CAA Security Tag for Cryptographic Domain Validation
draft-birgelee-lamps-caa-security-00
This document is an Internet-Draft (I-D).
Anyone may submit an I-D to the IETF.
This I-D is not endorsed by the IETF and has no formal standing in the
IETF standards process.
Document | Type | Active Internet-Draft (individual) | |
---|---|---|---|
Authors | Henry Birge-Lee , Grace Cimaszewski , Cyrill Krähenbühl , Liang Wang , Aaron Gable , Prateek Mittal | ||
Last updated | 2024-11-14 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | I-D Exists | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
draft-birgelee-lamps-caa-security-00
Limited Additional Mechanisms for PKIX and SMIME H. Birge-Lee Internet-Draft G. Cimaszewski Intended status: Experimental C. E. Krähenbühl Expires: 18 May 2025 L. Wang Princeton University A. Gable ISRG P. Mittal Princeton University 14 November 2024 CAA Security Tag for Cryptographic Domain Validation draft-birgelee-lamps-caa-security-00 Abstract CAA "security" tags are a type of CAA record (defined in RFC 6844) with the critical flag set that specify that for a certificate to be issued, the issuance process must be conducted in a manner that is robust against global man-in-the-middle adversaries by leveraging authenticated communication between a CA and a domain. Cryptographic domain validation procedures are authenticated and resilient against attacks by both on-path and off-path network attackers which may be between the CA and the domain contained in the certificate. This document defines the syntax of "security" CAA records as well as acceptable means for validating domains in a cryptographic manner. About This Document This note is to be removed before publishing as an RFC. The latest revision of this draft can be found at https://birgelee.github.io/draft-caa-security-tag/draft-birgelee- lamps-caa-security.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-birgelee-lamps-caa- security/. Discussion of this document takes place on the Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (mailto:[email protected]), which is archived at https://mailarchive.ietf.org/arch/browse/spasm/. Subscribe at https://www.ietf.org/mailman/listinfo/spasm/. Source for this draft and an issue tracker can be found at https://github.com/birgelee/draft-caa-security-tag. Birge-Lee, et al. Expires 18 May 2025 [Page 1] Internet-Draft CAA Security Tag November 2024 Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 18 May 2025. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Conventions and Definitions . . . . . . . . . . . . . . . . . 3 3. Security CAA Record Syntax . . . . . . . . . . . . . . . . . 3 4. Well-known Properties . . . . . . . . . . . . . . . . . . . . 4 5. Permissible Methods . . . . . . . . . . . . . . . . . . . . . 5 6. Permissible Options . . . . . . . . . . . . . . . . . . . . . 7 7. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 7 8. Single "security" Tag for Each Domain . . . . . . . . . . . . 8 9. CAA "security" Tag Protection . . . . . . . . . . . . . . . . 8 10. Security Considerations . . . . . . . . . . . . . . . . . . . 8 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 12. Normative References . . . . . . . . . . . . . . . . . . . . 9 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 10 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 Birge-Lee, et al. Expires 18 May 2025 [Page 2] Internet-Draft CAA Security Tag November 2024 1. Introduction A "security" CAA record is compliant with RFC 6844 and puts restrictions on the circumstances under which a CA can sign a certificate for a given domain. A “security” CAA record on a domain implies that validation for this domain must be done in a manner that offers security against network adversaries even if an adversary is capable of intercepting and/or modifying communication between the CA and the domain being validated. Issuance of a certificate to a domain with a "security" CAA tag MUST follow one of the specified Cryptographic Domain Validation (CDV) methods outlined in this document or future extensions. CDV methods MUST rely on cryptographic protocols (like DNSSEC or DoH/DoT) that offer security properties even in the presence of man-in-the-middle adversaries that can intercept any communication which occurs over the public Internet. Not all CDV methods are in themselves compliant with the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. Any CDV method that does not additionally meet the CA/Browser Forum Baseline Requirements for TLS server certificate issuance must be used in conjunction with a method that satisfies CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. Such methods are indicated in their descriptions. 2. Conventions and Definitions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Security CAA Record Syntax The flags field of the security tag MUST have the critical bit set in the flags byte of the CAA record. The "security" tag MUST have the tag field of the CAA record be the word "security". The value field of the "security" tag MUST be one of three values 1. an empty string. 