<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birgelee-lamps-caa-security-00" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="CAA Security Tag">CAA Security Tag for Cryptographic Domain Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-birgelee-lamps-caa-security-00"/>
    <author fullname="Henry Birge-Lee">
      <organization>Princeton University</organization>
      <address>
        <email>birgelee@princeton.edu</email>
      </address>
    </author>
    <author fullname="Grace Cimaszewski">
      <organization>Princeton University</organization>
      <address>
        <email>gcimaszewski@princeton.edu</email>
      </address>
    </author>
    <author fullname="Cyrill E. Krähenbühl">
      <organization>Princeton University</organization>
      <address>
        <email>cyrill.k@princeton.edu</email>
      </address>
    </author>
    <author fullname="Liang Wang">
      <organization>Princeton University</organization>
      <address>
        <email>lw19@princeton.edu</email>
      </address>
    </author>
    <author fullname="Aaron Gable">
      <organization>ISRG</organization>
      <address>
        <email>aaron@letsencrypt.org</email>
      </address>
    </author>
    <author fullname="Prateek Mittal">
      <organization>Princeton University</organization>
      <address>
        <email>pmittal@princeton.edu</email>
      </address>
    </author>
    <date year="2024" month="November" day="14"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>PKI</keyword>
    <keyword>CAA</keyword>
    <abstract>
      <?line 56?>

<t>CAA "security" tags are a type of CAA record (defined in RFC 6844) with the critical flag set that specify that for a certificate to be issued, the issuance process must be conducted in a manner that is robust against global man-in-the-middle adversaries by leveraging authenticated communication between a CA and a domain. Cryptographic domain validation procedures are authenticated and resilient against attacks by both on-path and off-path network attackers which may be between the CA and the domain contained in the certificate. This document defines the syntax of "security" CAA records as well as acceptable means for validating domains in a cryptographic manner.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://birgelee.github.io/draft-caa-security-tag/draft-birgelee-lamps-caa-security.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birgelee-lamps-caa-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/birgelee/draft-caa-security-tag"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A "security" CAA record is compliant with RFC 6844 and puts restrictions on the circumstances under which a CA can sign a certificate for a given domain. A “security” CAA record on a domain implies that validation for this domain must be done in a manner that offers security against network adversaries even if an adversary is capable of intercepting and/or modifying communication between the CA and the domain being validated. Issuance of a certificate to a domain with a "security" CAA tag <bcp14>MUST</bcp14> follow one of the specified Cryptographic Domain Validation (CDV) methods outlined in this document or future extensions. CDV methods <bcp14>MUST</bcp14> rely on cryptographic protocols (like DNSSEC or DoH/DoT) that offer security properties even in the presence of man-in-the-middle adversaries that can intercept any communication which occurs over the public Internet.</t>
      <t>Not all CDV methods are in themselves compliant with the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. Any CDV method that does not additionally meet the CA/Browser Forum Baseline Requirements for TLS server certificate issuance must be used in conjunction with a method that satisfies CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. Such methods are indicated in their descriptions.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-caa-record-syntax">
      <name>Security CAA Record Syntax</name>
      <t>The flags field of the security tag <bcp14>MUST</bcp14> have the critical bit set in the flags byte of the CAA record.</t>
      <t>The "security" tag <bcp14>MUST</bcp14> have the tag field of the CAA record be the word "security".</t>
      <t>The value field of the "security" tag <bcp14>MUST</bcp14> be one of three values</t>
      <ol spacing="normal" type="1"><li>
          <t>an empty string.</t>
        </li>
        <li>
          <t>entirely whitespace.</t>
        </li>
        <li>
          <t>a property_list as defined in this document.</t>
        </li>
      </ol>
      <t>Values 1. and 2. <bcp14>MUST</bcp14> be treated identically as an empty value field.</t>
      <t>A property_list is defined by the following syntax</t>
      <t><tt>[whitespace]&lt;property&gt;[whitespace][,[whitespace]&lt;property&gt;[whitespace] ...]</tt></t>
      <t>A property is defined as</t>
      <t><tt>&lt;property_name&gt;[whitespace][(property_list)]</tt></t>
