-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix #194 - Add CAA test #1624
base: main
Are you sure you want to change the base?
Fix #194 - Add CAA test #1624
Conversation
Should check at least syntax, although maybe CAA even protects if it's invalid?
Regarding the Let's Encrypt IP certificates I notices this comment:
But this is not a problem, since internet.nl does not allow checking of ip address resources, only host names. ¹ RFC 8657 - Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding |
30ebaab
to
da925e0
Compare
This is progressing well. The experiment of using ABNF as a basis for the parser is good and we should keep doing this. It just reduces errors and manual work. The error message in case of a mismatch with the grammar will point the user to the character, so they have something to go on. Current implementation
The tech table displays translatable messages in a similar way as securitytxt - you can see them in the updated translations files for now. We have a message for having found a CAA (and on which domain), for not found, and specific error messages where possible. Rationale for bad test result on parse errorsSome areas of CAA are fail-mostly-secure. If someone messes up their Second argument: the first argument is about security, but we're not a security tool, we are a standards compliance tool. Misconfigured CAAs are not standards compliant, therefore we must not accept them. Next questions for us to decide
|
Discussion from meeting:
|
.
)https://caatestsuite.com/ has useful test cases.
Key references: