[cabfpub] Pre-Ballot 125 - CAA Records
Ryan Sleevi
sleevi at google.com
Sat Sep 6 05:18:53 UTC 2014
On Sep 5, 2014 10:07 PM, "kirk_hall at trendmicro.com" <
kirk_hall at trendmicro.com> wrote:
>
> Ryan, you haven’t explained to your objection to my suggested edits.
>
>
>
> With my edits, we may find substantial support for CAA among most CAs.
Right now, the support is concentrated mainly with the larger CAs who have
established customer bases that CAA would protect. With my proposed
amendments, not only larger, established CAs, but also smaller and newer
CAs may support CAA and this ballot. That would be a good thing, right?
>
>
>
> No CA has said it will only support the CAA ballot if CAs retain the
right to push customers to create a CAA record in their behalf, or the
right to create a CAA record for their customer – right? So most CAs may
support my proposed amendment and pass the CAA ballot with that language
included.
>
>
>
> So my question to you is – do you yourself oppose the proposed
amendment? If so, why?
>
>
>
> If you don’t oppose the amendment, then there’s really not a problem and
the ballot may pass with the added language.
>
>
Kirk,
I think my objections are pretty clear in my response. Your attempt to
further engage in this highlights precisely why such last minute proposals,
which are very clearly unnecessary and unrelated to the proposal, may be
seen as stalling tactics designed to undermine an otherwise simple proposal.
Let's try to make some productive progress in the Forum, and focus on the
small, sustainable gains we can make by not introducing unnecessary
complexity or contentious requirements, which an attempt to regulate what a
CA can say communicate to their customers (the first of its kind in the
Forum) inherently is.
I value your contribution, and would be happy to discuss further as a
separate ballot, but absolutely cannot support its addition to a simple
documentary ballot.
>
> From: Ryan Sleevi [mailto:sleevi at google.com]
> Sent: Friday, September 05, 2014 5:31 PM
>
> To: Kirk Hall (RD-US)
> Cc: CABFPub
> Subject: RE: [cabfpub] Pre-Ballot 125 - CAA Records
>
>
>
>
> On Sep 5, 2014 5:20 PM, "kirk_hall at trendmicro.com" <
kirk_hall at trendmicro.com> wrote:
> >
> > Ryan, I just noticed your statement at the bottom of my proposal about
a separate ballot for the amendment I proposed.
> >
> >
> >
> > When the Forum has discussed CAA in the past, it was noted that in many
large enterprises (the most likely candidates for CAA), the people who buy
certificates are not the same people who manage the company’s DNS – and in
fact, they may not work on the same continent or know each other. So it
may be very difficult for CAA records to be updated – a potential
competitive handicap for new CAs, or CAs trying to sell to an organization
that buys its certs from others.
> >
> >
> >
> > Several of us tried experiments within our organizations, and found
this was so (no communication between the two groups). It was also noted
that many enterprises buy certs from multiple CAs, sometimes a development
team needs a cert on very short notice, etc. – CAA could greatly complicate
this with no real benefit if any CA tries to get an exclusive CAA record
for itself and use it as a competitive blocking tool.
> >
>
> This proposal does not concern itself with that. It is merely a
requirement to document policies.
>
> Your concerns - and certainly, they have been raised by other CAs - about
the possibility of a CA to abuse its position in a market are only
applicable when CAs are actually required to check CAA, which the Forum has
shown there is significant opposition by CAs to do.
>
> >
> >
> > I’ll tell you want I’ll do at my next CA, Voracious CA – Section
18(d)(ii) of my Subscriber Agreement will say “You hereby authorize us to
contact your DNS operator and create a CAA record with our name in it.”
Hah! I’ve just created a potential competitive block for all my
competitors, and the customer never knew. And I’ll have my sales team
always say “Hey, you know how you can REALLY increase your security?
Create a CAA record and put our name in it. That prevents rogue hackers
from getting certs in your valuable domain <a totally non-target domain for
hackers>. I’ll email you instructions containing the name and phone
number of your DNS operator – you’ll get a discount on your next cert if
you do!” Hah – I just fooled the customer into creating a CAA record that
only contains my name.
> >
> > Or if I also offer hosting services, I’ll bundle it all, with an
automatic CAA record thrown in.
> >
> >
>
> And there are plenty of other ways to game the system that the BRs don't
deal with.
>
> Respectfully, Kirk, I would simply ask whether or not you will support a
simple ballot, without your modifications, that simply requires CAs to
document their policies.
>
> CAs that are concerned of such abusive (and, dare I say, unrealistic)
behavior have full liberty to take whatever measures you find suitable in
your CPS. This simply gets your position on record.
>
> I see no reason to stall this ballot, which would inevitably be another 6
months of delay (we have been talking about this since the Mozilla F2F
nearly a year ago), when it makes no such requirements on any CA.
>
> >
> > For CAs to impose CAA on other CAs without protective language like
what I propose presents serious competition law issues. No one yet has
said “it’s a good idea for CAs to tell their customers to create CAA
records, or to do it for them,” so the proposed language is a way to make
the CAA ballot palatable to many CAs (especially smaller or newer CAs).
