On Mon, May 21, 2018, 9:07 AM Nick Lamb via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> As a lowly relying party, I have to say I'd expect better here.
>
> In particular, if example.com says their DNSSEC signed CAA forbade Let's
> Encrypt from issuing, and Let's Encrypt says otherwise, I absolutely would
> expect Let's Encrypt to produce DNSSEC signed RRs that match up to their
> story. The smoking gun for such scenarios exists, and CAs are, or should
> be, under no illusions that it's their job to produce it.
>
> A log entry that says "CAA: check OK" is worthless for exactly the reason
> this thread exists, record the RRs themselves, byte for byte.
>

FWIW, I don't think Let's Encrypt was saying that they just store "OK", but
that they store a parsed representation of the record rather than the raw
RR.

I understand you're asking for the raw RR to be stored, and that seems like
a reasonable request and (especially now) a reasonable interpretation of
the BRs. But your message might have left the impression that LE only
stored an OK/not-OK bit, which isn't how I read LE's email or code.


> We've seen banks taking this sort of shortcut in the past and it did them
> no favour with me. I want to see the EMV transaction signature that proves
> a correct PIN was used, not a blurry print from some mainframe with an
> annotation that says "A 4 in this column indicates PIN confirmed".
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to