On Tue, Oct 31, 2017, at 06:29 PM, Chris Newman wrote:
> On 30 Oct 2017, at 19:30, Keith Moore wrote:
> > After a bit more thought on this, I've concluded that using the mail 
> > server's server certificates to verify authenticity of SRV records 
> > probably isn't a good idea - or at least there are more considerations 
> > and pitfalls than can reasonably be thought through in the context of 
> > this document.
> 
> I think what RFC 7817 says about certificate validation is fine, so I 
> don't want to repeat or contradict what it says.
> 
> > One consideration is that TLS "reverse proxies" can (and likely 
> > do/will) use SNI to dispatch to different hosts on the back end, as 
> > one way to implement "virtual hosting" of mail services.
> 
> I don't know if this is done for mail, but SNI routing appears to be in 
> use:
>     http://proxy.dockerflow.com/sni-routing/
> 
> Luckily domain names are cheap, so example.com SRV can point to an 
> example.com.mailhosting.example.net domain name or something like that 
> so there's no ambiguity and RFC 7817 cert validation will work fine on 
> that domain name.
> 
> > Also, of course, being able to authenticate to two different servers 
> > (even if both present valid certificates for their respective domain 
> > names) is not the same thing as those two servers being the same.
> 
> It's becoming less likely over time that two connections to a particular 
> domain name will be handled by the same physical hardware. Luckily 
> certificates don't restrict this.
> 
> > So now I'm inclined to add a simple sentence or two along the lines of 
> > Chris's suggestion.   I think that's the best we can do in a short 
> > time without additional review cycles.
> 
> Agreed.

I agree as well.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to