BTW, DANE stapling is not that hard.  I have been pointed at AGL's
code for it.  The RP side doesn't need a DNSSEC resolver to implement
it because all the records are stapled, and the RP doesn't need to
implement non-existence checking and so on -- just validate the
signature chain to the RP's DNSSEC root and check "name constraints".

Producing the stapled data is not hard either.  There's a Python
script that uses dig(1) that supports this.  It needs to learn to be a
daemon that wakes before the shortest TTL passes to refresh the chain.

Stapling should result in fewer external dependencies for the Kerberos
libraries, so that's a big win.

Nico
--
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to