2. entirely whitespace. Birge-Lee, et al. Expires 18 May 2025 [Page 3] Internet-Draft CAA Security Tag November 2024 3. a property_list as defined in this document. Values 1. and 2. MUST be treated identically as an empty value field. A property_list is defined by the following syntax [whitespace]<property>[whitespace][,[whitespace]<property>[whitespace ] ...] A property is defined as <property_name>[whitespace][(property_list)] property_name is a name that identifies the property being specified. The name MUST consist only of lowercase letters (a-z), uppercase letters (A-Z), numbers (0-9), colin (:), underscore (_), and hyphen (-). Names are case sensitive. Properties can optionally have parameters specified in parenthesis. The parameteres of a property are a property_list. A property with no parameters MUST NOT be followed by parenthesis (i.e., property_name() is not a valid statement). The optional property_list specified in parenthesis after each property contains parameters associated with that property. A property_list can be arbitrarily long. Whitespace between properties is ignored. properties are comma-separated. property_lists MUST NOT be empty (i.e., property_lists must have at least one property). All properties specified in a property_list MUST be unique. A property_list MUST NOT have two of the same properties specified even if they contain different parameters. 4. Well-known Properties The top-level property_list MAY contain the following properties. 1. *methods* If specified, this property MUST have parameters listing various cryptographic domain validation methods that can be used to validate that particular domain. A CA MUST only use one of the methods specified in the parameters value_list to perform cryptographic domain validation. If there is no method specified that the CA is capable of complying with, the CA MUST deny issuance. Birge-Lee, et al. Expires 18 May 2025 [Page 4] Internet-Draft CAA Security Tag November 2024 2. *options* If specified, this property MUST have parameters listing various options. A CA SHOULD try to honor any option specified in this list. If a CA does not understand an option or does not have that option implemented the, CA MAY proceed with issuance. 3. *options-critical* If specified, this property MUST have parameters listing various options. To proceed with issuance, a CA MUST understand and implement all options specified in the options-critical parameter's property-list The top-level property_list MAY contain additional properties and a CA MAY proceed with issuance even if it does not understand these additional properties. Subsequent RFCs MAY standardize these properties. 5. Permissible Methods The following properties MAY be specified as parameters of the "methods" property. Each method specifies particular aspects of certificate issuance that MUST be satisfied for a certificate to be issued using that method. While some methods entail the use of CA/ Browser Forum-compliant domain control validation methods, others do not entail CA/Browser Forum-compliant domain control validation and must be used in conjunction with a CA/Browser Forum-compliant domain control validation method to permit certificate issuance. 1. *secure-dns-record-change:* This method involves an applicant showing control of a DNSSEC-protected DNS record or a record that was retrieved via a DoH or DoT tunnel to the relevant authoritative nameservers used in the DNS resolution. This can be done via 1) the validation method "DNS Change" specified in the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates (Section 3.2.2.4.7) or 2) the "dns-01" method of the ACME RFC 8555. For this method to be satisfied, the FQDN where the DNS change is demonstrated MUST be protected by DNSSEC or lookups to the relevant authoritative nameservers MUST be conducted over authenticated channels (e.g., DoH/DoT). 2. *http-validation-over-tls:* This method involves the completion of an HTTP domain validation challenge over an HTTPS session using TCP port 443 where the server authenticates with an existing publicly-trusted valid certificate covering the domain in question. The certificate cannot be self-signed or expired. This method MAY be directly satisfied while a CA is performing the "Agreed-Upon Change to Website v2" domain control validation method specified in the the CA/Browser Forum's Baseline Birge-Lee, et al. Expires 18 May 2025 [Page 5] Internet-Draft CAA Security Tag November 2024 Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates (Section 3.2.2.4.18). The ACME "http-01" challenge specified in RFC 8555 does not permit the use of HTTPS or port 443 when a CA is contacting the domain in question. A CA MAY still satisfy the *http-validation-over-tls* method even if it does not initiate connections to port 443 for HTTP challenges so long as either 1) the connection initiated to port 80 serves a redirect to the same domain name over HTTPS at port 443 and the connection to the domain at port 443 servers a valid, trusted certificate or 2) in addition to contacting the domain over port 80 the CA also contacts the domain over port 443 using HTTPS and the connection is established with a valid, trusted certificate and the same challenge value is observed. Operators of security- critical domains MAY choose not to permit this method since, unlike other cryptographic domain validation methods specified in this document, its security relies on no malicious certificates existing for a domain at time of the creation of the "security" tag in the domain's policy. 