Skip to content

Conversation

@wthayer
Copy link
Contributor

@wthayer wthayer commented Jan 2, 2025

Update 3.2.2.8 to require that CAs process CAA accounturi and validationmethod parameters defined in RFC 8657

Fixes #353

@wthayer wthayer requested a review from a team as a code owner January 2, 2025 22:11
wthayer and others added 5 commits January 3, 2025 14:40
Co-authored-by: Rob Stradling <[email protected]>
- validationmethod labels must comply with section 4 of RFC 8657
- Update effective date format
- Add 'this section' to CPS requirements.
@wthayer wthayer changed the title SC-XX: Process RFC 8657 CAA Parameters SC-XX: Require DNSSEC Validatiion and Process RFC 8657 CAA Parameters Jan 22, 2025
@wthayer wthayer changed the title SC-XX: Require DNSSEC Validatiion and Process RFC 8657 CAA Parameters SC-XX: Require DNSSEC Validation and Process RFC 8657 CAA Parameters Jan 22, 2025
@wthayer
Copy link
Contributor Author

wthayer commented Jan 26, 2025

Updated based on 24-Jan Validation meeting:

  • still specifying the CA-specific label format. consensus was that this does not violate the RFC
  • adopted Ben's wording
  • rearranged 3.2.2.8 and added subsections
  • Changed MUST date to 2027 for parameters. Left the 2026 date for DNSSEC since it's arguably a clarification
  • Drafted a recommendation that CAs accept validationmethods labels from ACME or the BRs

@dzacharo
Copy link
Contributor

This also seems to address #352

@wthayer wthayer changed the title SC-XX: Require DNSSEC Validation and Process RFC 8657 CAA Parameters SC-XX: Process RFC 8657 CAA Parameters Mar 6, 2025
docs/BR.md Outdated

In addition, *Effective March 15, 2026*, if the CA processes the accounturi and validationmethods parameters:
* If the CA accepts certificate requests via any protocol other than the ACME protocol defined in RFC 8555, the CA MUST define the supported format(s) of the accounturi in Section 4.2 of their CP and/or CPS.
* If the CA accepts certificate requests via any protocol other than the ACME protocol defined in RFC 8555, the CA MUST interpret and process validationmethods labels formed by concatenating the string ‘ca-tbr-’ with the BR 3.2.2.4 subsection number, e.g. ‘ca-tbr-7’ represents the DNS method described in TLS BR 3.2.2.4.7. If a CA performs domain validation using a mechanism that can be represented by multiple labels (e.g. 'dns-01' and 'ca-tbr-7'), the CA SHOULD accept any of the labels as granting permission to issue.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Echoing my comment from the call this morning: I think this sentence comes a little close to the line of "well, CA Foo doesn't quite implement RFC 8555 (e.g. they don't provide a list of all orders for an account), so they qualify here and need to support these validationmethods labels". I think it's clear that this is not the intent of this sentence, so I'm wondering if there's any minor change we can make to make this clear.

docs/BR.md Outdated

In addition, *Effective March 15, 2026*, if the CA processes the accounturi and validationmethods parameters:
* If the CA accepts certificate requests via any protocol other than the ACME protocol, the CA MUST define the supported format(s) of the accounturi in Section 4.2 of their CP and/or CPS.
* If the CA accepts certificate requests via any protocol other than the ACME protocol, the CA MUST interpret and process validationmethods labels formed by concatenating the string ‘ca-tbr-’ with the BR 3.2.2.4 subsection number, e.g. ‘ca-tbr-7’ represents the DNS method described in TLS BR 3.2.2.4.7. If a CA performs domain validation using a mechanism that can be represented by multiple labels (e.g. 'dns-01' and 'ca-tbr-7'), the CA SHOULD accept any of the labels as granting permission to issue.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. Can 'http-01' considered to represent 3.2.2.4.18? while it'd strictly mean 3.2.2.4.19, it's reasonable to assume user meant any http update challenges.
  2. Can ACME running CA use 'ca-tbr-19' as permission to use http-01 challenge? this paragraph doesn't apply if a CA doesn't offer something else, isn't it?

Copy link
Contributor

@aarongable aarongable Apr 18, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. Can 'http-01' considered to represent 3.2.2.4.18? while it'd strictly mean 3.2.2.4.19, it's reasonable to assume user meant any http update challenges.

No, 3.2.2.4.18 and 3.2.2.4.19 are in fact different validation methods (the expect the token to be in a different location and to look different) so permission to use one method cannot be interpreted as permission to use the other.

  1. Can ACME running CA use 'ca-tbr-19' as permission to use http-01 challenge? this paragraph doesn't apply if a CA doesn't offer something else, isn't it?

Yes, this paragraph simply says that non-ACME CAs MUST respect those designations; therefore an ACME CA MAY also respect them, as long as it appropriately documents that fact in its CPS.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Define standard CAA semantics for limiting cert issuance