Toerless Eckert <t...@cs.fau.de> wrote:
    >> The other bit is that Registrars MUST IGNORE SNI when accepting Pledge
    >> connections.    Pledges ought to not send it, since they don't really 
know
    >> what to put.

    > Are there never methods by which pledges or proxies discover registrar
    > DNS names ? Isn't that at least commonly expected for BRSKI cloud ?

BRSKI-cloud pledges are code to connect to their cloud register by some
method.  A DNS name + DNS-lookup + RFC6125 DNS-ID validation (with SNI)
against WebPKI, sounds reasonable.
But, it could also be via TLS-PSK authentication to a hard coded IP address.
(That would be stupid, and maybe even seriously insecure, but you could do it)

But, the BRSKI-cloud connection is not the prospective TLS connection that
section 5.1 defines.

    > If this was a problem, it should be a problem already with a lot more
    > TLS use-cases ?!

    > Aka: I'd opt for not having to require an additional MUST IGNORE SNI..

What does a Registrar called "frank.example" do when it receives a BRSL-EST TLS
connection for "jones.example"?   Fail it?   That's silly.

For all we know, the pledge did a mDNS discovery to find a join proxy and
that's why it's using the wrong name.

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to