3. *known-account-specifier:* For a CA to issue a certificate using this method 1) there MUST exist a unique identifier for a CA subscriber account that is communicated with the CA out-of-band, over authenticated DNS lookups, or in another manner that is immune to man-in-the-middle adversaries 2) the CA may only issue a certificate to an applicant that has authenticated itself to the CA as having access to that specified subscriber account. A CA does not have permission to issue under this method unless both of these criteria are met. Once these criteria have been met, the CA MUST additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. One acceptable way of including this account identifier is with the CAA ACME account URI extension in an authenticated DNS record. 4. *private-key-control:* This method involves an applicant showing control of a private key that corresponds to a public key placed in a DNS record associated with the domain being validated. The private key must be used to sign a message containing: a unique identifier for the CA, the domain name(s) in the certificate, a timestamp, and a hash of the public key in the certificate. This message may be hashed and then have the signature generated over the hash of this message. Obtaining such a signed message from a certificate applicant authorizes the CA specified in the message to sign a certificate for those domain names with the specified public key within 24h of the timestamp provided in the message. The CA MUST retrieve the public key or a hash of the public key corresponding to the private key used for signing the message via an authenticated DNS lookup using either authenticated channels Birge-Lee, et al. Expires 18 May 2025 [Page 6] Internet-Draft CAA Security Tag November 2024 to the relevant authoritative nameservers (e.g., DoH or DoT) or validation of a DNSSEC signature chain back to the ICANN root. After private key control is established, the CA MUST additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. In the event that *no "methods" property specified in the top-level property_list,* all methods specified in this document are acceptable as well as cryptographic domain validation defined in future RFCs. Future RFCs MAY specify additional methods for cryptographic domain validation so long as they satisfy the properties of cryptographic domain validation (i.e., robust against global man-in-the-middle adversaries). 6. Permissible Options The following options MAY used as parameters in the "options" or "options-critical" property in the top-level property_list. 1. *authenticated-policy-retrival:* This option signifies to a CA that it MUST retrive a domain's "security" tag and any associated domain-owner identity (e.g., identifiers used for known-account- specifier and private-key-control) using authenticated DNS lookups or other authenticated channels. If a CA finds this option as a parameter to the "options-critical" property and the "security" tag was not retrieved using authenticated DNS lookups, the CA MUST NOT issues a certificate for that domain. Additionally, a CA MAY choose to honor its own non-standardized options that do not need to be supported by other CAs or the IETF. These options MUST be prefixed with "-<ca_name>-" where ca_name is the name of the CA that initially developed the option. 7. Applicability "security" CAA tags can be used on domains that are contained in both domain validation certificates (where only the domain name in a certificate is validated) and extended or organization validated certificates (where information like organization identity as well as domain name is validated). Cryptographic Domain Validation only hardens the security of the validation of domain names, not broader identities (e.g., organization names). The use of cryptographic domain validation in an OV or EV certificate only improves the validation of the domain name(s) contained in the certificate (in the common name or subject-alternate names fields) and does not impact the validation of other forms of identity contained in the certificate. Use of cryptographic domain validation in a DV Birge-Lee, et al. Expires 18 May 2025 [Page 7] Internet-Draft CAA Security Tag November 2024 certificate does not imply validation of any identity beyond the domain name(s) in the certificate. 8. Single "security" Tag for Each Domain A single domain CANNOT have multiple "security" tags specified. A domain's entire cryptographic domain validation policy MUST be encoded into a single "security" tag. If a CA finds a domain that has multiple "security" CAA tags at the same FQDN, the CA MUST block issuance. 