> On Jul 4, 2017, at 11:33 AM, Shumon Huque <shu...@gmail.com> wrote:
> 
> Yes, in fact the previous sentence to the one you quoted did say this more or 
> less: " ... return a serialized authentication chain in the Certificate 
> message associated with the end entity certificate being validated ". I would 
> propose rewording that a bit and removing the last quoted sentence entirely:
> 
>    Servers receiving a "dnssec_chain" extension in the ClientHello, and
>    which are capable of being authenticated via DANE, SHOULD return a
>    serialized authentication chain in the extension block of the Certificate 
>    message containing the end entity certificate being validated, using the 
>    format described below.

Why the end-entity certificate, and not the final certificate
sent by the server?  With anything but DANE-EE(3) the TLSA
records can't be processed against the server's certificate
message until *all* the server certificates have been received.

So instead of squirreling away the DNS data while waiting for
all the server certificates to arrive, it may make more sense
to receive the TLSA records (and associated signatures, CNAMEs,
DNAMEs, ...) once all the server certificates have been received.

Of course either way one still buffers all the server certificates,
so buffering the TLSA records is not a major issue.  It's just that
I don't see a compelling argument for sending the TLSA records with
the EE certificate.  Perhaps send them with any of the server
certificates, it probably makes no difference which...

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to