> On Oct 24, 2017, at 2:48 PM, Jim Fenton <fen...@bluepopcorn.net> wrote:
> 
> Regarding a) above: I apparently missed this. Is there any other circumstance 
> where the certificate presented is matched against anything other than the 
> hostname?
> 
> If we go forward with REQUIRETLS, this would require that it match against 
> the STS
> policy if one is present, or against the hostname if one isn’t present.

No.  If/when REQUIRETLS implies authenticated TLS and not just mandatory,
but possibly unauthenticated encryption, then the authentication mechanism
needs to be left to the sending MTA's choice, it might use DANE, STS, or
some future technology, and what exactly gets checked depends on the
mechanism.  So REQUIRETLS must NOT specify how authentication is done.

> I haven’t
> yet fully thought through whether this has any security implications, but at 
> first
> glance it seems like spoofing an STS policy where one isn’t present would be 
> another
> way to cause REQUIRETLS to accept a certificate it shouldn’t.

It should not be easy to "spoof" STS policy.  STS would be rather weak
if it were.  STS, for better or worse, is basically as strong as DV
certificate issuance.  Use DNSSEC and publish CAA records that only
allow CAs you trust to not issue certificates for your domain to
a rogue party.  I have:

$ dig +noall +ans -t caa dukhovni.org | grep issue
dukhovni.org.           3600    IN      CAA     0 issue "dukhovni.org"

as I don't presently use any of the public CAs.

-- 
-- 
        Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to