9. CAA "security" Tag Protection A "security" CAA tag SHOULD be protected with a valid DNSSEC signature chain going back to the ICANN DNSSEC root or hosted on authoritative DNS servers that CAs have authenticated communication channels with. Any "security" CAA record not protected by such a signature MAY not benefit from the security properties outlined in this document. If it is not possible to have a DNSSEC signature chain back to the ICANN root, "security" CAA records SHOULD alternately be hosted in an authoritative DNS resolver that supports recursive-to-authoritative DNS over TLS or DNS over HTTPS. CAs SHOULD also require recursive-to-authoritative DNS over TLS or DNS over HTTPS communication (and not permit standard unencrypted DNS connections) for DNS providers that host "security" CAA records. This prevents downgrade attacks where an adversary attempts to interfere with the establishment of a DNS over TLS or DNS over HTTPS encrypted channel and cause a fallback to unencrypted DNS over UDP/ TCP. Serving "security" CAA records over authenticated DNS channels or using authenticated DNS records (i.e., DNSSEC) is critical to the effectiveness of the records because a "security" CAA record not protected by authenticated DNS may be suppressed by an adversary that can manipulate DNS responses. This could potentially allow the adversary to downgrade validation to use a low-security method and undermine the security properties of the "security" tag. 10. Security Considerations Many of the security considerations regarding "security" CAA records are inherited from those of CAA records more generally. Because "security" CAA records do not introduce any new methods for validating domain ownership, they do not increase the attack surface of fraudulent validations. "security" CAA records reduce the attack surface of fraudulent validations by limiting which validation methods may be used and thus eliminating the risk posed by less- secure validation methods. Particularly, domains without a Birge-Lee, et al. Expires 18 May 2025 [Page 8] Internet-Draft CAA Security Tag November 2024 "security" CAA record are often highly vulnerable to man-in-the- middle adversaries that can intercept communications from a CA to the victim's domain. This record significantly reduces this attack surface. As with any restriction on certificate issuance, this introduces the potential for a Denial of Service attack (or DoS attack). There are two potential approaches to launching a DoS attack via "security" CAA records. The first is to attack a domain and spoof the existence of a "security" CAA record in order to prevent the domain owner from renewing his or her certificate (presuming the domain under attack was not using a validation method compliant with the "security" CAA record). This attack vector is not novel to "security" CAA records and is enabled solely by following RFC 6844 alone. Per RFC 6844, the presence of any not-understood CAA record with the critical flag prevents issuance. Thus, the adoption of "security" CAA records does not increase the attack surface for this form of DoS attack as a gibberish CAA record with the critical flag set could enable this type of attack as well. A second approach to a DoS attack enabled by "security" CAA records is to target a domain already using a "security" CAA record and interfere with all of the permitted validation methods with the idea that the presence of the "security" CAA will prevent the domain from falling back on alternative validation methods. This attack vector is mitigated by the diversity of different methods available to domain owners for validating domain ownership using "security" CAA records. A domain owner may use an alternate method to satisfy the "security" CAA record. In the event that a domain owner truly cannot satisfy any cryptographic domain validation method, the domain owner can still mitigate this attack by removing the "security" CAA record, obtaining a certificate, and then reinstating the "security" CAA record once the attack is over. As with all CAA records, CAs should not cache stale CAA record lookups that block issuance and should instead recheck the CAA record set when a new issuance request is received. 11. IANA Considerations This document has no IANA actions. 12. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/rfc/rfc2119>. Birge-Lee, et al. Expires 18 May 2025 [Page 9] Internet-Draft CAA Security Tag November 2024 [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/rfc/rfc8174>. Acknowledgments TODO acknowledge. Authors' Addresses Henry Birge-Lee Princeton University Email: [email protected] Grace Cimaszewski Princeton University Email: [email protected] Cyrill E. Krähenbühl Princeton University Email: [email protected] Liang Wang Princeton University Email: [email protected] Aaron Gable ISRG Email: [email protected] Prateek Mittal Princeton University Email: [email protected] Birge-Lee, et al. Expires 18 May 2025 [Page 10]