<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.5 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc docName="draft-hoffman-andrews-caa-simplification-02" category="std" obsoletes="RFC 6844">

  <front>
    <title abbrev="CAA">DNS Certification Authority Authorization (CAA) Resource Record</title>

    <author initials="P." surname="Hallam-Baker" fullname="Phillip Hallam-Baker">
      <organization>Comodo Group, Inc</organization>
      <address>
        <email>philliph@comodo.com</email>
      </address>
    </author>
    <author initials="R." surname="Stradling" fullname="Rob Stradling">
      <organization>Comodo Group, Inc</organization>
      <address>
        <email>rob.stradling@comodo.com</email>
      </address>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization>Let's Encrypt</organization>
      <address>
        <email>jsha@letsencrypt.org</email>
      </address>
    </author>

    <date year="2017" month="October" day="04"/>

    
    
    

    <abstract>


<t>The Certification Authority Authorization (CAA) DNS Resource Record
allows a DNS domain name holder to specify one or more Certification
Authorities (CAs) authorized to issue certificates for that domain.
CAA Resource Records allow a public Certification Authority to
implement additional controls to reduce the risk of unintended
certificate mis-issue.  This document defines the syntax of the CAA
record and rules for processing CAA records by certificate issuers.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The Certification Authority Authorization (CAA) DNS Resource Record
allows a DNS domain name holder to specify the Certification
Authorities (CAs) authorized to issue certificates for that domain.
Publication of CAA Resource Records allows a public Certification
Authority to implement additional controls to reduce the risk of
unintended certificate mis-issue.</t>

<t>Like the TLSA record defined in DNS-Based Authentication of Named
Entities (DANE) <xref target="RFC6698"/>, CAA records are used as a part of a
mechanism for checking PKIX certificate data.  The distinction
between the two specifications is that CAA records specify an
authorization control to be performed by a certificate issuer before
issue of a certificate and TLSA records specify a verification
control to be performed by a relying party after the certificate is
issued.</t>

<t>Conformance with a published CAA record is a necessary but not
sufficient condition for issuance of a certificate.  Before issuing a
certificate, a PKIX CA is required to validate the request according
to the policies set out in its Certificate Policy.  In the case of a
public CA that validates certificate requests as a third party, the
certificate will typically be issued under a public trust anchor
certificate embedded in one or more relevant Relying Applications.</t>

<t>Criteria for inclusion of embedded trust anchor certificates in
applications are outside the scope of this document.  Typically, such
criteria require the CA to publish a Certificate Practices Statement
(CPS) that specifies how the requirements of the Certificate Policy
(CP) are achieved.  It is also common for a CA to engage an
independent third-party auditor to prepare an annual audit statement
of its performance against its CPS.</t>

<t>A set of CAA records describes only current grants of authority to
issue certificates for the corresponding DNS domain.  Since a
certificate is typically valid for at least a year, it is possible
that a certificate that is not conformant with the CAA records
currently published was conformant with the CAA records published at
the time that the certificate was issued.  Relying Applications MUST
NOT use CAA records as part of certificate validation.</t>

<t>CAA records MAY be used by Certificate Evaluators as a possible
indicator of a security policy violation.  Such use SHOULD take
account of the possibility that published CAA records changed between
the time a certificate was issued and the time at which the
certificate was observed by the Certificate Evaluator.</t>

</section>
<section anchor="definitions" title="Definitions">

<section anchor="requirements-language" title="Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="defined-terms" title="Defined Terms">

<t>The following terms are used in this document:</t>

<t>Authorization Entry:  An authorization assertion that grants or
   denies a specific set of permissions to a specific group of
   entities.</t>

<t>Certificate:  An X.509 Certificate, as specified in <xref target="RFC5280"/>.</t>

<t>Certificate Evaluator:  A party other than a relying party that
   evaluates the trustworthiness of certificates issued by
   Certification Authorities.</t>

<t>Certification Authority (CA):  An issuer that issues certificates in
   accordance with a specified Certificate Policy.</t>

<t>Certificate Policy (CP):  Specifies the criteria that a Certification
   Authority undertakes to meet in its issue of certificates.  See
   <xref target="RFC3647"/>.</t>