      <t>property_name is a name that identifies the property being specified. The name <bcp14>MUST</bcp14> consist only of lowercase letters (a-z), uppercase letters (A-Z), numbers (0-9), colin (:), underscore (_), and hyphen (-). Names are case sensitive.</t>
      <t>Properties can optionally have parameters specified in parenthesis. The parameteres of a property are a property_list. A property with no parameters <bcp14>MUST NOT</bcp14> be followed by parenthesis (i.e., property_name() is not a valid statement).</t>
      <t>The optional property_list specified in parenthesis after each property contains parameters associated with that property.</t>
      <t>A property_list can be arbitrarily long. Whitespace between properties is ignored. properties are comma-separated. property_lists <bcp14>MUST NOT</bcp14> be empty (i.e., property_lists must have at least one property). All properties specified in a property_list <bcp14>MUST</bcp14> be unique. A property_list <bcp14>MUST NOT</bcp14> have two of the same properties specified even if they contain different parameters.</t>
    </section>
    <section anchor="well-known-properties">
      <name>Well-known Properties</name>
      <t>The top-level property_list <bcp14>MAY</bcp14> contain the following properties.</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>methods</strong> If specified, this property <bcp14>MUST</bcp14> have parameters listing various cryptographic domain validation methods that can be used to validate that particular domain. A CA <bcp14>MUST</bcp14> only use one of the methods specified in the parameters value_list to perform cryptographic domain validation. If there is no method specified that the CA is capable of complying with, the CA <bcp14>MUST</bcp14> deny issuance.</t>
        </li>
        <li>
          <t><strong>options</strong> If specified, this property <bcp14>MUST</bcp14> have parameters listing various options. A CA <bcp14>SHOULD</bcp14> try to honor any option specified in this list. If a CA does not understand an option or does not have that option implemented the, CA <bcp14>MAY</bcp14> proceed with issuance.</t>
        </li>
        <li>
          <t><strong>options-critical</strong> If specified, this property <bcp14>MUST</bcp14> have parameters listing various options. To proceed with issuance, a CA <bcp14>MUST</bcp14> understand and implement all options specified in the options-critical parameter's property-list</t>
        </li>
      </ol>
      <t>The top-level property_list <bcp14>MAY</bcp14> contain additional properties and a CA <bcp14>MAY</bcp14> proceed with issuance even if it does not understand these additional properties. Subsequent RFCs <bcp14>MAY</bcp14> standardize these properties.</t>
    </section>
    <section anchor="permissible-methods">
      <name>Permissible Methods</name>
      <t>The following properties <bcp14>MAY</bcp14> be specified as parameters of the "methods" property. Each method specifies particular aspects of certificate issuance that <bcp14>MUST</bcp14> be satisfied for a certificate to be issued using that method. While some methods entail the use of CA/Browser Forum-compliant domain control validation methods, others do not entail CA/Browser Forum-compliant domain control validation and must be used in conjunction with a CA/Browser Forum-compliant domain control validation method to permit certificate issuance.</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>secure-dns-record-change:</strong> This method involves an applicant showing control of a DNSSEC-protected DNS record or a record that was retrieved via a DoH or DoT tunnel to the relevant authoritative nameservers used in the DNS resolution. This can be done via 1) the validation method "DNS Change" specified in the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates (Section 3.2.2.4.7) or 2) the "dns-01" method of the ACME RFC 8555. For this method to be satisfied, the FQDN where the DNS change is demonstrated <bcp14>MUST</bcp14> be protected by DNSSEC or lookups to the relevant authoritative nameservers <bcp14>MUST</bcp14> be conducted over authenticated channels (e.g., DoH/DoT).</t>
        </li>
        <li>
          <t><strong>http-validation-over-tls:</strong> This method involves the completion of an HTTP domain validation challenge over an HTTPS session using TCP port 443 where the server authenticates with an existing publicly-trusted valid certificate covering the domain in question. The certificate cannot be self-signed or expired. This method <bcp14>MAY</bcp14> be directly satisfied while a CA is performing the "Agreed‑Upon Change to Website v2" domain control validation method specified in the the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates (Section 3.2.2.4.18). The ACME "http-01" challenge specified in RFC 8555 does not permit the use of HTTPS or port 443 when a CA is contacting the domain in question. A CA <bcp14>MAY</bcp14> still satisfy the <strong>http-validation-over-tls</strong> method even if it does not initiate connections to port 443 for HTTP challenges so long as either 1) the connection initiated to port 80 serves a redirect to the same domain name over HTTPS at port 443 and the connection to the domain at port 443 servers a valid, trusted certificate or 2) in addition to contacting the domain over port 80 the CA also contacts the domain over port 443 using HTTPS and the connection is established with a valid, trusted certificate and the same challenge value is observed. Operators of security-critical domains <bcp14>MAY</bcp14> choose not to permit this method since, unlike other cryptographic domain validation methods specified in this document, its security relies on no malicious certificates existing for a domain at time of the creation of the "security" tag in the domain's policy.</t>
