Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify BR 3.2.2.4.7 #533

Open
BenWilson-Mozilla opened this issue Jul 11, 2024 · 3 comments
Open

Clarify BR 3.2.2.4.7 #533

BenWilson-Mozilla opened this issue Jul 11, 2024 · 3 comments
Labels
baseline-requirements Server Certificate CWG - Baseline Requirements

Comments

@BenWilson-Mozilla
Copy link
Contributor

Section 3.2.2.4.7 should be clarified. In a Validation subcommittee discussion today, related to https://lists.cabforum.org/pipermail/validation/2024-June/001989.html, we looked at the language "Confirming the Applicant’s control over the FQDN by confirming the presence of a Random Value or Request Token for either in a DNS CNAME, TXT or CAA record for either 1) an Authorization Domain Name; or 2) an Authorization Domain Name that is prefixed with a Domain Label that begins with an underscore character." The plain language interpretation is that the RV/RT be in the DNS record (DNS CNAME, TXT or CAA), but each type of DNS record implicates a different method of providing the RV/RT. I would recommend that the language be modified to separate out each one.
E.g., if CNAME is used, then do this; if TXT is used, do that; and if CAA record is used, do this other thing. For additional reference, also see cabforum/definitions#5.

@BenWilson-Mozilla BenWilson-Mozilla added the baseline-requirements Server Certificate CWG - Baseline Requirements label Jul 11, 2024
Copy link

This issue was created based on:

  • TLS BR Version 2.0.5
  • EVG Version 2.0.1

@dzacharo
Copy link
Contributor

Notes from SCWG Teleconference 2025-01-16.

There are many combinations hidden in this method. Proposal to separate the cases. For example, CAA doesn't make sense to require an ADN prefixed with an underscore. This seems like work for the Validation Subcommittee.

@aarongable
Copy link
Contributor

My proposal would be something like:

Confirming the Applicant's control over the FQDN by confirming the presence of a Random Value or Request Token in a DNS record. The DNS record MUST be

  1. a TXT record on an Authorization Domain Name;
  2. a TXT record on an Authorization Domain Name that is prefixed with a Domain Label that begins with an underscore character;
  3. a CAA record on an Authorization Domain Name; or
  4. a CNAME record on an Authorization Domain Name that is prefixed with a Domain Label that begins with an underscore character.

This explicitly spells out the set of options, and makes two cases (putting the CNAME directly on the ADN, which makes that ADN useless; and putting the CAA record below the ADN, where CAA records don't generally make sense) not acceptable. If folks are aware of CAs or systems that do use the two methods I've ruled out here, please say so.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
baseline-requirements Server Certificate CWG - Baseline Requirements
Projects
None yet
Development

No branches or pull requests

3 participants