On Fri, May 04, 2018 at 05:19:46AM +0000, Viktor Dukhovni wrote:
On Thu, May 03, 2018 at 06:14:44PM -0700, Eric Rescorla wrote:
>      2.  That at least one of the policy's "mx" patterns matches at least
>          one of the identities presented in the MX's X.509 certificate, as
>          described in "MX Certificate Validation".

IMPORTANT: This doesn't seem like quite what you want. Consider
the case where the STS policy has:

   mx: mx1.example.com
   mx: mx2.example.com

And I then attempt to send to mx1.example.com, send SNI=mx1.example.com,
and get a cert that is only valid for mx2.example.com.

[ This was discussed extensively in the WG.  This part of the design
 is substantially my doing... ]

For ease of reference, these are some of those discussions where people (including me) raised concerns about the custom certificate matching:

https://www.ietf.org/mail-archive/web/uta/current/msg02195.html

https://www.ietf.org/mail-archive/web/uta/current/msg01922.html

https://www.ietf.org/mail-archive/web/uta/current/msg02308.html

Thanks,
                Alberto

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to