[cabfpub] CAA working group description
Phillip
philliph at comodo.com
Sat Oct 7 05:04:49 UTC 2017
I am thinking the decision process needs to be three valued.
* Success
* Unknown
* DNSSEC Fail
Without DNSSEC, it is not going to be possible to distinguish ordinary network failures from attacks.
I don’t see a problem with an incentive to deploy DNSSEC so long as it is not mandatory.
From: Jacob Hoffman-Andrews [mailto:jsha at letsencrypt.org]
Sent: Friday, October 6, 2017 6:06 PM
To: Doug Beattie <doug.beattie at globalsign.com>
Cc: Phillip <philliph at comodo.com>; CA/Browser Forum Public Discussion List <public at cabforum.org>; Ryan Sleevi <sleevi at google.com>
Subject: Re: [cabfpub] CAA working group description
On Thu, Oct 5, 2017 at 12:40 PM, Doug Beattie <doug.beattie at globalsign.com <mailto:doug.beattie at globalsign.com> > wrote:
Yes, I agree that it seems IETF has left portions of the spec under defined, for example how to look up and validate CAA records given all of the types of errors that could be encountered. Do we expect the IETF WG to focus more heavily on those, or should this be done in CABForum?
I think error handling would be a great topic to bring up at the IETF LAMPS WG. In particular the question of how to distinguish DNSSEC-based SERVFAIL vs other types of SERVFAIL is a very tricky technical one, and would benefit from the expertise present at IETF.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20171007/a6c64c96/attachment-0003.html>
More information about the Public
mailing list