        </li>
        <li>
          <t><strong>known-account-specifier:</strong> For a CA to issue a certificate using this method 1) there <bcp14>MUST</bcp14> exist a unique identifier for a CA subscriber account that is communicated with the CA out-of-band, over authenticated DNS lookups, or in another manner that is immune to man-in-the-middle adversaries 2) the CA may only issue a certificate to an applicant that has authenticated itself to the CA as having access to that specified subscriber account. A CA does not have permission to issue under this method unless both of these criteria are met. Once these criteria have been met, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates. One acceptable way of including this account identifier is with the CAA ACME account URI extension in an authenticated DNS record.</t>
        </li>
        <li>
          <t><strong>private-key-control:</strong> This method involves an applicant showing control of a private key that corresponds to a public key placed in a DNS record associated with the domain being validated. The private key must be used to sign a message containing: a unique identifier for the CA, the domain name(s) in the certificate, a timestamp, and a hash of the public key in the certificate. This message may be hashed and then have the signature generated over the hash of this message. Obtaining such a signed message from a certificate applicant authorizes the CA specified in the message to sign a certificate for those domain names with the specified public key within 24h of the timestamp provided in the message. The CA <bcp14>MUST</bcp14> retrieve the public key or a hash of the public key corresponding to the private key used for signing the message via an authenticated DNS lookup using either authenticated channels to the relevant authoritative nameservers (e.g., DoH or DoT) or validation of a DNSSEC signature chain back to the ICANN root. After private key control is established, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly‐Trusted TLS Server Certificates.</t>
        </li>
      </ol>
      <t>In the event that <strong>no "methods" property specified in the top-level property_list,</strong> all methods specified in this document are acceptable as well as cryptographic domain validation defined in future RFCs. Future RFCs <bcp14>MAY</bcp14> specify additional methods for cryptographic domain validation so long as they satisfy the properties of cryptographic domain validation (i.e., robust against global man-in-the-middle adversaries).</t>
    </section>
    <section anchor="permissible-options">
      <name>Permissible Options</name>
      <t>The following options <bcp14>MAY</bcp14> used as parameters in the "options" or "options-critical" property in the top-level property_list.</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>authenticated-policy-retrival:</strong> This option signifies to a CA that it <bcp14>MUST</bcp14> retrive a domain's "security" tag and any associated domain-owner identity (e.g., identifiers used for known-account-specifier and private-key-control) using authenticated DNS lookups or other authenticated channels. If a CA finds this option as a parameter to the "options-critical" property and the "security" tag was not retrieved using authenticated DNS lookups, the CA <bcp14>MUST NOT</bcp14> issues a certificate for that domain.</t>
        </li>
      </ol>
      <t>Additionally, a CA <bcp14>MAY</bcp14> choose to honor its own non-standardized options that do not need to be supported by other CAs or the IETF. These options <bcp14>MUST</bcp14> be prefixed with "-&lt;ca_name&gt;-" where ca_name is the name of the CA that initially developed the option.</t>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>"security" CAA tags can be used on domains that are contained in both domain validation certificates (where only the domain name in a certificate is validated) and extended or organization validated certificates (where information like organization identity as well as domain name is validated). Cryptographic Domain Validation only hardens the security of the validation of domain names, not broader identities (e.g., organization names). The use of cryptographic domain validation in an OV or EV certificate only improves the validation of the domain name(s) contained in the certificate (in the common name or subject-alternate names fields) and does not impact the validation of other forms of identity contained in the certificate. Use of cryptographic domain validation in a DV certificate does not imply validation of any identity beyond the domain name(s) in the certificate.</t>
