Skip to content

Commit 0dd94d6

Browse files
committed
Update content to CAA branch 0d19e7a
1 parent 5b269fb commit 0dd94d6

File tree

4 files changed

+178
-19
lines changed

4 files changed

+178
-19
lines changed

translations/en/main.po

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ msgstr ""
99
"Project-Id-Version: PACKAGE VERSION\n"
1010
"Report-Msgid-Bugs-To: \n"
1111
"POT-Creation-Date: 2015-02-16 23:27+0100\n"
12-
"PO-Revision-Date: 2025-05-27 12:27:29.821689\n"
12+
"PO-Revision-Date: 2025-05-27 14:55:39.942551\n"
1313
"Last-Translator: \n"
1414
"Language-Team: \n"
1515
"Language: \n"
@@ -914,13 +914,13 @@ msgstr ""
914914

915915
msgid "detail mail rpki exists exp"
916916
msgstr ""
917-
"We check if an RPKI Route Origin Authorization (ROA) has been published for all IP addresses of your mail server(s) (MX).\n"
917+
"We check if an RPKI Route Origin Authorisation (ROA) has been published for all IP addresses of your mail server(s) (MX).\n"
918918
"\n"
919919
"Your hoster (or its network provider) announces through the Border Gateway Protocol (BGP) for which of its IP address blocks it accepts incoming Internet traffic. Other network providers use these route announcements to determine via which route to send traffic for your server's IP addresses.\n"
920920
"\n"
921921
"However, a route announcement can be faked. In fact, another network provider may be able to connect the IP address block of your IP address to its network and thus potentially receive Internet traffic that is actually intended for your network provider. The cause may be accidental or malicious. In either case, this can result in your server becoming unreachable or in Internet traffic to your server being intercepted.\n"
922922
"\n"
923-
"Resource Public Key Infrastructure (RPKI) significantly improves protection against this. With RPKI, the rightful holder of a block of IP addresses can publish a digitally signed statement with route authorization (Route Origin Authorisation; ROA for short). Another network provider that wants to send Internet traffic to a particular IP address, can use the corresponding statement to filter out `Invalid` routes. In this way, the network provider prevents Internet traffic from its network from being sent to unauthorized provider networks."
923+
"Resource Public Key Infrastructure (RPKI) significantly improves protection against this. With RPKI, the rightful holder of a block of IP addresses can publish a digitally signed statement with route authorisation (Route Origin Authorisation; ROA for short). Another network provider that wants to send Internet traffic to a particular IP address, can use the corresponding statement to filter out `Invalid` routes. In this way, the network provider prevents Internet traffic from its network from being sent to unauthorized provider networks."
924924

925925
msgid "detail mail rpki exists label"
926926
msgstr "Route Origin Authorisation existence"
@@ -945,13 +945,13 @@ msgstr ""
945945

946946
msgid "detail mail rpki mx-ns-exists exp"
947947
msgstr ""
948-
"We check if an RPKI Route Origin Authorization (ROA) has been published for all IP addresses of the name servers of your mail server(s) (MX).\n"
948+
"We check if an RPKI Route Origin Authorisation (ROA) has been published for all IP addresses of the name servers of your mail server(s) (MX).\n"
949949
"\n"
950950
"Your hoster (or its network provider) announces through the Border Gateway Protocol (BGP) for which of its IP address blocks it accepts incoming Internet traffic. Other network providers use these route announcements to determine via which route to send traffic for your server's IP addresses.\n"
951951
"\n"
952952
"However, a route announcement can be faked. In fact, another network provider may be able to connect the IP address block of your IP address to its network and thus potentially receive Internet traffic that is actually intended for your network provider. The cause may be accidental or malicious. In either case, this can result in your server becoming unreachable or in Internet traffic to your server being intercepted.\n"
953953
"\n"
954-
"Resource Public Key Infrastructure (RPKI) significantly improves protection against this. With RPKI, the rightful holder of a block of IP addresses can publish a digitally signed statement with route authorization (Route Origin Authorisation; ROA for short). Another network provider that wants to send Internet traffic to a particular IP address, can use the corresponding statement to filter out `Invalid` routes. In this way, the network provider prevents Internet traffic from its network from being sent to unauthorized provider networks."
954+
"Resource Public Key Infrastructure (RPKI) significantly improves protection against this. With RPKI, the rightful holder of a block of IP addresses can publish a digitally signed statement with route authorisation (Route Origin Authorisation; ROA for short). Another network provider that wants to send Internet traffic to a particular IP address, can use the corresponding statement to filter out `Invalid` routes. In this way, the network provider prevents Internet traffic from its network from being sent to unauthorized provider networks."
955955

