All, I think the CABForum is indeed the right mechanism to alert both CAs and root programs to such a change, and then the root programs can include it in their periodic notices to their included CAs -- which will then cover all bases.
I would be happy to introduce the information to the CABForum's server certificate mailing list, and indicate its origin of course. Alternatively, anyone can email it to the CABForum Public List <pub...@cabforum.org> directly and then the appropriate CABF Working Group Chair would be responsible for forwarding it onward suitably. (Note: I'm a member of that public list's recipients, so I could confirm it wasn't lost.) I think either would be fine -- but if you'd like me to do the introducing, I'd appreciate it if you could synthesize me a quick rundown of what CAs need to know. Cheers! J.C. On Tue, Dec 3, 2019 at 10:24 PM Adam Roach <a...@nostrum.com> wrote: > [JC -- note for you at the very bottom] > > On 12/3/19 4:27 PM, Dave Lawrence wrote: > > Thank you very much for your review, Adam. I have incorporated your > > feedback into the document (which is not yet pushed to datatracker). > > > > Here's the diff: > > > > > https://github.com/vttale/serve-stale/commit/3ae0f4e5f79e0b326608beaa77b74a1efe62663c > > > > Adam Roach via Datatracker writes: > >> The addition of what I must presume is intended to be RFC 2119 > >> language to a document that doesn't cite RFC 2119 seems > >> questionable. I would suggest either explicitly adding RFC 2119 > >> boilerplate to RFC 1035 as part of this update, or using plain > >> English language to convey the same concepts as are intended. > > I definitely agree it is questionable, and if something needs to be > > done to resolve this then your first suggestion is the one that is > > more agreeable to me personally, but I can also see how that too is > > questionable and might get some pushback. It's a bit of a weird > > situation. > > > > It is perhaps worth noting that several other RFCs that have updated > > 1035, starting with 3658, have already used 2119 normative keywords. > > So in spirit it's already there, just not with an explicit remark in > > any of the that formally puts the boilerplate on 1035 itself. (And, > > in the end, that means 1035 is a weird hodge-podge of old world and new.) > > > That would be all the more reason to formally update RFC 1035 to > incorporate RFC 2119 terminology. I'll note that this document does go > well beyond the simple task explained in its title to do some general > unrelated housecleaning (cf. the high-order bit of the TTL), so it seems > to have taken exactly this kind of broad document maintenance under its > remit. > > > >>> A proposed mitigation is that certificate authorities > >>> should fully look up each name starting at the DNS root for every > >>> name lookup. Alternatively, CAs should use a resolver that is not > >>> serving stale data. > >> This seems like a perfectly good solution, although I wonder how > >> many CAs are likely to read this document. If I were the type to > >> engage in wagering, I'd put all of my money on "zero." I'm not sure > >> specific action is called for prior to publication of this document > >> as an RFC, but it seems that additional publicity of this issue and > >> the way that serve-stale interacts with it -- e.g., to CAB Forum and > >> its members -- is warranted. > > Completely agree, except to the point that if it were known that there > > was money riding on it then someone at a CA would read it just to take > > your money. :) That said, anyone have thoughts on how best to bring > > it to their attention? > > > > I'm copying JC Jones on this mail to seek his advice on this point. > > /a > >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop