On Fri, Jun 24, 2022 at 07:04:28PM +0300, Yaron Sheffer wrote:

> * Similarly, it is not clear to me whether certs obtained through DANE
> are in or out of scope.

I may be able to help, but I am struggling to understand the question in
sufficient detail.  Can you be more specific about:

    - What do you mean by "certs obtained through DANE" (typically the
      certs are obtained from the TLS server certificate message, and
      matching type Full(0) certificates in the TLSA record are very
      rare)?  Even then, these are semantically not much different from
      those sent in the server certificate message, other than being
      asserted or required trust anchors.

    - Did you perhaps mean *validation* of certificates (received in the
      usual way) via DANE TLSA records?  That is, are DANE-based
      expected to adhere to all the normative text in the draft?

      The main thing that's different about DANE is that in some
      application protocols Unknown Key Share issues are not believed to
      be a concern.  And in these cases EE TLSA records that specify
      only the certificate or public key hash validate a presented
      certificate with a matching public key regardless of lack of
      matching presented identifiers or inception / expiration dates.

      Validation via DANE trust-anchors is the same as validation via
      local WebPKI trust anchors, except that in the case DANE-TA(2) the
      trust-anchor certificate must appear in the server certificate
      chain when the TLSA record provides just a hash of its SPKI (or
      even just the SPKI, which I expect some implementations might not
      support, though this is supported in OpenSSL).

    - Either way, what is it that might then be in or out of scope?

-- 
    Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to