    </section>
    <section anchor="single-security-tag-for-each-domain">
      <name>Single "security" Tag for Each Domain</name>
      <t>A single domain CANNOT have multiple "security" tags specified. A domain's entire cryptographic domain validation policy <bcp14>MUST</bcp14> be encoded into a single "security" tag. If a CA finds a domain that has multiple "security" CAA tags at the same FQDN, the CA <bcp14>MUST</bcp14> block issuance.</t>
    </section>
    <section anchor="caa-security-tag-protection">
      <name>CAA "security" Tag Protection</name>
      <t>A "security" CAA tag <bcp14>SHOULD</bcp14> be protected with a valid DNSSEC signature chain going back to the ICANN DNSSEC root or hosted on authoritative DNS servers that CAs have authenticated communication channels with. Any "security" CAA record not protected by such a signature <bcp14>MAY</bcp14> not benefit from the security properties outlined in this document. If it is not possible to have a DNSSEC signature chain back to the ICANN root, "security" CAA records <bcp14>SHOULD</bcp14> alternately be hosted in an authoritative DNS resolver that supports recursive-to-authoritative DNS over TLS or DNS over HTTPS. CAs <bcp14>SHOULD</bcp14> also require recursive-to-authoritative DNS over TLS or DNS over HTTPS communication (and not permit standard unencrypted DNS connections) for DNS providers that host "security" CAA records. This prevents downgrade attacks where an adversary attempts to interfere with the establishment of a DNS over TLS or DNS over HTTPS encrypted channel and cause a fallback to unencrypted DNS over UDP/TCP.</t>
      <t>Serving "security" CAA records over authenticated DNS channels or using authenticated DNS records (i.e., DNSSEC) is critical to the effectiveness of the records because a "security" CAA record not protected by authenticated DNS may be suppressed by an adversary that can manipulate DNS responses. This could potentially allow the adversary to downgrade validation to use a low-security method and undermine the security properties of the "security" tag.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Many of the security considerations regarding "security" CAA records are inherited from those of CAA records more generally. Because "security" CAA records do not introduce any new methods for validating domain ownership, they do not increase the attack surface of fraudulent validations. "security" CAA records reduce the attack surface of fraudulent validations by limiting which validation methods may be used and thus eliminating the risk posed by less-secure validation methods. Particularly, domains without a "security" CAA record are often highly vulnerable to man-in-the-middle adversaries that can intercept communications from a CA to the victim's domain. This record significantly reduces this attack surface.</t>
      <t>As with any restriction on certificate issuance, this introduces the potential for a Denial of Service attack (or DoS attack). There are two potential approaches to launching a DoS attack via "security" CAA records. The first is to attack a domain and spoof the existence of a "security" CAA record in order to prevent the domain owner from renewing his or her certificate (presuming the domain under attack was not using a validation method compliant with the "security" CAA record). This attack vector is not novel to "security" CAA records and is enabled solely by following RFC 6844 alone. Per RFC 6844, the presence of any not-understood CAA record with the critical flag prevents issuance. Thus, the adoption of "security" CAA records does not increase the attack surface for this form of DoS attack as a gibberish CAA record with the critical flag set could enable this type of attack as well.</t>
      <t>A second approach to a DoS attack enabled by "security" CAA records is to target a domain already using a "security" CAA record and interfere with all of the permitted validation methods with the idea that the presence of the "security" CAA will prevent the domain from falling back on alternative validation methods. This attack vector is mitigated by the diversity of different methods available to domain owners for validating domain ownership using "security" CAA records. A domain owner may use an alternate method to satisfy the "security" CAA record. In the event that a domain owner truly cannot satisfy any cryptographic domain validation method, the domain owner can still mitigate this attack by removing the "security" CAA record, obtaining a certificate, and then reinstating the "security" CAA record once the attack is over. As with all CAA records, CAs should not cache stale CAA record lookups that block issuance and should instead recheck the CAA record set when a new issuance request is received.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 198?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