<t>Certification Practices Statement (CPS):  Specifies the means by
   which the criteria of the Certificate Policy are met.  In most
   cases, this will be the document against which the operations of
   the Certification Authority are audited.  See <xref target="RFC3647"/>.</t>

<t>Domain:  A DNS Domain Name.</t>

<t>Domain Name:  A DNS Domain Name as specified in [STD13].</t>

<t>Domain Name System (DNS):  The Internet naming system specified in
   [STD13].</t>

<t>DNS Security (DNSSEC):  Extensions to the DNS that provide
   authentication services as specified in RFC4033, RFC4034,
   RFC4035, RFC5155, and revisions.</t>

<t>Issuer:  An entity that issues certificates.  See <xref target="RFC5280"/>.</t>

<t>Property:  The tag-value portion of a CAA Resource Record.</t>

<t>Property Tag:  The tag portion of a CAA Resource Record.</t>

<t>Property Value:  The value portion of a CAA Resource Record.</t>

<t>Public Key Infrastructure X.509 (PKIX):  Standards and specifications
   issued by the IETF that apply the [X.509] certificate standards
   specified by the ITU to Internet applications as specified in
   <xref target="RFC5280"/> and related documents.</t>

<t>Resource Record (RR):  A particular entry in the DNS including the
   owner name, class, type, time to live, and data, as defined in
   [STD13] and <xref target="RFC2181"/>.</t>

<t>Resource Record Set (RRSet):  A set of Resource Records or a
   particular owner name, class, and type.  The time to live on all
   RRs with an RRSet is always the same, but the data may be
   different among RRs in the RRSet.</t>

<t>Relying Party:  A party that makes use of an application whose
   operation depends on use of a certificate for making a security
   decision.  See <xref target="RFC5280"/>.</t>

<t>Relying Application:  An application whose operation depends on use
   of a certificate for making a security decision.</t>

</section>
</section>
<section anchor="the-caa-rr-type" title="The CAA RR Type">

<t>A CAA RR consists of a flags byte and a tag-value pair referred to as
a property.  Multiple properties MAY be associated with the same
domain name by publishing multiple CAA RRs at that domain name.  The
following flag is defined:</t>

<t>Issuer Critical:  If set to ‘1’, indicates that the corresponding
   property tag MUST be understood if the semantics of the CAA record
   are to be correctly interpreted by an issuer.</t>

<t>Issuers MUST NOT issue certificates for a domain if the relevant
   CAA Resource Record set contains unknown property tags that have
   the Critical bit set.</t>

<t>The following property tags are defined:</t>

<t>issue &lt;Issuer Domain Name&gt; [; &lt;name&gt;=&lt;value&gt; ]* :  The issue property
   entry authorizes the holder of the domain name &lt;Issuer Domain
   Name&gt; or a party acting under the explicit authority of the holder
   of that domain name to issue certificates for the domain in which
   the property is published.</t>

<t>issuewild &lt;Issuer Domain Name&gt; [; &lt;name&gt;=&lt;value&gt; ]* :  The issuewild
   property entry authorizes the holder of the domain name &lt;Issuer
   Domain Name&gt; or a party acting under the explicit authority of the
   holder of that domain name to issue wildcard certificates for the
   domain in which the property is published.</t>

<t>iodef &lt;URL&gt; :  Specifies a URL to which an issuer MAY report
   certificate issue requests that are inconsistent with the issuer’s
   Certification Practices or Certificate Policy, or that a
   Certificate Evaluator may use to report observation of a possible
   policy violation.  The Incident Object Description Exchange Format
   (IODEF) format is used <xref target="RFC5070"/>.</t>

<t>The following example is a DNS zone file (see <xref target="RFC1035"/>) that informs
CAs that certificates are not to be issued except by the holder of
the domain name ‘ca.example.net’ or an authorized agent thereof.
This policy applies to all subordinate domains under example.com.</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net"
]]></artwork></figure>

<t>If the domain name holder specifies one or more iodef properties, a
certificate issuer MAY report invalid certificate requests to that
address.  In the following example, the domain name holder specifies
that reports may be made by means of email with the IODEF data as an
attachment, a Web service <xref target="RFC6546"/>, or both:</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net"
.       CAA 0 iodef "mailto:security@example.com"
.       CAA 0 iodef "http://iodef.example.com/"
]]></artwork></figure>

