> On Feb 6, 2018, at 10:19 PM, Adam Roach <a...@nostrum.com> wrote:
> 
> Unless I missed something important, this scenario doesn't seem to make much
> sense: if the client provides name A and the server replies with name B, the
> client either (1) isn't performing server name validation (in which case it is
> nonsense for the client to ask for a dnssec_chain), or (2) is going to error
> out the connection. Do I have that right? If there's some situation in which
> the server acting as described above provides some benefit, I would love to
> see it described in here. If it's just a matter of having completely described
> behavior for corner cases, it may be worthwhile indicating that the client
> will reject the connection if the server decides to complete the handshake
> like this.

DANE clients sometimes accept more than one name for the server.  This happens
when the server name is obtained indirectly from MX OR SRV records, or as the
result of (DNSSEC-validated) CNAME expansion.

So in principle, more than one name might be acceptable to the client.  In
practice however, I don't yet see a mechanism where a client that can't do
DNSSEC validation on its own would be in a position to do this.

So the server may indeed be able to validate a certificate for some name
that the client did not expect, and it would then be up to some external
mechanism (prompt the user?) to accept that name or not.

It is not entirely unreasonable to allow the client that freedom, but it
would likely not be a mainstream mode of operation.

Perhaps I am not thinking creatively enough about other ways for the client
to be configured security to accept one of many names for the server, and
to "guess" the wrong one.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to