On Tue, Jan 24, 2023 at 10:41:08PM -0800, Rob Sayre wrote:

> Then, I would match any mention of "web browsers" with examples of
> implementations that do things another way. I suspect this approach might
> make for difficult writing, because I don't think anyone diverges from the
> browser approach. If I'm wrong here, I'd be happy to see it documented.

Which practices did you have in mind here, in terms of potential
differences from practices in browsers?  To find substantially different
practice, you probably need to look at industrial automation networks,
and some IoT applications.  Postfix probably occupies a space on the
spectrum between browsers and SCADA.

- Postfix supports and prefers (when TLS <= 1.2) anon-DH in
  unauthenticated opportunistic connections, but this is of course
  outside the scope of RFC6125bis.

- Postfix also supports DANE TLSA with DANE-EE(3) TLSA records with the
  reference identifiers in the server certificate entirely ignored in
  that case.  Again, not like browsers, but of scope.

  Indeed support for raw public keys (authenticated via DANE-EE(3)
  SPKI(1) TLSA records when applicable) is now code-complete, waiting
  for the OpenSSL PR to be included in a future OpenSSL 3.2.  RPK is
  the closest I can get to anon-DH with TLS 1.3.  There are today two
  MTAs on the Internet that support RPK.  I operate both. :-)

- Postfix allows MTA administrators to configure wildcard *reference*
  identifiers (note, these are NOT wildcards in the certificate, rather
  they are locally configured subdomain suffixes that match any name in
  ending in that that suffix).  This is somewhat in the ballpark.

- Multiple reference identifiers are somewhat common, e.g. a list
  of MX hostnames, or a subdomain suffix they all share (and thus
  also any other sibling host).

- IDNA support is based on UTS-46.

-- 
    Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to