<t>A certificate issuer MAY specify additional parameters that allow
customers to specify additional parameters governing certificate
issuance.  This might be the Certificate Policy under which the
certificate is to be issued, the authentication process to be used
might be specified, or an account number specified by the CA to
enable these parameters to be retrieved.</t>

<t>For example, the CA ‘ca.example.net’ has requested its customer
‘example.com’ to specify the CA’s account number ‘230123’ in each of
the customer’s CAA records.</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net; account=230123"
]]></artwork></figure>

<t>The syntax of additional parameters is a sequence of name-value pairs
as defined in Section 5.2.  The semantics of such parameters is left
to site policy and is outside the scope of this document.</t>

<t>The critical flag is intended to permit future versions of CAA to
introduce new semantics that MUST be understood for correct
processing of the record, preventing conforming CAs that do not
recognize the new semantics from issuing certificates for the
indicated domains.</t>

<t>In the following example, the property ‘tbs’ is flagged as critical.
Neither the example.net CA nor any other issuer is authorized to
issue under either policy unless the processing rules for the ‘tbs’
property tag are understood.</t>

<figure><artwork><![CDATA[
$ORIGIN example.com
.       CAA 0 issue "ca.example.net; policy=ev"
.       CAA 128 tbs "Unknown"
]]></artwork></figure>

<t>Note that the above restrictions only apply at certificate issue.
Since the validity of an end entity certificate is typically a year
or more, it is quite possible that the CAA records published at a
domain will change between the time a certificate was issued and
validation by a relying party.</t>

</section>
<section anchor="certification-authority-processing" title="Certification Authority Processing">

<t>Before issuing a certificate, a compliant CA MUST check for
publication of a relevant CAA Resource Record set.  If such a record
set exists, a CA MUST NOT issue a certificate unless the CA
determines that either (1) the certificate request is consistent with
the applicable CAA Resource Record set or (2) an exception specified
in the relevant Certificate Policy or Certification Practices
Statement applies.</t>

<t>A certificate request MAY specify more than one domain name and MAY
specify wildcard domains.  Issuers MUST verify authorization for all
the domains and wildcard domains specified in the request.</t>

<t>The search for a CAA record climbs the DNS name tree from the
specified label up to but not including the DNS root ‘.’
until CAA records are found.</t>

<t>Given a request for a specific domain name X, or a request for a wildcard domain
name *.X, the relevant record set RelevantCAASet(X) is determined as follows:</t>

<t>Let CAA(X) be the record set returned by performing a CAA record query for the
domain name X, according to the lookup algorithm specified in RFC 1034 section
4.3.2 (in particular chasing aliases). Let Parent(X) be the domain name
produced by removing the leftmost label of X.</t>

<figure><artwork><![CDATA[
RelevantCAASet(domain):
  for domain is not ".":
    if CAA(domain) is not Empty:
      return CAA(domain)
    domain = Parent(domain)
  return Empty
]]></artwork></figure>

<t>For example, processing CAA for the domain name “X.Y.Z” where there are
no CAA records at any level in the tree RelevantCAASet would have the
following steps:</t>

<figure><artwork><![CDATA[
CAA("X.Y.Z.") = Empty; domain = Parent("X.Y.Z.") = "Y.Z."
CAA("Y.Z.")   = Empty; domain = Parent("Y.Z.")   = "Z."
CAA("Z.")     = Empty; domain = Parent("Z.")     = "."
return Empty
]]></artwork></figure>

<t>Processing CAA for the domain name “A.B.C” where there is a CAA record
“issue example.com” at “B.C” would terminate early upon finding the CAA
record:</t>

<figure><artwork><![CDATA[
CAA("A.B.C.") = Empty; domain = Parent("A.B.C.") = "B.C."
CAA("B.C.")   = "issue example.com"
return "issue example.com"
]]></artwork></figure>

<section anchor="use-of-dns-security" title="Use of DNS Security">

<t>Use of DNSSEC to authenticate CAA RRs is strongly RECOMMENDED but not
required.  An issuer MUST NOT issue certificates if doing so would
conflict with the relevant CAA Resource Record set, irrespective of
whether the corresponding DNS records are signed.</t>

<t>DNSSEC provides a proof of non-existence for both DNS domains and RR
set within domains.  DNSSEC verification thus enables an issuer to
determine if the answer to a CAA record query is empty because the RR
set is empty or if it is non-empty but the response has been
suppressed.</t>

