On Tue, 19 Sep 2023, Paul Hoffman wrote:

We don't know. It was pointed out in the WG discussion that some PKIX libraries 
do different types of verification regardless of what you want them to do.

Yes, exactly. Even if you can't stop your library from verifying, you must be 
able to ignore the verification failures.

That might not be the case. As with "null encryption", these modes are
more and more being removed from code bases to avoid exploits.

I also do find the value of using selfsigned certs over ACME certs
on the auth server pretty low. It's pretty easy to give a nameserver
with a static name an automatic ACME based certificate. With the
"opportunistic" part being that if the cert fails, to go back to do53.

Paul

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to