956956
msgid "detail mail rpki mx-ns-exists label"
957957
msgstr "Route Origin Authorisation existence"
@@ -1117,10 +1117,10 @@ msgstr ""
11171117
"The domain were the applicable CAA records are found is shown in the table with technical details below.\n"
11181118
"\n"
11191119
"The verdict is good if one or more CAA records were found that all have correct syntax, and at least one of these CAA records has the `issue` tag.\n"
1120-
"In all other cases, the test will result in a fail.\n"
1120+
"Otherwise, the test will result in a fail.\n"
11211121
"It is not checked whether the certificate authority of the current TLS certificate matches one or more of the `issue` and `issuewild` values, i.e., whether the current certificate could be reissued at this time.\n"
11221122
"\n"
1123-
"If your are using the Automatic Certificate Management Environment (ACME) standard and your certificate authority supports it, we recommend you to use the parameters `validationmethods` and `accounturi` to further restrict isssuance by the authorised certificate authority. Furthermore, it is recommended to add `issuemail` and `issuevmc` with an empty `;` if you do not use certificates for S/MIME and/or BIMI respectively. Otherwise, any certificate authority is still allowed to issue these certificates for your domain, since `issue` does not cover them.\n"
1123+
"If your are using the Automatic Certificate Management Environment (ACME) standard and your certificate authority supports it, we recommend you to use the parameters `validationmethods` and `accounturi` to further restrict isssuance by the authorised certificate authority. Furthermore, it is recommended to add `issuewild`, `issuemail` and `issuevmc` with an empty `;` if you do not use wildcard, S/MIME and/or BIMI certificates respectively. Otherwise, any certificate authority is still allowed to issue these certificates for your domain, since `issue` does not cover them.\n"
11241124
"\n"
11251125
"We expect URLs in `iodef` to be secure (i.e. use HTTPS scheme).\n"
11261126
"Furthermore, to prevent suppression or spoofing of CAA records we strongly recommend you to use DNSSEC, although this CAA test does not specifically test for DNSSEC.\n"
@@ -2034,7 +2034,7 @@ msgstr ""
20342034

20352035
msgid "detail tech data http-csp missing-invalid-frame-src"
20362036
msgstr ""
2037-
"Recommendation: 'frame-src' (or child-src' or 'default-src' as fallback) "
2037+
"Recommendation: 'frame-src' (or 'child-src' or 'default-src' as fallback) "
20382038
"with sufficiently secure value should be defined (#3)."
20392039

20402040
msgid "detail tech data http-csp no-policy-found"
@@ -2678,13 +2678,13 @@ msgstr "All your web servers with an IPv6 address are reachable over IPv6."
26782678

26792679
msgid "detail web rpki exists exp"
26802680
msgstr ""
2681-
"We check if an RPKI Route Origin Authorization (ROA) has been published for all IP addresses of your web server.\n"
2681+
"We check if an RPKI Route Origin Authorisation (ROA) has been published for all IP addresses of your web server.\n"
26822682
"\n"
26832683
"Your hoster (or its network provider) announces through the Border Gateway Protocol (BGP) for which of its IP address blocks it accepts incoming Internet traffic. Other network providers use these route announcements to determine via which route to send traffic for your server's IP addresses.\n"
26842684
"\n"
26852685
"However, a route announcement can be faked. In fact, another network provider may be able to connect the IP address block of your IP address to its network and thus potentially receive Internet traffic that is actually intended for your network provider. The cause may be accidental or malicious. In either case, this can result in your server becoming unreachable or in Internet traffic to your server being intercepted.\n"
26862686
"\n"
2687-
"Resource Public Key Infrastructure (RPKI) significantly improves protection against this. With RPKI, the rightful holder of a block of IP addresses can publish a digitally signed statement with route authorization (Route Origin Authorisation; ROA for short). Another network provider that wants to send Internet traffic to a particular IP address, can use the corresponding statement to filter out `Invalid` routes. In this way, the network provider prevents Internet traffic from its network from being sent to unauthorized provider networks."
2687+
"Resource Public Key Infrastructure (RPKI) significantly improves protection against this. With RPKI, the rightful holder of a block of IP addresses can publish a digitally signed statement with route authorisation (Route Origin Authorisation; ROA for short). Another network provider that wants to send Internet traffic to a particular IP address, can use the corresponding statement to filter out `Invalid` routes. In this way, the network provider prevents Internet traffic from its network from being sent to unauthorized provider networks."
26882688

