-
Notifications
You must be signed in to change notification settings - Fork 105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Define standard CAA semantics for limiting cert issuance #353
Comments
This item was discussed at the 2022-07-28 meeting. There were several types of restrictions identified that would be valuable to standardize (ordered in order of importance by the group):
|
We discussed this item on the 2023-10-19 call. We determined two steps for this effort:
|
@CBonnell I noticed that RFC 8657 includes provisions for use without ACME. I think this could be a relatively simple change to require RFC 8657 support for ACME requests and to define the semantics for non-ACME requests. A straw-dog ballot proposal is: Effective day-month-2025, add the following to TLS BR section 3.2.2.8 CAA Records::
Perhaps we could put this on the agenda for an upcoming VSC meeting and gauge interest? |
I'm not sure I understand the use-case for the accountURI extension (the validationmethods is clear). Can somebody help me out with a short description of where that would be usefull? |
As I understand it, |
@wthayer would ca-db-7 not authorize dns-01 acme challenge because it isn't triggered because CA used ACME for this request? |
|
I guess 3.2.2.4.19 Agreed-Upon Change to Website - ACME would be better example: this is clearly for acme http-01 challenge, but your wording doesn't allow ca-db-19 because when using ACME that's not a namespace it looks for |
No description provided.
The text was updated successfully, but these errors were encountered: