<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc docName="draft-ietf-lamps-rfc6844bis-02" category="std" obsoletes="6844">

  <front>
    <title abbrev="CAA">DNS Certification Authority Authorization (CAA) Resource Record</title>

    <author initials="P." surname="Hallam-Baker" fullname="Phillip Hallam-Baker">
      <organization>Comodo Group, Inc</organization>
      <address>
        <email>philliph@comodo.com</email>
      </address>
    </author>
    <author initials="R." surname="Stradling" fullname="Rob Stradling">
      <organization>Comodo Group, Inc</organization>
      <address>
        <email>rob.stradling@comodo.com</email>
      </address>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization>Let's Encrypt</organization>
      <address>
        <email>jsha@letsencrypt.org</email>
      </address>
    </author>

    <date year="2018" month="November" day="04"/>

    
    
    

    <abstract>


<t>The Certification Authority Authorization (CAA) DNS Resource Record
allows a DNS domain name holder to specify one or more Certification
Authorities (CAs) authorized to issue certificates for that domain.
CAA Resource Records allow a public Certification Authority to
implement additional controls to reduce the risk of unintended
certificate mis-issue.  This document defines the syntax of the CAA
record and rules for processing CAA records by certificate issuers.</t>

<t>This document obsoletes RFC 6844.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The Certification Authority Authorization (CAA) DNS Resource Record
allows a DNS domain name holder to specify the Certification
Authorities (CAs) authorized to issue certificates for that domain.
Publication of CAA Resource Records allows a public Certification
Authority to implement additional controls to reduce the risk of
unintended certificate mis-issue.</t>

<t>Like the TLSA record defined in DNS-Based Authentication of Named
Entities (DANE) <xref target="RFC6698"/>, CAA records are used as a part of a
mechanism for checking PKIX certificate data.  The distinction
between the two specifications is that CAA records specify an
authorization control to be performed by a certificate issuer before
issue of a certificate and TLSA records specify a verification
control to be performed by a relying party after the certificate is
issued.</t>

<t>Conformance with a published CAA record is a necessary but not
sufficient condition for issuance of a certificate.  Before issuing a
certificate, a PKIX CA is required to validate the request according
to the policies set out in its Certificate Policy.  In the case of a
public CA that validates certificate requests as a third party, the
certificate will typically be issued under a public trust anchor
certificate embedded in one or more relevant Relying Applications.</t>

<t>Criteria for inclusion of embedded trust anchor certificates in
applications are outside the scope of this document.  Typically, such
criteria require the CA to publish a Certification Practices Statement
(CPS) that specifies how the requirements of the Certificate Policy
(CP) are achieved.  It is also common for a CA to engage an
independent third-party auditor to prepare an annual audit statement
of its performance against its CPS.</t>

<t>A set of CAA records describes only current grants of authority to
issue certificates for the corresponding DNS domain.  Since a
certificate is typically valid for at least a year, it is possible
that a certificate that is not conformant with the CAA records
currently published was conformant with the CAA records published at
the time that the certificate was issued.  Relying Applications MUST
NOT use CAA records as part of certificate validation.</t>

<t>CAA records MAY be used by Certificate Evaluators as a possible
indicator of a security policy violation.  Such use SHOULD take
account of the possibility that published CAA records changed between
the time a certificate was issued and the time at which the
certificate was observed by the Certificate Evaluator.</t>

</section>
<section anchor="definitions" title="Definitions">

<section anchor="requirements-language" title="Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="defined-terms" title="Defined Terms">

<t>The following terms are used in this document:</t>

<t>Authorization Entry:  An authorization assertion that grants or
   denies a specific set of permissions to a specific group of
   entities.</t>

<t>Certificate:  An X.509 Certificate, as specified in <xref target="RFC5280"/>.</t>

<t>Certificate Evaluator:  A party other than a relying party that
   evaluates the trustworthiness of certificates issued by
   Certification Authorities.</t>

<t>Certification Authority (CA):  An issuer that issues certificates in
   accordance with a specified Certificate Policy.</t>

<t>Certificate Policy (CP):  Specifies the criteria that a Certification
   Authority undertakes to meet in its issue of certificates.  See
   <xref target="RFC3647"/>.</t>

