This is an automated email from the git hooks/post-receive script.
dgoulet pushed a commit to branch main in repository torspec.
The following commit(s) were added to refs/heads/main by this push: new 67f8481 update 343-rend-caa to include guidance on the non mandatory state of CAA new 4a14d01 Merge branch 'tor-gitlab/mr/139' 67f8481 is described below
commit 67f8481596b010c58c406ee5c5631202a59bfc6f Author: Q q@misell.cymru AuthorDate: Tue Jun 6 23:27:36 2023 +0200
update 343-rend-caa to include guidance on the non mandatory state of CAA --- proposals/343-rend-caa.txt | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-)
diff --git a/proposals/343-rend-caa.txt b/proposals/343-rend-caa.txt index f5d449f..0859690 100644 --- a/proposals/343-rend-caa.txt +++ b/proposals/343-rend-caa.txt @@ -3,6 +3,7 @@ Title: CAA Extensions for the Tor Rendezvous Specification Author: Q Misell q@as207960.net Created: 2023-04-25 Status: Open +Ticket: https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/716
Overview: The document defines extensions to the Tor Rendezvous Specification Hidden @@ -22,8 +23,11 @@ Motivation: As Tor hidden service domains are not in the DNS another way to provide the same security benefits as CAA does in the DNS needed to be devised.
+ It is important to note that a hidden service is not required to publish a CAA + record to obtain a certificate, as is the case in the DNS. + More information about this project in general can be found at - https://e.as207960.net/w4bdyj/Gm2AylEF + https://acmeforonions.org.
Specification: To enable maximal code re-use in CA codebases the same CAA record format is @@ -62,10 +66,10 @@ Specification: [At most once]
Security Considerations: - The second layer descriptor is signed and MACed in a way that only a party - with access to the secret key of the hidden service could manipulate what is - published there. Therefore, Tor CAA records have at least the same security as - those in the DNS secured by DNSSEC. + The second layer descriptor is signed, encrypted and MACed in a way that only + a party with access to the secret key of the hidden service could manipulate + what is published there. Therefore, Tor CAA records have at least the same + security as those in the DNS secured by DNSSEC.
The "caa-critical" flag is visible to anyone with knowledge of the hidden service's public key, however it reveals no information that could be used to @@ -104,4 +108,4 @@ References:
[tor-rend-spec-v3] The Tor Project, "Tor Rendezvous Specification - Version 3", - https://spec.torproject.org/rend-spec-v3. + https://spec.torproject.org/rend-spec-v3. \ No newline at end of file
tor-commits@lists.torproject.org