0);font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none"><b>Stay connected with <a href="http://www.wisekey.com" target="_blank"><font color="#f62400">WISeKey</font></a><br></b></font></font><span style="color:rgb(169,169,169);font-size:10px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none"><br></span></div><div style="color:rgb(0,0,0);letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none;font-size:12px;font-style:normal;font-variant:normal;font-weight:normal;line-height:normal;text-align:start;text-indent:0px"><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal"><span><font size="1" color="#78a600"><b>THIS IS A TRUSTED MAIL</b>: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks</font></span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal"><span style="font-size:9px"><font color="#a9a9a9"><br></font></span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal"><div><font color="#a9a9a9" style="font-size:9px"><b>CONFIDENTIALITY: </b>This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender</font></div><div><font color="#a9a9a9" style="font-size:9px"><br></font></div><div><font color="#a9a9a9" style="font-size:9px"><b>DISCLAIMER: </b>WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.</font></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div>
<br></div></div>_______________________________________________<br>
Validation mailing list<br>
<a href="mailto:Validation@cabforum.org" target="_blank">Validation@cabforum.org</a><br>
<a href="https://lists.cabforum.org/mailman/listinfo/validation" rel="noreferrer" target="_blank">https://lists.cabforum.org/mailman/listinfo/validation</a><br>
</blockquote></div></div>