On Sat, Jun 25, 2022 at 10:13:28PM +0300, Yaron Sheffer wrote:

> My question was about identity validation, which is what 6125bis is
> about. So it's a subset of your second option, "validation of
> certificates". And yes, this boils to, are DANE-based EE certificates
> expected to adhere to the draft's requirements.
Yes, when the DANE TLSA certificate usages are:

    * PKIX-TA(0)    (trust-anchor constraint)
    * PKIX-EE(1)    (pkix with EE pinning)
    * DANE-TA(2)    (trust-anchor assertion)

But when the certificate usage is DANE-EE(3), then for some
application protocols (notably not HTTP) it is admissible to
ignore names and expiration in the certificate, because these
are more than adequately handled at the DNS layer.

> And the reason I raised this question is that the draft defines its
> own scope with these words:
> 
>       This document applies only to service identities that meet these
>       three characteristics: associated with fully-qualified domain
>       names (FQDNs), used with TLS and DTLS, and are PKIX-based. 

Even DANE-TA(2) is "PKIX based" for validating all the certificates
below the trust-anchor.  All that changes is the source of the trust
anchor from local to remote via DNS.  Whether DANE-EE(3) also needs
to adhere PKIX-rules depends on whether UKS (Unknown Key Share) attacks
are a concern for the application in question or not.

> I wasn't sure whether "PKIX-based" should be interpreted to include
> DANE certificates.

It does for the majority of the certificate usages, but in practice
today DANE is primarily used with SMTP, and predominantly with
DANE-EE(3) TLSA records, in which case identity questions are settleda
at the DNS layer, and the presented identifiers in the certificate are
irrelevant.

If some point DANE is implemented at a large cloud provider for which EE
bindings are operationally unattractive, and that provider elects
DANE-TA(2) instead, then even in SMTP there may (at least by message
volume, if not domain counts) come a time when PKIX-style identity
rules dominate.  This is already the case with MTA-STS of course.

-- 
    Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to