<t>Certification Practices Statement (CPS):  Specifies the means by
   which the criteria of the Certificate Policy are met.  In most
   cases, this will be the document against which the operations of
   the Certification Authority are audited.  See <xref target="RFC3647"/>.</t>

<t>Domain:  A DNS Domain Name.</t>

<t>Domain Name:  A DNS Domain Name as specified in <xref target="RFC1034"/>.</t>

<t>Domain Name System (DNS):  The Internet naming system specified in
   <xref target="RFC1034"/> and <xref target="RFC1035"/>.</t>

<t>DNS Security (DNSSEC):  Extensions to the DNS that provide
   authentication services as specified in <xref target="RFC4033"/>, <xref target="RFC4034"/>,
   <xref target="RFC4035"/>, <xref target="RFC5155"/>, and revisions.</t>

<t>Issuer:  An entity that issues certificates.  See <xref target="RFC5280"/>.</t>

<t>Property:  The tag-value portion of a CAA Resource Record.</t>

<t>Property Tag:  The tag portion of a CAA Resource Record.</t>

<t>Property Value:  The value portion of a CAA Resource Record.</t>

<t>Public Key Infrastructure X.509 (PKIX):  Standards and specifications
   issued by the IETF that apply the X.509 certificate standards
   specified by the ITU to Internet applications as specified in
   <xref target="RFC5280"/> and related documents.</t>

<t>Resource Record (RR):  A particular entry in the DNS including the
   owner name, class, type, time to live, and data, as defined in
   <xref target="RFC1034"/> and <xref target="RFC2181"/>.</t>

<t>Resource Record Set (RRSet):  A set of Resource Records of a
   particular owner name, class, and type.  The time to live on all
   RRs with an RRSet is always the same, but the data may be
   different among RRs in the RRSet.</t>

<t>Relying Party:  A party that makes use of an application whose
   operation depends on use of a certificate for making a security
   decision.  See <xref target="RFC5280"/>.</t>

<t>Relying Application:  An application whose operation depends on use
   of a certificate for making a security decision.</t>

</section>
</section>
<section anchor="the-caa-rr-type" title="The CAA RR Type">

<t>A CAA RR consists of a flags byte and a tag-value pair referred to as
a property.  Multiple properties MAY be associated with the same
domain name by publishing multiple CAA RRs at that domain name.  The
following flag is defined:</t>

<t>Issuer Critical:  If set to ‘1’, indicates that the corresponding
   property tag MUST be understood if the semantics of the CAA record
   are to be correctly interpreted by an issuer.</t>

<t>Issuers MUST NOT issue certificates for a domain if the relevant
   CAA Resource Record set contains unknown property tags that have
   the Critical bit set.</t>

<t>The following property tags are defined:</t>

<t>issue &lt;Issuer Domain Name&gt; [; &lt;name&gt;=&lt;value&gt; ]* :  The issue property
   entry authorizes the holder of the domain name &lt;Issuer Domain
   Name&gt; or a party acting under the explicit authority of the holder
   of that domain name to issue certificates for the domain in which
   the property is published.</t>

<t>issuewild &lt;Issuer Domain Name&gt; [; &lt;name&gt;=&lt;value&gt; ]* :  The issuewild
   property entry authorizes the holder of the domain name &lt;Issuer
   Domain Name&gt; or a party acting under the explicit authority of the
   holder of that domain name to issue wildcard certificates for the
   domain in which the property is published.</t>

<t>iodef &lt;URL&gt; :  Specifies a URL to which an issuer MAY report
   certificate issue requests that are inconsistent with the issuer’s
   Certification Practices or Certificate Policy, or that a
   Certificate Evaluator may use to report observation of a possible
   policy violation.  The Incident Object Description Exchange Format
   (IODEF) format is used <xref target="RFC7970"/>.</t>

<t>The following example is a DNS zone file (see <xref target="RFC1035"/>) that informs
CAs that certificates are not to be issued except by the holder of
the domain name ‘ca.example.net’ or an authorized agent thereof.
This policy applies to all subordinate domains under example.com.</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net"
]]></artwork></figure>

<t>If the domain name holder specifies one or more iodef properties, a
certificate issuer MAY report invalid certificate requests to that
address.  In the following example, the domain name holder specifies
that reports may be made by means of email with the IODEF data as an
attachment, a Web service <xref target="RFC6546"/>, or both:</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net"
.       CAA 0 iodef "mailto:security@example.com"
.       CAA 0 iodef "http://iodef.example.com/"
]]></artwork></figure>

<t>A certificate issuer MAY specify additional parameters that allow
customers to specify additional parameters governing certificate
issuance.  This might be the Certificate Policy under which the
certificate is to be issued, the authentication process to be used
might be specified, or an account number specified by the CA to
enable these parameters to be retrieved.</t>

<t>For example, the CA ‘ca.example.net’ has requested its customer
‘example.com’ to specify the CA’s account number ‘230123’ in each of
the customer’s CAA records.</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net; account=230123"
]]></artwork></figure>

<t>The syntax of additional parameters is a sequence of name-value pairs
as defined in Section 5.2.  The semantics of such parameters is left
to site policy and is outside the scope of this document.</t>

<t>The critical flag is intended to permit future versions of CAA to
introduce new semantics that MUST be understood for correct
processing of the record, preventing conforming CAs that do not
recognize the new semantics from issuing certificates for the
indicated domains.</t>

<t>In the following example, the property ‘tbs’ is flagged as critical.
Neither the example.net CA nor any other issuer is authorized to
issue under either policy unless the processing rules for the ‘tbs’
property tag are understood.</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net; policy=ev"
.       CAA 128 tbs "Unknown"
]]></artwork></figure>

<t>Note that the above restrictions only apply at certificate issue.
Since the validity of an end entity certificate is typically a year
or more, it is quite possible that the CAA records published at a
domain will change between the time a certificate was issued and
validation by a relying party.</t>

</section>
<section anchor="certification-authority-processing" title="Certification Authority Processing">

<t>Before issuing a certificate, a compliant CA MUST check for
publication of a relevant CAA Resource Record set.  If such a record
set exists, a CA MUST NOT issue a certificate unless the CA
determines that either (1) the certificate request is consistent with
the applicable CAA Resource Record set or (2) an exception specified
in the relevant Certificate Policy or Certification Practices
Statement applies.</t>

<t>A certificate request MAY specify more than one domain name and MAY
specify wildcard domains.  Issuers MUST verify authorization for all
the domains and wildcard domains specified in the request.</t>

<t>The search for a CAA record climbs the DNS name tree from the
specified label up to but not including the DNS root ‘.’
until CAA records are found.</t>

<t>Given a request for a specific domain name X, or a request for a wildcard domain
name *.X, the relevant record set RelevantCAASet(X) is determined as follows:</t>

<t>Let CAA(X) be the record set returned by performing a CAA record query for the
domain name X, according to the lookup algorithm specified in RFC 1034 section
4.3.2 (in particular chasing aliases). Let Parent(X) be the domain name
produced by removing the leftmost label of X.</t>

<figure><artwork><![CDATA[
RelevantCAASet(domain):
  for domain is not ".":
    if CAA(domain) is not Empty:
      return CAA(domain)
    domain = Parent(domain)
  return Empty
]]></artwork></figure>

<t>For example, processing CAA for the domain name “X.Y.Z” where there are
no CAA records at any level in the tree RelevantCAASet would have the
following steps:</t>

<figure><artwork><![CDATA[
CAA("X.Y.Z.") = Empty; domain = Parent("X.Y.Z.") = "Y.Z."
CAA("Y.Z.")   = Empty; domain = Parent("Y.Z.")   = "Z."
CAA("Z.")     = Empty; domain = Parent("Z.")     = "."
return Empty
]]></artwork></figure>

<t>Processing CAA for the domain name “A.B.C” where there is a CAA record
“issue example.com” at “B.C” would terminate early upon finding the CAA
record:</t>

<figure><artwork><![CDATA[
CAA("A.B.C.") = Empty; domain = Parent("A.B.C.") = "B.C."
CAA("B.C.")   = "issue example.com"
return "issue example.com"
]]></artwork></figure>

<section anchor="use-of-dns-security" title="Use of DNS Security">

<t>Use of DNSSEC to authenticate CAA RRs is strongly RECOMMENDED but not
required.  An issuer MUST NOT issue certificates if doing so would
conflict with the relevant CAA Resource Record set, irrespective of
whether the corresponding DNS records are signed.</t>

<t>DNSSEC provides a proof of non-existence for both DNS domains and RR
set within domains.  DNSSEC verification thus enables an issuer to
determine if the answer to a CAA record query is empty because the RR
set is empty or if it is non-empty but the response has been
suppressed.</t>