<t>Use of DNSSEC allows an issuer to acquire and archive a proof that
they were authorized to issue certificates for the domain.
Verification of such archives MAY be an audit requirement to verify
CAA record processing compliance.  Publication of such archives MAY
be a transparency requirement to verify CAA record processing
compliance.</t>

</section>
</section>
<section anchor="mechanism" title="Mechanism">

<section anchor="syntax" title="Syntax">

<t>A CAA RR contains a single property entry consisting of a tag-value
pair.  Each tag represents a property of the CAA record.  The value
of a CAA property is that specified in the corresponding value field.</t>

<t>A domain name MAY have multiple CAA RRs associated with it and a
given property MAY be specified more than once.</t>

<t>The CAA data field contains one property entry.  A property entry
consists of the following data fields:</t>

<figure><artwork><![CDATA[
+0-1-2-3-4-5-6-7-|0-1-2-3-4-5-6-7-|
| Flags          | Tag Length = n |
+----------------|----------------+...+---------------+
| Tag char 0     | Tag char 1     |...| Tag char n-1  |
+----------------|----------------+...+---------------+
+----------------|----------------+.....+----------------+
| Value byte 0   | Value byte 1   |.....| Value byte m-1 |
+----------------|----------------+.....+----------------+
]]></artwork></figure>

<t>Where n is the length specified in the Tag length field and m is the
remaining octets in the Value field (m = d - n - 2) where d is the
length of the RDATA section.</t>

<t>The data fields are defined as follows:</t>

<t>Flags:  One octet containing the following fields:</t>

<t>Bit 0, Issuer Critical Flag:  If the value is set to ‘1’, the
critical flag is asserted and the property MUST be understood
if the CAA record is to be correctly processed by a certificate
issuer.</t>

<t>A Certification Authority MUST NOT issue certificates for any
Domain that contains a CAA critical property for an unknown or
unsupported property tag that for which the issuer critical
flag is set.</t>

<t>Note that according to the conventions set out in <xref target="RFC1035"/>, bit 0
is the Most Significant Bit and bit 7 is the Least Significant
Bit. Thus, the Flags value 1 means that bit 7 is set while a value
of 128 means that bit 0 is set according to this convention.</t>

<t>All other bit positions are reserved for future use.</t>

<t>To ensure compatibility with future extensions to CAA, DNS records
compliant with this version of the CAA specification MUST clear
(set to “0”) all reserved flags bits.  Applications that interpret
CAA records MUST ignore the value of all reserved flag bits.</t>

<t>Tag Length:  A single octet containing an unsigned integer specifying
the tag length in octets.  The tag length MUST be at least 1 and
SHOULD be no more than 15.</t>

<t>Tag:  The property identifier, a sequence of US-ASCII characters.</t>

<t>Tag values MAY contain US-ASCII characters ‘a’ through ‘z’, ‘A’
through ‘Z’, and the numbers 0 through 9.  Tag values SHOULD NOT
contain any other characters.  Matching of tag values is case
insensitive.</t>

<t>Tag values submitted for registration by IANA MUST NOT contain any
characters other than the (lowercase) US-ASCII characters ‘a’
through ‘z’ and the numbers 0 through 9.</t>

<t>Value:  A sequence of octets representing the property value.
Property values are encoded as binary values and MAY employ sub-
formats.</t>

<t>The length of the value field is specified implicitly as the
remaining length of the enclosing Resource Record data field.</t>

<section anchor="canonical-presentation-format" title="Canonical Presentation Format">

<t>The canonical presentation format of the CAA record is:</t>

<t>CAA &lt;flags&gt; &lt;tag&gt; &lt;value&gt;</t>

<t>Where:</t>

<t>Flags:  Is an unsigned integer between 0 and 255.</t>

<t>Tag:  Is a non-zero sequence of US-ASCII letters and numbers in lower
   case.</t>

<t>Value:  Is the &lt;character-string&gt; encoding of the value field as
   specified in <xref target="RFC1035"/>, Section 5.1.</t>

</section>
</section>
<section anchor="caa-issue-property" title="CAA issue Property">

<t>The issue property tag is used to request that certificate issuers
perform CAA issue restriction processing for the domain and to grant
authorization to specific certificate issuers.</t>