> >
>
> Please reread the ballot. You, and the other CAs who have repeatedly
raised this concern as a way to dismiss CAA, have been listened to, which
is why the ballot is so narrow and focused as it is.
>
> Any CA that shares your view of the unlikely situation occurring can deal
with it in their CPS. If you feel it actually is a problem, or it would
prohibit a ballot that required CAA enforcement (which, again, this does
not), then we can spend another 6 months working on this language and
hearing the same arguments we have heard for the past year+.
>
> To be clear, I'm fully sympathetic to your fear, even though I find it
extremely unlikely, but I think its entirely disconnected and orthogonal to
a simple ballot as this, which simply requires documentation of practices.
>
> Surely you can recognize the value in both such documentation and in the
Forum occasionally reaching consensus and forward progress in real and
pressing issues, rather than be stalled by years of debate and uncertainty
while trying to boil the ocean of CA practices.
>
> I think we have two endorsers at this point, so I would be thrilled to
see this taken to a vote. If your fears prevent you from voting on such a
simple change, then we can certainly revisit this and discuss how to
assuage them, but I think if you and others who may feel the same read the
proposal, you will realize nothing unreasonable is being requested of you.
>
> >
> >
> > From: Ryan Sleevi [mailto:sleevi at google.com]
> > Sent: Friday, September 05, 2014 4:43 PM
> > To: Kirk Hall (RD-US)
> > Cc: CABFPub
> > Subject: Re: [cabfpub] Pre-Ballot 125 - CAA Records
> >
> >
> >
> >
> > On Sep 5, 2014 4:35 PM, "kirk_hall at trendmicro.com" <
kirk_hall at trendmicro.com> wrote:
> > >
> > > Ben, I have an amendment to propose, in the form of the language
below (to be added at the end of your language in Sec. 8.2.2. A word of
explanation: every time CAA has come up as a topic of discussion at a CAB
Forum meeting or on a call, one or more CAs and browsers
> >
> > I have yet to hear a browser express this concern.
> >
> > > have expressed concern that CAA could be used as a "blocking"
strategy by CAs in order to add hurdles for another CA to sell certificates
to the same customer. The main way this could happen is if a CA induces a
customer to insert its name to a CAA record when there is no CAA record at
the time for the customer (or even worse, adds its name to a blank CAA
record in the customer's name -- this could happen if the fine print of the
Subscriber Agreement authorizes the CA to insert its name in a CAA record
for the customer and the customer has no idea this is happening). Another
potential abuse would be if a CA got its name put in blank CAA records for
other domains registered to the customer that are not even part of the
pending certificate order so that other CAs would find it more difficult to
sell certificates for those domains.
> > >
> > >
> > >
> > > There seems to be strong sentiment among CAs and browsers for some
language prohibiting this potential practice as anticompetitive.
> >
> > I have yet to hear a browser express this concern.
> >
> > > The decision of whether or not to even have a CAA record should be
solely up to the customer, not the CA.
> > >
> > >
> > >
> > > With this explanation, here is my suggestion for additional language
for this pre-ballot:
> > >
> > >
> > >
> > > In order to make certain that CAA is not used by CAs in an
anticompetitive manner, no CA shall (1) request or suggest that a customer
include the CA’s name in a CAA record for the domain in question if the
customer does not already have a CAA record that includes the name of one
or more other CAs but omits the CA’s name, (2) obtain authorization from
the customer to act on the customer’s behalf (directly or by request to the
customer’s DNS operator) to create a CAA record for the customer that
includes the CA’s name for the domain in question if the customer does not
already have a CAA record that includes the name of one or more other CAs
but omits the CA’s name, or (3) request or suggest that a customer include
the CA’s name in a CAA record for other domains not the subject of the
customer’s certificate order or obtain authorization from the customer to
act on the customer’s behalf (directly or by request to the customer’s DNS
operator) to create a CAA record for the customer for other domains not the
subject of the customer’s certificate order.
> > >
> > >
> > >
> > > What do you think? Does this meet everyone’s stated concerns?
> >
> > If you feel strongly about this, I feel it is worth a separate ballot.
I do not support burdening this ballot with that language.
> > >
> > >
> > >
> > > [Also – typo below – “(section 4.1 for CA’s still conforming to RFC
2527)” should be “(section 4.1 for CAs still conforming to RFC 2527)”]
> > >
> > >
> > >
> > > -----Original Message-----
> > > From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org]
On Behalf Of Ben Wilson
> > > Sent: Friday, August 29, 2014 2:02 PM
> > > To: Sigbjørn Vik; Rick Andrews; Geoff Keating; Stephen Davidson; Ryan
Sleevi (sleevi at google.com)
> > > Cc: cabfpub
> > > Subject: Re: [cabfpub] Pre-Ballot 125 - CAA Records
> > >
> > >
> > >
> > > Picking up where we left off .. attached is the redlined version that
I think is closest to where we were on this issue:
> > >
> > >
> > >
> > > 1. In Section 4 of the Baseline Requirements, add a definition for
CAA Record as follows:
> > >
> > >
> > >
> > > CAA Record: The Certification Authority Authorization (CAA) DNS
Resource Record of RFC 6844
> > >
> > > (http:tools.ietf.org/html/rfc6844) that allows a DNS domain name
holder to specify the Certification Authorities
> > >
> > > (CAs) authorized to issue certificates for that domain. Publication
of a CAA Resource Record allows public Certification Authorities to
implement additional controls to reduce the risk of unintended certificate
mis-issue.