<t>Use of DNSSEC allows an issuer to acquire and archive a proof that
they were authorized to issue certificates for the domain.
Verification of such archives MAY be an audit requirement to verify
CAA record processing compliance.  Publication of such archives MAY
be a transparency requirement to verify CAA record processing
compliance.</t>

</section>
</section>
<section anchor="mechanism" title="Mechanism">

<section anchor="syntax" title="Syntax">

<t>A CAA RR contains a single property entry consisting of a tag-value
pair.  Each tag represents a property of the CAA record.  The value
of a CAA property is that specified in the corresponding value field.</t>

<t>A domain name MAY have multiple CAA RRs associated with it and a
given property MAY be specified more than once.</t>

<t>The CAA data field contains one property entry.  A property entry
consists of the following data fields:</t>

<figure><artwork><![CDATA[
+0-1-2-3-4-5-6-7-|0-1-2-3-4-5-6-7-|
| Flags          | Tag Length = n |
+----------------|----------------+...+---------------+
| Tag char 0     | Tag char 1     |...| Tag char n-1  |
+----------------|----------------+...+---------------+
+----------------|----------------+.....+----------------+
| Value byte 0   | Value byte 1   |.....| Value byte m-1 |
+----------------|----------------+.....+----------------+
]]></artwork></figure>

<t>Where n is the length specified in the Tag length field and m is the
remaining octets in the Value field (m = d - n - 2) where d is the
length of the RDATA section.</t>

<t>The data fields are defined as follows:</t>

<t>Flags:  One octet containing the following field:</t>

<t>Bit 0, Issuer Critical Flag:  If the value is set to ‘1’, the
critical flag is asserted and the property MUST be understood
if the CAA record is to be correctly processed by a certificate
issuer.</t>

<t>A Certification Authority MUST NOT issue certificates for any
Domain that contains a CAA critical property for an unknown or
unsupported property tag that for which the issuer critical
flag is set.</t>

<t>Note that according to the conventions set out in <xref target="RFC1035"/>, bit 0
is the Most Significant Bit and bit 7 is the Least Significant
Bit. Thus, the Flags value 1 means that bit 7 is set while a value
of 128 means that bit 0 is set according to this convention.</t>

<t>All other bit positions are reserved for future use.</t>

<t>To ensure compatibility with future extensions to CAA, DNS records
compliant with this version of the CAA specification MUST clear
(set to “0”) all reserved flags bits.  Applications that interpret
CAA records MUST ignore the value of all reserved flag bits.</t>

<t>Tag Length:  A single octet containing an unsigned integer specifying
the tag length in octets.  The tag length MUST be at least 1 and
SHOULD be no more than 15.</t>

<t>Tag:  The property identifier, a sequence of US-ASCII characters.</t>

<t>Tag values MAY contain US-ASCII characters ‘a’ through ‘z’, ‘A’
through ‘Z’, and the numbers 0 through 9.  Tag values SHOULD NOT
contain any other characters.  Matching of tag values is case
insensitive.</t>

<t>Tag values submitted for registration by IANA MUST NOT contain any
characters other than the (lowercase) US-ASCII characters ‘a’
through ‘z’ and the numbers 0 through 9.</t>

<t>Value:  A sequence of octets representing the property value.
Property values are encoded as binary values and MAY employ sub-
formats.</t>

<t>The length of the value field is specified implicitly as the
remaining length of the enclosing Resource Record data field.</t>

<section anchor="canonical-presentation-format" title="Canonical Presentation Format">

<t>The canonical presentation format of the CAA record is:</t>

<t>CAA &lt;flags&gt; &lt;tag&gt; &lt;value&gt;</t>

<t>Where:</t>

<t>Flags:  Is an unsigned integer between 0 and 255.</t>

<t>Tag:  Is a non-zero sequence of US-ASCII letters and numbers in lower
   case.</t>

<t>Value:  Is the &lt;character-string&gt; encoding of the value field as
   specified in <xref target="RFC1035"/>, Section 5.1.</t>

</section>
</section>
<section anchor="caa-issue-property" title="CAA issue Property">

<t>The issue property tag is used to request that certificate issuers
perform CAA issue restriction processing for the domain and to grant
authorization to specific certificate issuers.</t>