<t>The CAA issue property value has the following sub-syntax (specified
in ABNF as per <xref target="RFC5234"/>).</t>

<t>issuevalue  = space [domain] space [”;” *(space parameter) space]</t>

<t>domain = label *(“.” label)
label = (ALPHA / DIGIT) *( *(“-“) (ALPHA / DIGIT))</t>

<t>space = *(SP / HTAB)</t>

<t>parameter =  tag “=” value</t>

<t>tag = 1*(ALPHA / DIGIT)</t>

<t>value = *VCHAR</t>

<t>For consistency with other aspects of DNS administration, domain name
values are specified in letter-digit-hyphen Label (LDH-Label) form.</t>

<t>A CAA record with an issue parameter tag that does not specify a
domain name is a request that certificate issuers perform CAA issue
restriction processing for the corresponding domain without granting
authorization to any certificate issuer.</t>

<t>This form of issue restriction would be appropriate to specify that
no certificates are to be issued for the domain in question.</t>

<t>For example, the following CAA record set requests that no
certificates be issued for the domain ‘nocerts.example.com’ by any
certificate issuer.</t>

<t>nocerts.example.com       CAA 0 issue “;”</t>

<t>A CAA record with an issue parameter tag that specifies a domain name
is a request that certificate issuers perform CAA issue restriction
processing for the corresponding domain and grants authorization to
the certificate issuer specified by the domain name.</t>

<t>For example, the following CAA record set requests that no
certificates be issued for the domain ‘certs.example.com’ by any
certificate issuer other than the example.net certificate issuer.</t>

<t>certs.example.com       CAA 0 issue “example.net”</t>

<t>CAA authorizations are additive; thus, the result of specifying both
the empty issuer and a specified issuer is the same as specifying
just the specified issuer alone.</t>

<t>An issuer MAY choose to specify issuer-parameters that further
constrain the issue of certificates by that issuer, for example,
specifying that certificates are to be subject to specific validation
polices, billed to certain accounts, or issued under specific trust
anchors.</t>

<t>The semantics of issuer-parameters are determined by the issuer
alone.</t>

</section>
<section anchor="caa-issuewild-property" title="CAA issuewild Property">

<t>The issuewild property has the same syntax and semantics as the issue
property except that issuewild properties only grant authorization to
issue certificates that specify a wildcard domain and issuewild
properties take precedence over issue properties when specified.
Specifically:</t>

<t>issuewild properties MUST be ignored when processing a request for
a domain that is not a wildcard domain.</t>

<t>If at least one issuewild property is specified in the relevant
CAA record set, all issue properties MUST be ignored when
processing a request for a domain that is a wildcard domain.</t>

</section>
<section anchor="caa-iodef-property" title="CAA iodef Property">

<t>The iodef property specifies a means of reporting certificate issue
requests or cases of certificate issue for the corresponding domain
that violate the security policy of the issuer or the domain name
holder.</t>

<t>The Incident Object Description Exchange Format (IODEF) <xref target="RFC5070"/> is
used to present the incident report in machine-readable form.</t>

<t>The iodef property takes a URL as its parameter.  The URL scheme type
determines the method used for reporting:</t>

<t>mailto:  The IODEF incident report is reported as a MIME email
   attachment to an SMTP email that is submitted to the mail address
   specified.  The mail message sent SHOULD contain a brief text
   message to alert the recipient to the nature of the attachment.</t>

<t>http or https:  The IODEF report is submitted as a Web service
   request to the HTTP address specified using the protocol specified
   in <xref target="RFC6546"/>.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>CAA records assert a security policy that the holder of a domain name
wishes to be observed by certificate issuers.  The effectiveness of
CAA records as an access control mechanism is thus dependent on
observance of CAA constraints by issuers.</t>

<t>The objective of the CAA record properties described in this document
is to reduce the risk of certificate mis-issue rather than avoid
reliance on a certificate that has been mis-issued.  DANE <xref target="RFC6698"/>
describes a mechanism for avoiding reliance on mis-issued
certificates.</t>

<section anchor="non-compliance-by-certification-authority" title="Non-Compliance by Certification Authority">

