@@ -14,6 +14,7 @@ Key references:
1414- [ RFC8657] ( https://www.rfc-editor.org/rfc/rfc8657.html ) Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding, specifically [ chapter 4] ( https://www.rfc-editor.org/rfc/rfc8657.html#name-extensions-to-the-caa-record )
1515- [ IANA Certification Authority Restriction Properties] ( https://www.iana.org/assignments/pkix-parameters/pkix-parameters.xhtml#caa-properties ) registry
1616- [ IANA ACME Validation Methods] ( https://www.iana.org/assignments/acme/acme.xhtml#acme-validation-methods ) registry (referred from RFC8657)
17+ - [ CABF Baseline] ( https://cabforum.org/working-groups/server/baseline-requirements/documents/CA-Browser-Forum-TLS-BR-2.1.2.pdf )
1718
1819https://caatestsuite.com/ has useful test cases, though those do not work
1920as a full test target through the web UI, as they only have CAA records.
@@ -46,7 +47,9 @@ In all other cases, the status is bad (notice).
4647 one or more of the ` issue* ` records, i.e. whether the current
4748 certificate could be re-issued.
4849* We do not evaluate more than 1000 records.
49- * The API and database support recommendations for future use,
50- but none are currently used .
50+ * The API and database support a " recommendations" field for future use,
51+ but none are currently detected .
5152* We do not accept HTTP URLs in iodef, which may be a slightly
5253 different interpretation from the RFC, though it is very ambiguous.
54+ CABF Baseline also states "CAs are not expected to support URL schemes in
55+ the iodef record other than mailto: or https:", so we are in line with that.
0 commit comments