Viktor Dukhovni wrote:
> On Thu, Sep 10, 2015 at 08:39:38PM +0200, Michael Ströder wrote:
> 
>> Maybe there should be some additional text for 'dane-only' in [1]?
>> I'm not sure about the correct wording though.
> 
> I think it is fine as-is.  The "dane-only" security level requires
> that a peer be DANE authenticated, which means "secure" MX RRset,
> "secure" address RRset for the MX host and "secure" matching TLSA
> records.  All the links in the chain have to be valid.
> 
>>> I gather you're looking for something like:
>>>
>>>     example.com secure match=nexthop:dot-nexthop:hostname dnssec=yes
>>>
>>> where "dnssec=yes" would be a new policy option, that requires a
>>> "secure" MX RRset, or "secure" absence of an MX host.
>>
>> Yes. :-)
> 
> Just to be clear, is that what you had in mind when you started
> this thread?

Yes. And I also thought to myself that such a policy option would be useful
for all TLS security levels.

> Or did I suggest a feature that you decided you want?

No, you guessed my wish.

> One might also imagine an alternative interface:
> 
>     example.com secure match=nexthop:dot-nexthop:dnssec-hostname
> 
> Where "dnssec-hostname" matches the hostname only if securely
> obtained.  This would not require secure MX RRsets, but would make
> use of them to "improve" PKIX name matching when present.

Maybe I do not fully understand what you're saying.

But personally I consider the TLS hostname matching to be sufficiently secured
(because I likely also limit the CA cert used for validation).
Mainly it's the MX lookup what I'm concerned about.

Ciao, Michael.


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to