<t>The CAA issue property value has the following sub-syntax (specified
in ABNF as per <xref target="RFC5234"/>).</t>

<figure><artwork><![CDATA[
issuevalue = *WSP [domain *WSP] [";" *WSP [parameters *WSP]]

domain = label *("." label)
label = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT))

parameters = (parameter *WSP ";" *WSP parameters) / parameter
parameter = tag *WSP "=" *WSP value
tag = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT))
value = *(%x21-3A / %x3C-7E)
]]></artwork></figure>

<t>For consistency with other aspects of DNS administration, domain name
values are specified in letter-digit-hyphen Label (LDH-Label) form.</t>

<t>A CAA record with an issue parameter tag that does not specify a
domain name is a request that certificate issuers perform CAA issue
restriction processing for the corresponding domain without granting
authorization to any certificate issuer.</t>

<t>This form of issue restriction would be appropriate to specify that
no certificates are to be issued for the domain in question.</t>

<t>For example, the following CAA resource record set requests that no
certificates be issued for the domain ‘nocerts.example.com’ by any
certificate issuer.</t>

<t>nocerts.example.com       CAA 0 issue “;”</t>

<t>A CAA record with an issue parameter tag that specifies a domain name
is a request that certificate issuers perform CAA issue restriction
processing for the corresponding domain and grants authorization to
the certificate issuer specified by the domain name.</t>

<t>For example, the following CAA record set requests that no
certificates be issued for the domain ‘certs.example.com’ by any
certificate issuer other than the example.net certificate issuer.</t>

<t>certs.example.com         CAA 0 issue “example.net”</t>

<t>CAA authorizations are additive; thus, the result of specifying both
the empty issuer and a specified issuer is the same as specifying
just the specified issuer alone.</t>

<t>An issue property tag where the issuevalue does not match the ABNF
grammar MUST be treated the same as one specifying the empty issuer. For
example, the following malformed CAA resource record set forbids issuance:</t>

<t>malformed.example.com     CAA 0 issue “%%%%%”</t>

<t>A non-empty CAA record set that contains no issue property tags
is authorization to any certificate issuer to issue for the corresponding
domain, provided that it is a non-wildcard domain, and no records in the
CAA record set otherwise prohibit issuance.</t>

<t>An issuer MAY choose to specify issuer-parameters that further
constrain the issue of certificates by that issuer, for example,
specifying that certificates are to be subject to specific validation
polices, billed to certain accounts, or issued under specific trust
anchors.</t>

<t>The semantics of issuer-parameters are determined by the issuer
alone.</t>

</section>
<section anchor="caa-issuewild-property" title="CAA issuewild Property">

<t>The issuewild property has the same syntax and semantics as the issue
property except that issuewild properties only grant authorization to
issue certificates that specify a wildcard domain and issuewild
properties take precedence over issue properties when specified.
Specifically:</t>

<t>issuewild properties MUST be ignored when processing a request for
a domain that is not a wildcard domain.</t>

<t>If at least one issuewild property is specified in the relevant
CAA record set, all issue properties MUST be ignored when
processing a request for a domain that is a wildcard domain.</t>

<t>A non-empty CAA record set that contains no issue or issuewild property tags
is authorization to any certificate issuer to issue for the corresponding
wildcard domain, provided that no records in the CAA record set otherwise
prohibit issuance.</t>

</section>
<section anchor="caa-iodef-property" title="CAA iodef Property">

<t>The iodef property specifies a means of reporting certificate issue
requests or cases of certificate issue for the corresponding domain
that violate the security policy of the issuer or the domain name
holder.</t>

<t>The Incident Object Description Exchange Format (IODEF) <xref target="RFC7970"/> is
used to present the incident report in machine-readable form.</t>

<t>The iodef property takes a URL as its parameter.  The URL scheme type
determines the method used for reporting:</t>

<t>mailto:  The IODEF incident report is reported as a MIME email
   attachment to an SMTP email that is submitted to the mail address
   specified.  The mail message sent SHOULD contain a brief text
   message to alert the recipient to the nature of the attachment.</t>

<t>http or https:  The IODEF report is submitted as a Web service
   request to the HTTP address specified using the protocol specified
   in <xref target="RFC6546"/>.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>CAA records assert a security policy that the holder of a domain name
wishes to be observed by certificate issuers.  The effectiveness of
CAA records as an access control mechanism is thus dependent on
observance of CAA constraints by issuers.</t>

