[Servercert-wg] [外部郵件]Re: Voting Begins for Ballot SC46: Sunset the CAA exception for DNS Operator

realsky(CHT) realsky at cht.com.tw
Wed Jun 2 13:44:18 UTC 2021


Chunghwa Telecom Votes Yes on Ballot SC 46.

           Li-Chun 


-----Original message-----
From:Josselin Allemandou via Servercert-wg<servercert-wg at cabforum.org>
To:CA/B Forum Server Certificate WG Public Discussion List<servercert-wg at cabforum.org>
Date: Wed, 02 Jun 2021 18:25:17
Subject: [外部郵件]Re: [Servercert-wg] Voting Begins for Ballot SC46: Sunset the CAA exception for DNS Operator
Certigna Votes « YES » on ballot SC46.
 
 
 
 

 
On 26/5/2021 9:30 μ.μ., Ryan Sleevi via Servercert-wg wrote:

Unfortunately, I realized belatedly that I forgot to clearly indicate the Voting End Time. 
 

As such, the previous mail did not officially start voting. Thankfully, as no votes were received, I think we can just say I didn't start it correctly?

 

Please find the corrected announcement below:

 

This email begins the voting period for Ballot SC46: Sunset the CAA exception for DNS operator

Purpose of Ballot:

This Ballot addresses security issues with Section 3.2.2.8 regarding CAA checking.

Currently, Section 3.2.2.8 permits a CA to bypass CAA checking if the CA or an Affiliate of the CA is the DNS Operator. This term is referred to through RFC 7719, and involves a precise technical definition regarding how a zone's authoritative servers are configured and expressed (e.g. NS records). While this allows a CA to skip looking up the CAA record, it does not absolve them of the need to look up these other records on every issuance.

As practiced by CAs, this has clearly caused some confusion. For example, some CAs have incorrectly implemented policies that determine they're authoritative based on self-assertion that they are authoritative, which is not consistent with the current requirements.

To avoid these issues, this sunsets the CAA exception on 2021-07-01 for the DNS Operator, simplifying the requirements and reducing ambiguities for CAs performing validation.

The following motion has been proposed by Ryan Sleevi of Google and endorsed by Ben Wilson of Mozilla and Jacob Hoffman-Andrews of ISRG/Let's Encrypt.

It can be viewed on GitHub as https://github.com/cabforum/servercert/pull/271

-- MOTION BEGINS --

This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates” (“Baseline Requirements”), based on Version 1.7.4:

MODIFY the Baseline Requirements as specified in the following Redline:

https://github.com/cabforum/servercert/compare/47248d77d371356780b08cfa971b26d88d704ca8..6d34b1d51f645912d2237d5d4b46f4a49e8352ed

-- MOTION ENDS --

This ballot proposes a Final Maintenance Guideline.

The procedure for approval of this ballot is as follows:

Discussion (7+ days)

Start Time: 2021-05-13 20:00:00 UTC
End Time: 2021-05-26 14:00:00 UTC

Vote for approval (7 days)

Start Time: 2021-05-26 18:30:00 UTC
End Time: 2021-06-02 18:30:00 UTC





_______________________________________________

Servercert-wg mailing list

Servercert-wg at cabforum.org

https://lists.cabforum.org/mailman/listinfo/servercert-wg
 

_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg

本信件可能包含中華電信股份有限公司機密資訊,非指定之收件者,請勿蒐集、處理或利用本信件內容,並請銷毀此信件. 如為指定收件者,應確實保護郵件中本公司之營業機密及個人資料,不得任意傳佈或揭露,並應自行確認本郵件之附檔與超連結之安全性,以共同善盡資訊安全與個資保護責任. 
Please be advised that this email message (including any attachments) contains confidential information and may be legally privileged. If you are not the intended recipient, please destroy this message and all attachments from your system and do not further collect, process, or use them. Chunghwa Telecom and all its subsidiaries and associated companies shall not be liable for the improper or incomplete transmission of the information contained in this email nor for any delay in its receipt or damage to your system. If you are the intended recipient, please protect the confidential and/or personal information contained in this email with due care. Any unauthorized use, disclosure or distribution of this message in whole or in part is strictly prohibited. Also, please self-inspect attachments and hyperlinks contained in this email to ensure the information security and to protect personal information.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210602/d6c34285/attachment-0001.html>


More information about the Servercert-wg mailing list