Skip to content

SC-098: Process RFC 8657 CAA Parameters#567

Open
wthayer wants to merge 53 commits intomainfrom
SC-XX-Process-RFC-8657-CAA-Parameters
Open

SC-098: Process RFC 8657 CAA Parameters#567
wthayer wants to merge 53 commits intomainfrom
SC-XX-Process-RFC-8657-CAA-Parameters

Conversation

@wthayer
Copy link
Copy Markdown
Contributor

@wthayer wthayer commented Jan 2, 2025

Update 3.2.2.8 to require that CAs process CAA accounturi and validationmethod parameters defined in RFC 8657

Fixes #353

@wthayer wthayer requested a review from a team as a code owner January 2, 2025 22:11
Comment thread docs/BR.md Outdated
Comment thread docs/BR.md Outdated
wthayer and others added 5 commits January 3, 2025 14:40
Co-authored-by: Rob Stradling <rob@sectigo.com>
Co-authored-by: Rob Stradling <rob@sectigo.com>
- validationmethod labels must comply with section 4 of RFC 8657
- Update effective date format
- Add 'this section' to CPS requirements.
Comment thread docs/BR.md Outdated
@wthayer wthayer changed the title SC-XX: Process RFC 8657 CAA Parameters SC-XX: Require DNSSEC Validatiion and Process RFC 8657 CAA Parameters Jan 22, 2025
@wthayer wthayer changed the title SC-XX: Require DNSSEC Validatiion and Process RFC 8657 CAA Parameters SC-XX: Require DNSSEC Validation and Process RFC 8657 CAA Parameters Jan 22, 2025
@wthayer
Copy link
Copy Markdown
Contributor Author

wthayer commented Jan 26, 2025

Updated based on 24-Jan Validation meeting:

  • still specifying the CA-specific label format. consensus was that this does not violate the RFC
  • adopted Ben's wording
  • rearranged 3.2.2.8 and added subsections
  • Changed MUST date to 2027 for parameters. Left the 2026 date for DNSSEC since it's arguably a clarification
  • Drafted a recommendation that CAs accept validationmethods labels from ACME or the BRs

@dzacharo
Copy link
Copy Markdown
Contributor

This also seems to address #352

Comment thread docs/BR.md Outdated
wthayer and others added 2 commits February 11, 2025 14:55
Co-authored-by: Corey Bonnell <corey.j.bonnell@outlook.com>
@wthayer wthayer changed the title SC-XX: Require DNSSEC Validation and Process RFC 8657 CAA Parameters SC-XX: Process RFC 8657 CAA Parameters Mar 6, 2025
Comment thread docs/BR.md Outdated
@wthayer wthayer dismissed robstradling’s stale review April 2, 2026 03:02

the requested changes have been incorporated.

Comment thread docs/BR.md Outdated
Comment thread docs/BR.md Outdated
Comment thread docs/BR.md Outdated
Comment thread docs/BR.md
Comment thread docs/BR.md Outdated
Comment thread docs/BR.md Outdated
Comment thread docs/BR.md Outdated
Comment thread docs/BR.md Outdated
wthayer and others added 10 commits April 26, 2026 15:12
Co-authored-by: Chris Clements <cclements@google.com>
Co-authored-by: Gurleen Grewal <gurleen.grewal@gmail.com>
Co-authored-by: Gurleen Grewal <gurleen.grewal@gmail.com>
Co-authored-by: Shiloh Heurich <1778483+sheurich@users.noreply.github.com>
Co-authored-by: Shiloh Heurich <1778483+sheurich@users.noreply.github.com>
Co-authored-by: Shiloh Heurich <1778483+sheurich@users.noreply.github.com>
Co-authored-by: Shiloh Heurich <1778483+sheurich@users.noreply.github.com>
Co-authored-by: Shiloh Heurich <1778483+sheurich@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Define standard CAA semantics for limiting cert issuance