<t>The objective of the CAA record properties described in this document
is to reduce the risk of certificate mis-issue rather than avoid
reliance on a certificate that has been mis-issued.  DANE <xref target="RFC6698"/>
describes a mechanism for avoiding reliance on mis-issued
certificates.</t>

<section anchor="non-compliance-by-certification-authority" title="Non-Compliance by Certification Authority">

<t>CAA records offer CAs a cost-effective means of mitigating the risk
of certificate mis-issue: the cost of implementing CAA checks is very
small and the potential costs of a mis-issue event include the
removal of an embedded trust anchor.</t>

</section>
<section anchor="mis-issue-by-authorized-certification-authority" title="Mis-Issue by Authorized Certification Authority">

<t>Use of CAA records does not prevent mis-issue by an authorized
Certification Authority, i.e., a CA that is authorized to issue
certificates for the domain in question by CAA records.</t>

<t>Domain name holders SHOULD verify that the CAs they authorize to
issue certificates for their domains employ appropriate controls to
ensure that certificates are issued only to authorized parties within
their organization.</t>

<t>Such controls are most appropriately determined by the domain name
holder and the authorized CA(s) directly and are thus out of scope of
this document.</t>

</section>
<section anchor="suppression-or-spoofing-of-caa-records" title="Suppression or Spoofing of CAA Records">

<t>Suppression of the CAA record or insertion of a bogus CAA record
could enable an attacker to obtain a certificate from an issuer that
was not authorized to issue for that domain name.</t>

<t>Where possible, issuers SHOULD perform DNSSEC validation to detect
missing or modified CAA record sets.</t>

<t>In cases where DNSSEC is not deployed in a corresponding domain, an
issuer SHOULD attempt to mitigate this risk by employing appropriate
DNS security controls.  For example, all portions of the DNS lookup
process SHOULD be performed against the authoritative name server.
Data cached by third parties MUST NOT be relied on but MAY be used to
support additional anti-spoofing or anti-suppression controls.</t>

</section>
<section anchor="denial-of-service" title="Denial of Service">

<t>Introduction of a malformed or malicious CAA RR could in theory
enable a Denial-of-Service (DoS) attack.</t>

<t>This specific threat is not considered to add significantly to the
risk of running an insecure DNS service.</t>

<t>An attacker could, in principle, perform a DoS attack against an
issuer by requesting a certificate with a maliciously long DNS name.
In practice, the DNS protocol imposes a maximum name length and CAA
processing does not exacerbate the existing need to mitigate DoS
attacks to any meaningful degree.</t>

</section>
<section anchor="abuse-of-the-critical-flag" title="Abuse of the Critical Flag">

<t>A Certification Authority could make use of the critical flag to
trick customers into publishing records that prevent competing
Certification Authorities from issuing certificates even though the
customer intends to authorize multiple providers.</t>

<t>In practice, such an attack would be of minimal effect since any
competent competitor that found itself unable to issue certificates
due to lack of support for a property marked critical SHOULD
investigate the cause and report the reason to the customer.  The
customer will thus discover that they had been deceived.</t>

</section>
</section>
<section anchor="deployment-considerations" title="Deployment Considerations">

<section anchor="blocked-queries-or-responses" title="Blocked Queries or Responses">

<t>Some middleboxes, in particular anti-DDoS appliances, may be configured to
drop DNS packets of unknown types, or may start dropping such packets when
they consider themselves under attack. This generally manifests as a timed-out
DNS query, or a SERVFAIL at a local recursive resolver.</t>

<t>For deployability of CAA and future DNS record types, middleboxes SHOULD block
DNS packets by volume and size rather than by query type.</t>

</section>
<section anchor="rejected-queries-and-malformed-responses" title="Rejected Queries and Malformed Responses">

<t>Some authoritative nameservers respond with REJECTED or NOTIMP when queried
for a resource record type they do not recognize. At least one authoritative
resolver produces a malformed response (with the QR bit set to 0) when queried
for unknown resource record types.  Per RFC 1034, the correct response for
unknown resource record types is NOERROR.</t>

</section>
<section anchor="delegation-to-private-nameservers" title="Delegation to Private Nameservers">

