On Sun, Jul 19, 2015 at 08:18:18PM +0200, Daniel Kahn Gillmor wrote:

> On Wed 2015-07-01 05:58:20 +0200, Viktor Dukhovni wrote:
> > Instead, there would need to be in various cases:
> >
> >     * A validated chain of CNAMEs (possibly synthesized via validated
> >       DNAME RRs) leading from the client's requested SNI name to
> >       a final TLSA base domain.  (0 or more CNAME/DNAME indirection
> >       records and all the DNSKEY/DS/RRSIG records to validate
> >       these).
> >
> >     * A validated chain of CNAMES from _port._proto.<base-domain> to
> >       an actual validated TLSA RRset (and ...).
> >
> >     * The final TLSA RRset with all the requisite validation records.
> >
> >     * Also a potential change in the client's notion of the reference
> >       identifier to match in certificates, to the final TLSA base domain.
> 
> Complicating this further, there could be a chain to an SRV or MX
> record, which then needs to chain to the TLSA, in think (possibly with
> CNAMEs in the mix).  This is potentially a pretty long chain.  also: how
> does a multi-tenanted server know what SRV or MX chain to include in the
> chain?

My reading of the draft is that it is primary aimed at making DANE
practical for HTTPS,  where last-mile considerations on the client
end are a significant part of the adoption barrier.

For HTTP, MX and SRV records are out of scope.  Clients that depend
on DNS to the extent of determining the server identity based on
MX or SRV records, already need DNSSEC to avoid MiTM issues, and
at least in the case of SMTP and XMPP are expected to handle DANE
without stapled TLSA RRsets (and associated RRSIG/DNSKEY/DS chains).

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to