26892689
msgid "detail web rpki exists label"
26902690
msgstr "Route Origin Authorisation existence"
@@ -2784,9 +2784,9 @@ msgstr ""
27842784
"The domain were the applicable CAA records are found is shown in the table with technical details below.\n"
27852785
"\n"
27862786
"The verdict is good if one or more CAA records were found that all have correct syntax, and at least one of these CAA records has the `issue` tag with a valid value.\n"
2787-
"In all other cases, the test will result in a fail. It is not checked whether the certificate authority of the current certificate matches one or more of the `issue` and `issuewild` values, i.e., whether the current certificate could be reissued at this time.\n"
2787+
"Otherwise, the test will result in a fail. It is not checked whether the certificate authority of the current certificate matches one or more of the `issue` and `issuewild` values, i.e., whether the current certificate could be reissued at this time.\n"
27882788
"\n"
2789-
"If your are using the Automatic Certificate Management Environment (ACME) standard and your certificate authority supports it, we recommend you to use the parameters `validationmethods` and `accounturi` to further restrict isssuance by the authorised certificate authority. Furthermore, it is recommended to add `issuemail` and `issuevmc` with an empty `;` if you do not use certificates for S/MIME and/or BIMI respectively. Otherwise, any certificate authority is still allowed to issue these certificates for your domain, since `issue` does not cover them.\n"
2789+
"If your are using the Automatic Certificate Management Environment (ACME) standard and your certificate authority supports it, we recommend you to use the parameters `validationmethods` and `accounturi` to further restrict isssuance by the authorised certificate authority. Furthermore, it is recommended to add `issuewild`, `issuemail` and `issuevmc` with an empty `;` if you do not use wildcard, S/MIME and/or BIMI certificates respectively. Otherwise, any certificate authority is still allowed to issue these certificates for your domain, since `issue` does not cover them.\n"
27902790
"\n"
27912791
"We expect URLs in `iodef` to be secure (i.e. use HTTPS scheme). \n"
27922792
"Furthermore, to prevent suppression or spoofing of CAA records we strongly recommend you to use DNSSEC, although this CAA test does not specifically test for DNSSEC.\n"

translations/en/news.po

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ msgstr ""
44

55
msgid "article .index"
66
msgstr ""
7+
"release-1.10\n"
78
"release-1.9\n"
89
"release-1.8\n"
910
"release-1.7\n"
@@ -681,6 +682,84 @@ msgstr ""
681682
msgid "article open-source-release title"
682683
msgstr "Open source release Internet.nl including 'security headers'"
683684

