I am the assigned Gen-ART reviewer for this draft. For background on Gen-ART, please see the FAQ at <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Please resolve these comments along with any other Last Call comments you may receive.



Document: draft-ietf-dane-use-cases-04

Reviewer: Alexey Melnikov

Review Date: 2011-07-08

IETF LC End Date: 2011-07-19

IESG Telechat date:




Summary: This draft is ready for publication as an Informational RFC (with nits)




Major issues: none



Minor issues: none



Nits/editorial comments:

1.  Introduction

The first reference to DNS needs a reference.

  Clients thus rely on CAs to correctly assert bindings between public
  keys and domain names, in the sense that the holder of the
  corresponding private key should be the domain holder.  Today, an
  attacker can successfully authenticate as a given application service
  domain if he can obtain a "mis-issued" ciertificate from one of the

typo: certificate

  widely-used CAs -- a certificate containing the victim application

3.1.  CA Constraints

  Alice may wish to provide similar information to an external CA
  operator Charlie.  Prior to issuing a certificate for
  alice.example.com to someone claiming to Alice, Charlie needs to

claiming to *be* Alice

  verify that Alice is actually requesting a certificate.  Alice could


  Injected or modified false DANE information of this type can be used
  for denial of service, even if the attacker does not have a
  certificate for the target domain.  If an attacker can modify DNS
  responses that a target host receives, however, there are already
  much simpler ways of denying service, such as providing a false A or
  AAAA record.  In this case, DNSSEC is not helpful, since an attacker
  could still case a denial of service by blocking all DNS responses

s/case/cause

  for the target domain.

_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to