In the SPASM group, we are refining CAA (RFC 6844) based on the changes
that were needed in order to get it passed at the CA/Browser Forum.
There's one sticky bit in particular I'd like input on. Here's the
current language in the BRs:

https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.5.4.pdf

> CAs are permitted to treat a record lookup failure as permission to issue
> if:
> - the failure is outside the CA's infrastructure;
> - the lookup has been retried at least once; and
> - the domain's zone does not have a DNSSEC validation chain to the
> ICANN root.

It would be nice if we could provide more solid language for a future BR
update, or possibly for a CAA update.

The goal here is to work around the issue that a small but significant
number of domains return errors when asked for CAA ((I'd guesstimate
1%?). CAs would like to be able to assume there is no CAA record present
for those domains and issue anyhow.

However, if you're using a standard recursive resolver inside your own
infrastructure, and you get a SERVFAIL, how do you distinguish whether
that was a DNSSEC validation failure or another type? I realize the
extended-error draft will help enormously with that, but I'm looking for
a solution that can be deployed before that is done. One idea: Run two
recursive resolvers, one validating and one not. If you get an error
from both, it's a network error; if you get an error from the validating
one and success from the non-validating one, it's a DNSSEC error and you
should refuse issuance.

A second issue: How does one determine automatically whether a failure
is "outside a CA's infrastructure?" This was inserted as a bit of a
handwave to get the ballot passed, but it would be nice if we could
formalize this concept, or declare that it's unenforceable.

Thanks,
Jacob

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to