> -----Original Message----- > From: Petr Špaček <pspa...@isc.org> > Sent: Tuesday, March 4, 2025 6:11 PM > To: Robert Wagner <rwag...@tesla.net>; Klaus Darilion > <klaus.daril...@nic.at> > Cc: bind-us...@isc.org > Subject: Re: XoT Testing: TLS peer certificate verification failed > > > I think I have solved the mistery: Bind (or openssl, who ever does the > > validation) requires Subject Alternative Name. Regardless if using the > > hostname or the IP address, they must be in the subject alternative > > name. When using self-signed certificates, it is probably best to put > > both in the SAN. Using the following certificate on the server, the > > validation in dig works fine, regardless if using the hostname or IP > > address. > > The DNS-over-TLS specification insists on this behavior. See > https://datatracker.ietf.org/doc/html/rfc8310.html#section-8.1 > > Quote: > A compliant DNS client MUST only inspect the certificate's > subjectAltName extension for the reference identifier. In > particular, it MUST NOT inspect the Subject field itself.
Thanks for the reference. It seems I should have read the whole RFC before playing around with TLS. 😊 Regards Klaus -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users