<t>CAA records offer CAs a cost-effective means of mitigating the risk
of certificate mis-issue: the cost of implementing CAA checks is very
small and the potential costs of a mis-issue event include the
removal of an embedded trust anchor.</t>

</section>
<section anchor="mis-issue-by-authorized-certification-authority" title="Mis-Issue by Authorized Certification Authority">

<t>Use of CAA records does not prevent mis-issue by an authorized
Certification Authority, i.e., a CA that is authorized to issue
certificates for the domain in question by CAA records.</t>

<t>Domain name holders SHOULD verify that the CAs they authorize to
issue certificates for their domains employ appropriate controls to
ensure that certificates are issued only to authorized parties within
their organization.</t>

<t>Such controls are most appropriately determined by the domain name
holder and the authorized CA(s) directly and are thus out of scope of
this document.</t>

</section>
<section anchor="suppression-or-spoofing-of-caa-records" title="Suppression or Spoofing of CAA Records">

<t>Suppression of the CAA record or insertion of a bogus CAA record
could enable an attacker to obtain a certificate from an issuer that
was not authorized to issue for that domain name.</t>

<t>Where possible, issuers SHOULD perform DNSSEC validation to detect
missing or modified CAA record sets.</t>

<t>In cases where DNSSEC is not deployed in a corresponding domain, an
issuer SHOULD attempt to mitigate this risk by employing appropriate
DNS security controls.  For example, all portions of the DNS lookup
process SHOULD be performed against the authoritative name server.
Data cached by third parties MUST NOT be relied on but MAY be used to
support additional anti-spoofing or anti-suppression controls.</t>

</section>
<section anchor="denial-of-service" title="Denial of Service">

<t>Introduction of a malformed or malicious CAA RR could in theory
enable a Denial-of-Service (DoS) attack.</t>

<t>This specific threat is not considered to add significantly to the
risk of running an insecure DNS service.</t>

<t>An attacker could, in principle, perform a DoS attack against an
issuer by requesting a certificate with a maliciously long DNS name.
In practice, the DNS protocol imposes a maximum name length and CAA
processing does not exacerbate the existing need to mitigate DoS
attacks to any meaningful degree.</t>

</section>
<section anchor="abuse-of-the-critical-flag" title="Abuse of the Critical Flag">

<t>A Certification Authority could make use of the critical flag to
trick customers into publishing records that prevent competing
Certification Authorities from issuing certificates even though the
customer intends to authorize multiple providers.</t>

<t>In practice, such an attack would be of minimal effect since any
competent competitor that found itself unable to issue certificates
due to lack of support for a property marked critical SHOULD
investigate the cause and report the reason to the customer.  The
customer will thus discover that they had been deceived.</t>

</section>
</section>
<section anchor="deployment-considerations" title="Deployment Considerations">

<section anchor="blocked-queries-or-responses" title="Blocked Queries or Responses">

<t>Some middleboxes, in particular anti-DDoS appliances, may be configured to
drop DNS packets of unknown types, or may start dropping such packets when
they consider themselves under attack. This generally manifests as a timed-out
DNS query, or a SERVFAIL at a local recursive resolver.</t>

<t>For deployability of CAA and future DNS record types, middleboxes SHOULD block
DNS packets by volume and size rather than by query type.</t>

</section>
<section anchor="rejected-queries-and-malformed-responses" title="Rejected Queries and Malformed Responses">

<t>Some authoritative nameservers respond with REJECTED or NOTIMP when queried
for a resource record type they do not recognize. At least one authoritative
resolver produces a malformed response (with the QR bit set to 0) when queried
for unknown resource record types.  Per RFC 1034, the correct response for
unknown resource record types is NOERROR.</t>

</section>
<section anchor="bogus-dnssec-responses" title="Bogus DNSSEC Responses">

<t>CAA queries are unusual in DNS, because a signed, empty response is different
from a bogus response. A signed, empty response indicates that there is
definitely no CAA policy set at a given label. A bogus response may mean either
a misconfigured zone, or an attacker tampering with records. DNSSEC
implementations may have bugs with signatures on empty responses that go
unnoticed, because for more common resource record types like A and AAAA, the
difference to an end user between empty and bogus is irrelevant; they both mean
a site is unavailable.</t>