685+
msgid "article release-1.10 body"
686+
msgstr ""
687+
"## What is CAA?\n"
688+
"Certification Authority Authorisation (CAA) allows you as a DNS domain name holder to specify one or more certification authorities authorised to issue certificates for your domain name. A certificate authority must not issue a certificate unless the certificate authority determines that the certificate request is consistent with the applicable CAA records.\n"
689+
"\n"
690+
"## Why is CAA important?\n"
691+
"For the secure connection to your website or mail server, its certificate is crucial. If a malicious party is able to obtain a certificate for your domain name, it may be able to intercept sensitive data. By limiting the number of authorized certificate authorities, you reduce the risk of mis-issuance.\n"
692+
"\n"
693+
"## What does the CAA test in Internet.nl check for?\n"
694+
"Internet.nl checks if the name servers of your tested domain or the domains of its mail servers (MX) contain one or more CAA records, that are all have correct syntax. At least one of these CAA records must have the `issue` tag. Otherwise, the test will result in a fail. It is not checked whether the certificate authority of the current TLS certificate matches one or more of the `issue` and `issuewild` values, i.e., whether the current certificate could be reissued at this time. Note that the result of the test currently does not weigh into the score.\n"
695+
"\n"
696+
"If your are using the Automatic Certificate Management Environment (ACME) standard and your certificate authority supports it, we recommend you to use the parameters `validationmethods` and `accounturi` to further restrict isssuance by the authorised certificate authority. Furthermore, it is recommended to add `issuewild`, `issuemail` and `issuevmc` with an empty `;` if you do not use wildcard, S/MIME and/or BIMI certificates respectively. Otherwise, any certificate authority is still allowed to issue these certificates for your domain, since `issue` does not cover them.\n"
697+
"\n"
698+
"## Upcoming release: new TLS guidelines\n"
699+
"NCSC-NL recently published a new version of its TLS guidelines. The upcoming release of Internet.nl will use these updated guidelines as the baseline for the TLS test. We expect this new version of Internet.nl to go live around September/October 2025. \n"
700+
"\n"
701+
"## About Internet.nl\n"
702+
"The test tool [Internet.nl](https://internet.nl) is an initiative of the Dutch Internet Standards Platform which is a collaboration of partners from the Internet community and the Dutch government. The aim of the platform is to jointly increase the use of modern Internet standards to make the Internet more accessible, safer and more reliable for everyone. The software code of Internet.nl is available under an open source license. \n"
703+
"\n"
704+
"---\n"
705+
"\n"
706+
"## Release notes 1.10.0\n"
707+
"\n"
708+
"### Feature changes\n"
709+
"\n"
710+
"- A test for CAA records was added for web and mail tests. This checks for the presence of one or more correctly\n"
711+
" formatted CAA records, of which one must have an `issue` tag. This test is not required, i.e. does not affect scoring.\n"
712+
"- The [sectxt](https://github.com/DigitalTrustCenter/sectxt) library, used for validating security.txt files, was updated from 0.9.4 to 0.9.7.\n"
713+
" This includes:\n"
714+
" - A new error if a PGP signed message ends with more than one newline, named `too_many_line_separators` ([sectxt/#78](https://github.com/DigitalTrustCenter/sectxt/issues/78)).\n"
715+
" - Improved detection of repeated use of fields that must only occur once. Previously, these were not always detected ([sectxt/#83](https://github.com/DigitalTrustCenter/sectxt/issues/83)).\n"
716+
" - Fixed an issue with checking signatures made with AEAD keys ([sectxt/#79](https://github.com/DigitalTrustCenter/sectxt/issues/79)).\n"
717+
" - Fixed exception [for certain malformed PGP signatures](https://github.com/DigitalTrustCenter/sectxt/issues/85).\n"
718+
"- The test date and time are now [included in the print CSS](https://github.com/internetstandards/Internet.nl/pull/1735).\n"
719+
"\n"
720+
"### Significant internal changes\n"
721+
"\n"
722+
"- The test code no longer interfaces with libunbound, but \n"
723+
" [uses dnspython as a stub resolver](https://github.com/internetstandards/Internet.nl/pull/1578).\n"
724+
"- Periodic tests [are no longer enabled by default](https://github.com/internetstandards/Internet.nl/pull/1628).\n"
725+
"- UWSGI [cheaper](https://uwsgi-docs.readthedocs.io/en/latest/Cheaper.html) options are used to reduce idle processes and reduce memory consumption.\n"
726+
"\n"
727+
"### Possibly required changes to deployments\n"
728+
"\n"
729+
"- The `resolver-permissive` container was obsoleted and removed.\n"
730+
"- Periodic tests will only run when [specifically enabled](https://github.com/internetstandards/Internet.nl/blob/main/documentation/Docker-deployment.md#periodic-tests)\n"
731+
" with the CRON_15MIN_RUN_TESTS, TEST_DOMAINS_SITE and/or TEST_DOMAINS_MAIL settings.\n"
732+
"- There is now support for running multiple instances per server, sharing a Routinator instance,\n"
733+
" intended for acceptance testing.\n"
734+
"\n"
735+
"On upgrade from an earlier version, a\n"
736+
"[change in networking setup](https://github.com/internetstandards/Internet.nl/pull/1688) requires\n"
737+
"recreation of one of the Docker networks. Before deploy, bring down the entire environment and make sure the network is removed:\n"
738+
"```\n"
739+
"docker compose --project-name=internetnl-prod down\n"
740+
"docker network rm internetnl-prod_public-internet\n"
741+
"```\n"
742+
"\n"
743+
"### API changes\n"
744+
"\n"
745+
"- The API version was updated to version 2.5.0.\n"
746+
"- The fields `caa_enabled`, `caa_errors`, `caa_recommendations`, `caa_records`, and `caa_found_on_domain` have been added\n"
747+
" ([OpenAPI diff](https://github.com/internetstandards/Internet.nl/commit/cdc642c97f3ef00b4ef8ec7ff6ea4c5403c80978#diff-ccabca18cd3cc1ba3dd325e532acccf5d37c7be317a2966209b6e55b968d4890)).\n"
748+
"- The API report URL was [updated to use HTTPS](https://github.com/internetstandards/Internet.nl/issues/1704)."
749+
750+
msgid "article release-1.10 date"
751+
msgstr "June 2, 2025"
752+
753+
msgid "article release-1.10 lead"
754+
msgstr ""
755+
"As of today, Internet.nl makes it possible to test your domains for "
756+
"Certification Authority Authorization (CAA). The new CAA subtest is part of "
757+
"both the website and the mail test. Currently the subtest does not impact "
758+
"score."
759+
760+
msgid "article release-1.10 title"
761+
msgstr "Internet.nl adds CAA test and announces TLS test changes"
762+
684763
msgid "article release-1.7 body"
685764
msgstr ""
686765
"## Improved CSP test\n"

0 commit comments

Comments
 (0)