<t>Some domain administrators make the contents of a subdomain unresolvable on the
public internet by delegating that subdomain to a nameserver whose IP address is
private. A CA processing CAA records for such subdomains will receive
SERVFAIL from its recursive resolver. The CA MAY interpret that as preventing
issuance. Domain administrators wishing to issue certificates for private
domains SHOULD use split-horizon DNS with a publicly available nameserver, so
that CAs can receive a valid, empty CAA response for those domains.</t>

</section>
<section anchor="bogus-dnssec-responses" title="Bogus DNSSEC Responses">

<t>Queries for CAA resource records are different from most DNS RR types, because
a signed, empty response to a query for CAA RRs is meaningfully different
from a bogus response. A signed, empty response indicates that there is
definitely no CAA policy set at a given label. A bogus response may mean
either a misconfigured zone, or an attacker tampering with records. DNSSEC
implementations may have bugs with signatures on empty responses that go
unnoticed, because for more common resource record types like A and AAAA,
the difference to an end user between empty and bogus is irrelevant; they
both mean a site is unavailable.</t>

<t>In particular, at least two authoritative resolvers that implement live signing
had bugs when returning empty resource record sets for DNSSEC-signed zones, in
combination with mixed-case queries. Mixed-case queries, also known as DNS 0x20,
are used by some recursive resolvers to increase resilience against DNS
poisoning attacks. DNSSEC-signing authoritative resolvers are expected to copy
the same capitalization from the query into their ANSWER section, but sign the
response as if they had use all lowercase. In particular, PowerDNS versions
prior to 4.0.4 had this bug.</t>

</section>
</section>
<section anchor="differences-versus-rfc6844" title="Differences versus RFC6844">

<t>This document obsoletes RFC6844. The most important change is to
the Certification Authority Processing section. RFC6844 specified an
algorithm that performed DNS tree-climbing not only on the domain name
being processed, but also on all CNAMEs and DNAMEs encountered along
the way. This made the processing algorithm very inefficient when used
on domains that utilize many CNAMEs, and would have made it difficult
for hosting providers to set CAA policies on their own domains without
setting potentially unwanted CAA policies on their customers’ domains.
This document specifies a simplified processing algorithm that only
performs tree climbing on the domain being processed, and leaves
processing of CNAMEs and DNAMEs up to the CA’s recursive resolver.</t>

<t>This document also includes a “Deployment Considerations” section
detailing experience gained with practical deployment of CAA enforcement
amount CAs in the WebPKI.</t>

<t>This document clarifies the ABNF grammar for issue and issuewild tags
and resolves some inconsistencies with the document text. In particular,
it specifies that parameters are separated with hyphens. It also allows
hyphens in property names.</t>

<t>This document also clarifies processing of a CAA RRset that is not empty,
but contains no issue or issuewild tags.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no IANA actions.</t>

<section anchor="certification-authority-restriction-flags" title="Certification Authority Restriction Flags">

<t>IANA has created the “Certification Authority Restriction Flags”
registry with the following initial values:</t>

<texttable>
      <ttcol align='left'>Flag</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Issuer Critical Flag</c>
      <c><xref target="RFC6844"/></c>
      <c>1-7</c>
      <c>Reserved&gt;</c>
      <c><xref target="RFC6844"/></c>
</texttable>

<t>Assignment of new flags follows the RFC Required policy set out in
<xref target="RFC8126"/>, Section 4.1.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The authors would like to thank the following people who contributed
to the design and documentation of this work item: Chris Evans,
Stephen Farrell, Jeff Hodges, Paul Hoffman, Stephen Kent, Adam
Langley, Ben Laurie, James Manager, Chris Palmer, Scott Schmit, Sean
Turner, and Ben Wilson.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC6698" target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<date year='2012' month='August' />
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC5280" target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference  anchor="RFC1034" target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference  anchor="RFC4033" target='https://www.rfc-editor.org/info/rfc4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference  anchor="RFC4034" target='https://www.rfc-editor.org/info/rfc4034'>
<front>
<title>Resource Records for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS.  This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records.  The purpose and format of each resource record is described in detail, and an example of each resource record is given. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4034'/>
<seriesInfo name='DOI' value='10.17487/RFC4034'/>
</reference>