<t>In particular, at least two authoritative resolvers that implement live signing
had bugs when returning empty resource record sets for DNSSEC-signed zones, in
combination with mixed-case queries. Mixed-case queries, also known as DNS 0x20,
are used by some recursive resolvers to increase resilience against DNS
poisoning attacks. DNSSEC-signing authoritative resolvers are expected to copy
the same capitalization from the query into their ANSWER section, but sign the
response as if they had use all lowercase. In particular, PowerDNS versions
prior to 4.0.4 had this bug.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="registration-of-the-caa-resource-record-type" title="Registration of the CAA Resource Record Type">

<t>IANA has assigned Resource Record Type 257 for the CAA Resource
Record Type and added the line depicted below to the registry named
“Resource Record (RR) TYPEs” and QTYPEs as defined in BCP 42
<xref target="RFC6195"/> and located at
http://www.iana.org/assignments/dns-parameters.</t>

<texttable>
      <ttcol align='left'>RR Name</ttcol>
      <ttcol align='left'>Value and meaning</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>CAA</c>
      <c>257 Certification Authority Restriction</c>
      <c><xref target="RFC6844"/></c>
</texttable>

</section>
<section anchor="certification-authority-restriction-properties" title="Certification Authority Restriction Properties">

<t>IANA has created the “Certification Authority Restriction Properties”
registry with the following initial values:</t>

<texttable>
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>issue</c>
      <c>Authorization Entry by Domain</c>
      <c><xref target="RFC6844"/></c>
      <c>issuewild</c>
      <c>Authorization Entry by Wildcard Domain</c>
      <c><xref target="RFC6844"/></c>
      <c>iodef</c>
      <c>Report incident by IODEF report</c>
      <c><xref target="RFC6844"/></c>
      <c>auth</c>
      <c>Reserved</c>
      <c>[HB2011]</c>
      <c>path</c>
      <c>Reserved</c>
      <c>[HB2011]</c>
      <c>policy</c>
      <c>Reserved</c>
      <c>[HB2011]</c>
</texttable>

<t>Although [HB2011] has expired, deployed clients implement the CAA
properties specified in the document and reuse of these property tags
for a different purpose could cause unexpected behavior.</t>

<t>Addition of tag identifiers requires a public specification and
Expert Review as set out in <xref target="RFC6195"/>, Section 3.1.1.</t>

<t>The tag space is designed to be sufficiently large that exhausting
the possible tag space need not be a concern.  The scope of Expert
Review SHOULD be limited to the question of whether the specification
provided is sufficiently clear to permit implementation and to avoid
unnecessary duplication of functionality.</t>

</section>
<section anchor="certification-authority-restriction-flags" title="Certification Authority Restriction Flags">

<t>IANA has created the “Certification Authority Restriction Flags”
registry with the following initial values:</t>

<texttable>
      <ttcol align='left'>Flag</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Issuer Critical Flag</c>
      <c><xref target="RFC6844"/></c>
      <c>1-7</c>
      <c>Reserved&gt;</c>
      <c><xref target="RFC6844"/></c>
</texttable>

<t>Assignment of new flags follows the RFC Required policy set out in
<xref target="RFC5226"/>, Section 4.1.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The authors would like to thank the following people who contributed
to the design and documentation of this work item: Chris Evans,
Stephen Farrell, Jeff Hodges, Paul Hoffman, Stephen Kent, Adam
Langley, Ben Laurie, James Manager, Chris Palmer, Scott Schmit, Sean
Turner, and Ben Wilson.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC6698" target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<date year='2012' month='August' />
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC5280" target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference  anchor="RFC3647" target='https://www.rfc-editor.org/info/rfc3647'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
<author initials='S.' surname='Chokhani' fullname='S. Chokhani'><organization /></author>
<author initials='W.' surname='Ford' fullname='W. Ford'><organization /></author>
<author initials='R.' surname='Sabett' fullname='R. Sabett'><organization /></author>
<author initials='C.' surname='Merrill' fullname='C. Merrill'><organization /></author>
<author initials='S.' surname='Wu' fullname='S. Wu'><organization /></author>
<date year='2003' month='November' />
<abstract><t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates.  In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement.  This document supersedes RFC 2527.</t></abstract>
</front>
<seriesInfo name='RFC' value='3647'/>
<seriesInfo name='DOI' value='10.17487/RFC3647'/>
</reference>



