[Servercert-wg] Ballot SC 13 version 3

Tim Hollebeek tim.hollebeek at digicert.com
Wed Nov 21 11:50:43 MST 2018


 

As before, there is both a full redline, and a diff since the last version.

 

Ballot SC13: CAA Contact Property and Associated E-mail Validation Methods

Purpose of Ballot: Increasingly, contact information is not available in
WHOIS due to concerns about potential GDPR violations.  This ballot
specifies a method by which domain holders can publish their contact
information via DNS, and how CAs can use that information for validating
domain control.

The following motion has been proposed by Tim Hollebeek of DigiCert and
endorsed by Bruce Morton of Entrust and Doug Beattie of GlobalSign.

--- MOTION BEGINS ---

This ballot modifies the "Baseline Requirements for the Issuance and
Management of Publicly-Trusted Certificates" as follows, based on Version
1.6.0:

Add Section 3.2.2.4.13: Email to DNS CAA Contact

Confirming the Applicant's control over the FQDN by sending a Random Value
via email and then receiving a confirming response utilizing the Random
Value. The Random Value MUST be sent to an email address identified as a CAA
contactemail property record as defined in Appendix B.  The relevant CAA
Resource Record Set MUST be found using the search algorithm defined in RFC
6844 Section 4, as amended by Errata 5065 (Appendix A).

 

Each email MAY confirm control of multiple FQDNs, provided that the DNS
contactemail email address is the same for each Authorized Domain Name being
validated.

 

The Random Value SHALL be unique in each email. The email MAY be re-sent in
its entirety, including the re-use of the Random Value, provided that its
entire contents and recipient SHALL remain unchanged. The Random Value SHALL
remain valid for use in a confirming response for no more than 30 days from
its creation. The CPS MAY specify a shorter validity period for Random
Values.

 

Note: Once the FQDN has been validated using this method, the CA MAY also
issue Certificates for other FQDNs that end with all the labels of the
validated FQDN. This method is suitable for validating Wildcard Domain
Names.

Add Section 3.2.2.4.14: Email to DNS TXT Contact

 

Confirming the Applicant's control over the FQDN by sending a Random Value
via email and then receiving a confirming response utilizing the Random
Value. The Random Value MUST be sent to an email address identified as a DNS
TXT record email contact for

an Authorization Domain Name.  See Appendix B for the format of

the DNS TXT record email contact.

 

Each email MAY confirm control of multiple FQDNs, provided that the DNS
contactemail email address is the same for each Authorized Domain Name being
validated.

The Random Value SHALL be unique in each email. The email MAY be re-sent in
its entirety, including the re-use of the Random Value, provided that its
entire contents and recipient SHALL remain unchanged. The Random Value SHALL
remain valid for use in a confirming response for no more than 30 days from
its creation. The CPS MAY specify a shorter validity period for Random
Values.

 

Note: Once the FQDN has been validated using this method, the CA MAY also
issue Certificates for other FQDNs that end with all the labels of the
validated FQDN. This method is suitable for validating Wildcard Domain
Names.

 

Add Appendix B: DNS Contact Properties

These methods allow domain owners to publish contact information in DNS for
the purpose of validating domain control.

B.1. CAA Methods

 

B.1.1. CAA contactemail Property

 

SYNTAX: contactemail <rfc6532emailaddress> 

 

The CAA contactemail property takes an email address as its parameter.  The
entire parameter value MUST be a valid email address as defined in RFC 6532
section 3.2, with no additional padding or structure, or it cannot be used.

 

The following is an example where the holder of the domain specified the
contact property using an email address.

 

$ORIGIN example.com

.              CAA 0 contactemail "domainowner at example.com"

 

The contactemail property MAY be critical, if the domain owner does not want
CAs who do not understand it to issue certificates for the domain.

 

B.2. DNS TXT Methods

 

B.2.1. DNS TXT Email Contact

 

The DNS TXT record MUST be placed on the "_validation-contactemail"
subdomain of the domain being validated.  The entire RDATA value of this TXT
record MUST be a valid email address as defined in RFC 6532 section 3.2,
with no additional padding or structure, or it cannot be used.

 

--- MOTION ENDS ---

*** WARNING ***: USE AT YOUR OWN RISK.  THE REDLINE BELOW IS NOT THE
OFFICIAL VERSION OF THE CHANGES (CABF Bylaws, Section 2.4(a)):

 

A comparison of the changes can be found at:
https://github.com/cabforum/documents/compare/Ballot-SC4---CAA-CONTACT-email
?diff=unified
<https://github.com/cabforum/documents/compare/Ballot-SC4---CAA-CONTACT-emai
l?diff=unified&expand=1> &expand=1

 

The changes between version 3 and version 2 are here:

https://github.com/cabforum/documents/commit/e8e24ae14bf68f22a9bb13edc720189
6fa948641?short_path=7f6d14a#diff-7f6d14a20e7f3beb696b45e1bf8196f2

The procedure for approval of this ballot is as follows:

Discussion (7+ days)

Start Time: 2018-11-21 2:00 PM Eastern

End Time: Not before 2018-11-28 2:00 PM Eastern

Vote for approval (7 days)

Start Time: TBD

End Time: TBD

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20181121/9d0aa3a0/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4940 bytes
Desc: not available
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20181121/9d0aa3a0/attachment-0001.p7s>


More information about the Servercert-wg mailing list