Mario Lombardo wrote:
> Hi *,
> 
> this is just an idea. However it would increase the security of our crypto
> system in case a trusted CA has been compromised.
> 
> The idea is to implement a DNS lookup of a host whenever a ssl connection is
> going to be established. The lookup may search the TXT record of the domain.
> This record may contain one or multiple records in this form:
> 
> mydomain.com IN TXT "tls-sec v=1.0 sock=443/tcp crypto=required
> fingerprint=00:12:34:..."
> mydomain.com IN TXT "tls-sec v=1.0 sock=25/tcp crypto=desired
> fingerprint=ab:cd:ef:..."
> 
> So the TLS/SSL client is able to check whether there is a need for encryption
> on this connection and it is able to doublecheck the fingerprint of the 
> keypair.
> 
> In case a compromized CA has lost its "trusted" signing key, this key is not
> able to sign any fraud certificates.
> 
> As I introduced - this is just an idea. But I just would like to share it with
> you. Feedback is welcome :)

You probably want to examine DANE/TLSA:

http://tools.ietf.org/html/rfc6698

It's not secure without DNSSEC though.

Ciao, Michael.


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to