<reference  anchor="RFC2181" target='https://www.rfc-editor.org/info/rfc2181'>
<front>
<title>Clarifications to the DNS Specification</title>
<author initials='R.' surname='Elz' fullname='R. Elz'><organization /></author>
<author initials='R.' surname='Bush' fullname='R. Bush'><organization /></author>
<date year='1997' month='July' />
<abstract><t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2181'/>
<seriesInfo name='DOI' value='10.17487/RFC2181'/>
</reference>



<reference  anchor="RFC5070" target='https://www.rfc-editor.org/info/rfc5070'>
<front>
<title>The Incident Object Description Exchange Format</title>
<author initials='R.' surname='Danyliw' fullname='R. Danyliw'><organization /></author>
<author initials='J.' surname='Meijer' fullname='J. Meijer'><organization /></author>
<author initials='Y.' surname='Demchenko' fullname='Y. Demchenko'><organization /></author>
<date year='2007' month='December' />
<abstract><t>The Incident Object Description Exchange Format (IODEF) defines a data representation that provides a framework for sharing information commonly exchanged by Computer Security Incident Response Teams (CSIRTs) about computer security incidents.  This document describes the information model for the IODEF and provides an associated data model specified with XML Schema.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5070'/>
<seriesInfo name='DOI' value='10.17487/RFC5070'/>
</reference>



<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference  anchor="RFC6546" target='https://www.rfc-editor.org/info/rfc6546'>
<front>
<title>Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS</title>
<author initials='B.' surname='Trammell' fullname='B. Trammell'><organization /></author>
<date year='2012' month='April' />
<abstract><t>The Incident Object Description Exchange Format (IODEF) defines a common XML format for document exchange, and Real-time Inter-network Defense (RID) defines extensions to IODEF intended for the cooperative handling of security incidents within consortia of network operators and enterprises.  This document specifies an application-layer protocol for RID based upon the passing of RID messages over HTTP/TLS.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6546'/>
<seriesInfo name='DOI' value='10.17487/RFC6546'/>
</reference>



<reference  anchor="RFC5234" target='https://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker' role='editor'><organization /></author>
<author initials='P.' surname='Overell' fullname='P. Overell'><organization /></author>
<date year='2008' month='January' />
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference  anchor="RFC6195" target='https://www.rfc-editor.org/info/rfc6195'>
<front>
<title>Domain Name System (DNS) IANA Considerations</title>
<author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organization /></author>
<date year='2011' month='March' />
<abstract><t>This document specifies Internet Assigned Number Authority (IANA) parameter assignment considerations for the allocation of Domain Name System (DNS) resource record types, CLASSes, operation codes, error codes, DNS protocol message header bits, and AFSDB resource record subtypes.  This memo documents an Internet Best  Current Practice.</t></abstract>
</front>
<seriesInfo name='RFC' value='6195'/>
<seriesInfo name='DOI' value='10.17487/RFC6195'/>
</reference>



<reference  anchor="RFC6844" target='https://www.rfc-editor.org/info/rfc6844'>
<front>
<title>DNS Certification Authority Authorization (CAA) Resource Record</title>
<author initials='P.' surname='Hallam-Baker' fullname='P. Hallam-Baker'><organization /></author>
<author initials='R.' surname='Stradling' fullname='R. Stradling'><organization /></author>
<date year='2013' month='January' />
<abstract><t>The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain. CAA Resource Records allow a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue.  This document defines the syntax of the CAA record and rules for processing CAA records by certificate issuers. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6844'/>
<seriesInfo name='DOI' value='10.17487/RFC6844'/>
</reference>



<reference  anchor="RFC5226" target='https://www.rfc-editor.org/info/rfc5226'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author initials='T.' surname='Narten' fullname='T. Narten'><organization /></author>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='2008' month='May' />
<abstract><t>Many protocols make use of identifiers consisting of constants and other well-known values.  Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec).  To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority.  For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).</t><t>In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made.  If IANA is expected to play a role in the management of a namespace, IANA must be given clear and concise instructions describing that role.  This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.</t><t>This document obsoletes RFC 2434.  This document specifies an Internet Best  Current Practices for the Internet Community, and requests discussion and  suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='RFC' value='5226'/>
<seriesInfo name='DOI' value='10.17487/RFC5226'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

