Podcast
Root Causes 181: Limitation of DCV Through Web Site Changes


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 30, 2021
This December will see a meaningful change in how CAs are allowed to conduct Domain Control Validation (DCV) using the method known as https token or file authentication or agreed up on change to web site. This method will be removed as an option for "domain spaces" including wildcards and subdomains. Join our hosts as they explain how DCV works and how the rules are changing and why. And we clarify the available options for those changing their preferred DCV methods.
Podcast Transcript
Lightly edited for flow and brevity.
One of them is you do what you just said. You take the shared token or you take this secret that’s been given to you by the CA that you couldn’t possibly have predicted - think of it as a random number for want of a better way to think about it - and you put that in your DNS in a certain expected format and then the CA has software that goes and looks for it and when they find that token in your DNS, they know the only way that could have happened is if the person who requested the certificate has control over DNS settings. So, that is one of the ways to establish control of their domain. Or validate if we will, control of the domain because it is domain control validation. That’s a popular one.
Another popular one that’s been around for a long time, I think it’s been around forever, is you do a similar thing but instead of putting that token in your DNS settings, you actually put it on the HTTP page for the domain in question. So, I actually get a file. I put that file on my site on that domain and then the software comes; it sees that file; it reads that file; it sees the secret; verifies that the secret is correct and says, ok, the only way this is possible is that the requester of the certificate has control over this domain and we often refer to that as HTTP or HTTPS DCV or we might call that file auth or HTTP token or something along those lines.
So, just in the interest of completeness, the third main way to do it is what we call emailed-based authentication. So, what happens in this case is the CA sends an email to one or more constructed email addresses. So, it’s things like [email protected]. Right? And there is a set of like five or six of those and you can pick one or more of those as they go out to those domains and by virtue of the fact that you are able to receive that domain - - sorry – receive that secret, because the secret is sent, again, in your email and then you get back to the CA and tell them what the secret is and if the secret matches, then what you’ve done when you do that is, once again, you’ve demonstrated control of the domain. So, those are the three main methods and they break down into variants and subcategories and stuff but we don’t need to get into all of that today.
So, what we are talking about today is a change to the second of those two. The file-based domain auth and, in particular, it is a narrowing if we will, let’s say a deprecation of a certain methods of using file-based author. Certain things that you could validate that you won’t be allowed to validate moving forward. And it’s two main things.
So, the first of those is for wildcard certs. So, in the event that I want to use to validate a wildcard domain, or validate a domain for a wildcard certificate, I no longer can use file-based DCV or HTTP-based DCV in order to that. Simply disallowed. So, if I have *.mydomain.com, I cannot use file-based DCV to do that and the reason for that is simply that there is not enough demonstration of control of all of the subdomains that that wildcard might service, that I could use that to get a wildcard cert that would act as subdomains that I shouldn’t rightfully have access to and by eliminating that option that is no longer a situation that can occur.
The second one is a variation on the same idea, which is right now according to the rules, if I use HTTP DCV on a domain name, that automatically is applicable to any subdomain as well. So, if I go get a file-based domain validation for mysite.com, then I can order a cert for shop.mysite.com without having to undergo DCV a second time and it’s the same exact concern. The concern is that there are scenarios and use cases where there are subdomains that perhaps are not in control of the same people and by giving the owner of the apex domain the ability to order certs for those subdomains also that it potentially leads to an issuance versus control mismatch. The exact same way that the wildcard scenario does.
And let me just leave you with one last thing. If you are a stickler for details and you want to learn more, the methods as described in the baseline requirements that are being changed are what we call DCV Method 18 and DCV Method 19 and these are detailed in the most current version of the baseline requirements in Section 3.2.2.4.18 and no surprise, 3.2.2.4.19 and if you just search CABF baseline requirements, you’ll find that document and you can go through and actually read for yourself. So, those are the sections that are being updated and that’s where we are.

