[cabfpub] Draft CAA motion
pzb at amzn.com
Wed Nov 9 18:13:06 UTC 2016
> On Nov 9, 2016, at 9:46 AM, Ryan Sleevi <sleevi at google.com> wrote:
> On Wed, Nov 9, 2016 at 9:34 AM, Peter Bowen <pzb at amzn.com <mailto:pzb at amzn.com>> wrote:
> I presume Google has internal controls in place that cover who can sign contracts and under what circumstances. I am inclined to side with Bruce on this one — a signed contract should be prima facie evidence of authorized issuance when the domain registrant is the signer.
> What steps, if any, should we expect you or Bruce to evaluate the validity of that signed contract? That is, what prevents anyone with an @google.com <http://google.com/> e-mail address from signing that contract? I suspect the answer is "Well, that'd be a fireable offense" is the answer, but surely, you would likely consider that unsatisfying.
I honestly don’t find that answer unsatisfying. This is a legal question, not a technical one. Why is contract validity for certificate issuance any different from contracts for anything else?
> For example, what controls in the BRs/EVGs exist to allow Google to notify Entrust of who is authorized to sign contracts? As currently worded, we can only provide that information if we first sign a contract with Entrust - which seems sort of circular, don't you suppose?
> I think we should add clear notification requirements and domain registrant rights to the BRs, but I think allowing contract signature is a reasonable mitigation. Maybe we tie validation in this case to the EV guidelines — that is the CA must follow the EV guidelines to confirm the contract? Maybe also require CT logging of the CA certificate prior to issuing end-entity certificates and possibly require a waiting period before issuing EE certs?
> What "CA certificate" are you talking about here? Are you imagining technically constrained as an additional clause? Otherwise, we're simply talking about "Enterprise RA" scenarios, right?
I got the threads crossed. I thought this was about Tech Constrained SubCAs.
As I previously suggested, we would also support the Enterprise RA scenario when there is requirement to “call your shot” for which domains are authorized by publicly logging a declaration of delegation to the Enterprise RA.
> The objective we all have here is to do the right thing for customers. Browsers (including Chrome) roll things out gradually and have rollback options. Can we have that here, have a way to require CAA checking but have a “rollback” option in the form of contracts with public notification when such rollback action is being taken?
> While I appreciate the comparison, I do think it's unfair to suggest this is done for everything. Why isn't a secondary ballot a suitable rollback? If we extend your metaphor, browsers don't hide every behaviour change behind a feature flag - they release it, and if it breaks something beyond what was accepted/tolerble, they ship a new release restoring the behaviour, and then evaluate how they can learn from it. This moves us into actual action territory, rather than being mired in FUD and trying to avoid learning about real issues versus imaginary ones.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Public