> > >
> > >
> > >
> > > We might want to abbreviate this definition a bit.
> > >
> > >
> > >
> > > 2. In Section 8.2.2 (instead of editing warranties in section 7.1.2
or verification practices in section 11, as some have suggested) add the
following to the end of the paragraph on Disclosure:
> > >
> > >
> > >
> > > Effective as of [insert date that is six months from Ballot 125
adoption], section 4.2 of a CA's Certificate Policy and/or Certification
Practice Statement (section 4.1 for CA’s still conforming to RFC 2527) shall
> > >
> > > disclose: (1) whether the CA reviews CAA Records, and if so, (2) the
CA’s policy or practice on processing CAA Records and comparing them with
proposed Domain Names for the Common Name field or Subject Alternative Name
fields of certificates applications, and (3) any actions taken as result of
such comparison.
> > >
> > >
> > >
> > > Any comments or suggestions are welcome.
> > >
> > >
> > >
> > > -----Original Message-----
> > >
> > > From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org]
On Behalf Of Sigbjørn Vik
> > >
> > > Sent: Tuesday, July 22, 2014 12:47 AM
> > >
> > > To: Rick Andrews; Geoff Keating; Stephen Davidson
> > >
> > > Cc: cabfpub
> > >
> > > Subject: Re: [cabfpub] Pre-Ballot 125 - CAA Records
> > >
> > >
> > >
> > > On 21-Jul-14 20:11, Rick Andrews wrote:
> > >
> > > > Siggy, how does the addition of a CAA record make DoS or DNS
> > >
> > > > amplification
> > >
> > > attacks more problematic?
> > >
> > >
> > >
> > > I am no DNS expert, merely relaying comments from our sysadmin. If
people with more knowledge in the field conclude that this is not an issue,
that is fine with me, but it should be considered.
> > >
> > >
> > >
> > > > -----Original Message-----
> > >
> > > > From: Sigbjørn Vik [mailto:sigbjorn at opera.com]
> > >
> > > > Sent: Monday, July 21, 2014 12:21 AM
> > >
> > > > To: Rick Andrews; Geoff Keating; Stephen Davidson
> > >
> > > > Cc: cabfpub
> > >
> > > > Subject: Re: [cabfpub] Pre-Ballot 125 - CAA Records
> > >
> > > >
> > >
> > > > On 17-Jul-14 23:51, Rick Andrews wrote:> Siggy,
> > >
> > > >>
> > >
> > > >> There are a number of Security Considerations in Section 6 of the
CAA
> > >
> > > >> RFC (_http://tools.ietf.org/html/rfc6844#page-13_) which detail
> > >
> > > >> possible abuse.
> > >
> > > >
> > >
> > > > I don't see DoS or DNS amplification listed there.
> > >
> > > >
> > >
> > > > --
> > >
> > > > Sigbjørn Vik
> > >
> > > > Opera Software
> > >
> > > >
> > >
> > >
> > >
> > >
> > >
> > > --
> > >
> > > Sigbjørn Vik
> > >
> > > Opera Software
> > >
> > > _______________________________________________
> > >
> > > Public mailing list
> > >
> > > Public at cabforum.org
> > >
> > > https://cabforum.org/mailman/listinfo/public
> > >
> > > TREND MICRO EMAIL NOTICE
> > > The information contained in this email and any attachments is
confidential
> > > and may be subject to copyright or other intellectual property
protection.
> > > If you are not the intended recipient, you are not authorized to use
or
> > > disclose this information, and we request that you notify us by reply
mail or
> > > telephone and delete the original message from your mail system.
> > >
> > >
> > > _______________________________________________
> > > Public mailing list
> > > Public at cabforum.org
> > > https://cabforum.org/mailman/listinfo/public
> > >
> >
> > TREND MICRO EMAIL NOTICE
> > The information contained in this email and any attachments is
confidential
> > and may be subject to copyright or other intellectual property
protection.
> > If you are not the intended recipient, you are not authorized to use or
> > disclose this information, and we request that you notify us by reply
mail or
> > telephone and delete the original message from your mail system.
>
> TREND MICRO EMAIL NOTICE
> The information contained in this email and any attachments is
confidential
> and may be subject to copyright or other intellectual property
protection.
> If you are not the intended recipient, you are not authorized to use or
> disclose this information, and we request that you notify us by reply
mail or
> telephone and delete the original message from your mail system.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20140905/b0fcd100/attachment-0003.html>
More information about the Public
mailing list