<reference  anchor="RFC4035" target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference  anchor="RFC5155" target='https://www.rfc-editor.org/info/rfc5155'>
<front>
<title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
<author initials='B.' surname='Laurie' fullname='B. Laurie'><organization /></author>
<author initials='G.' surname='Sisson' fullname='G. Sisson'><organization /></author>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='D.' surname='Blacka' fullname='D. Blacka'><organization /></author>
<date year='2008' month='March' />
<abstract><t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence.  However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5155'/>
<seriesInfo name='DOI' value='10.17487/RFC5155'/>
</reference>



<reference  anchor="RFC2181" target='https://www.rfc-editor.org/info/rfc2181'>
<front>
<title>Clarifications to the DNS Specification</title>
<author initials='R.' surname='Elz' fullname='R. Elz'><organization /></author>
<author initials='R.' surname='Bush' fullname='R. Bush'><organization /></author>
<date year='1997' month='July' />
<abstract><t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2181'/>
<seriesInfo name='DOI' value='10.17487/RFC2181'/>
</reference>



<reference  anchor="RFC7970" target='https://www.rfc-editor.org/info/rfc7970'>
<front>
<title>The Incident Object Description Exchange Format Version 2</title>
<author initials='R.' surname='Danyliw' fullname='R. Danyliw'><organization /></author>
<date year='2016' month='November' />
<abstract><t>The Incident Object Description Exchange Format (IODEF) defines a data representation for security incident reports and indicators commonly exchanged by operational security teams for mitigation and watch and warning.  This document describes an updated information model for the IODEF and provides an associated data model specified with the XML schema.  This new information and data model obsoletes RFCs 5070 and 6685.</t></abstract>
</front>
<seriesInfo name='RFC' value='7970'/>
<seriesInfo name='DOI' value='10.17487/RFC7970'/>
</reference>



<reference  anchor="RFC6546" target='https://www.rfc-editor.org/info/rfc6546'>
<front>
<title>Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS</title>
<author initials='B.' surname='Trammell' fullname='B. Trammell'><organization /></author>
<date year='2012' month='April' />
<abstract><t>The Incident Object Description Exchange Format (IODEF) defines a common XML format for document exchange, and Real-time Inter-network Defense (RID) defines extensions to IODEF intended for the cooperative handling of security incidents within consortia of network operators and enterprises.  This document specifies an application-layer protocol for RID based upon the passing of RID messages over HTTP/TLS.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6546'/>
<seriesInfo name='DOI' value='10.17487/RFC6546'/>
</reference>



<reference  anchor="RFC5234" target='https://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker' role='editor'><organization /></author>
<author initials='P.' surname='Overell' fullname='P. Overell'><organization /></author>
<date year='2008' month='January' />
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference  anchor="RFC6844" target='https://www.rfc-editor.org/info/rfc6844'>
<front>
<title>DNS Certification Authority Authorization (CAA) Resource Record</title>
<author initials='P.' surname='Hallam-Baker' fullname='P. Hallam-Baker'><organization /></author>
<author initials='R.' surname='Stradling' fullname='R. Stradling'><organization /></author>
<date year='2013' month='January' />
<abstract><t>The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain. CAA Resource Records allow a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue.  This document defines the syntax of the CAA record and rules for processing CAA records by certificate issuers. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6844'/>
<seriesInfo name='DOI' value='10.17487/RFC6844'/>
</reference>



<reference  anchor="RFC8126" target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author initials='M.' surname='Cotton' fullname='M. Cotton'><organization /></author>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<author initials='T.' surname='Narten' fullname='T. Narten'><organization /></author>
<date year='2017' month='June' />
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC3647" target='https://www.rfc-editor.org/info/rfc3647'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
<author initials='S.' surname='Chokhani' fullname='S. Chokhani'><organization /></author>
<author initials='W.' surname='Ford' fullname='W. Ford'><organization /></author>
<author initials='R.' surname='Sabett' fullname='R. Sabett'><organization /></author>
<author initials='C.' surname='Merrill' fullname='C. Merrill'><organization /></author>
<author initials='S.' surname='Wu' fullname='S. Wu'><organization /></author>
<date year='2003' month='November' />
<abstract><t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates.  In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement.  This document supersedes RFC 2527.</t></abstract>
</front>
<seriesInfo name='RFC' value='3647'/>
<seriesInfo name='DOI' value='10.17487/RFC3647'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

