Thanks for this draft, i'm definitely interested in seeing it push
forward.

On Wed 2015-07-01 05:58:20 +0200, Viktor Dukhovni wrote:
> Instead, there would need to be in various cases:
>
>     * A validated chain of CNAMEs (possibly synthesized via validated
>       DNAME RRs) leading from the client's requested SNI name to
>       a final TLSA base domain.  (0 or more CNAME/DNAME indirection
>       records and all the DNSKEY/DS/RRSIG records to validate
>       these).
>
>     * A validated chain of CNAMES from _port._proto.<base-domain> to
>       an actual validated TLSA RRset (and ...).
>
>     * The final TLSA RRset with all the requisite validation records.
>
>     * Also a potential change in the client's notion of the reference
>       identifier to match in certificates, to the final TLSA base domain.

Complicating this further, there could be a chain to an SRV or MX
record, which then needs to chain to the TLSA, in think (possibly with
CNAMEs in the mix).  This is potentially a pretty long chain.  also: how
does a multi-tenanted server know what SRV or MX chain to include in the
chain?

        --dkg

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to