It looks like a terrible idea for me.

Imagine a country that currently doesn't have any trusted roots included in
browser's bundle. Currently such countries can suspend any domain in their
zone. Your proposal gives them an opportunity to transparently replace the
certificate that gives much more capabilities.


On Fri, 27 Sep 2024, 20:56 Watson Ladd, <watsonbl...@gmail.com> wrote:

> Dear all,
>
> Spurred by recent IDs and events I've been thinking harder about how
> to get what we want out of TLS, DNS, and their interaction at the
> WebPKI.
>
> Fundamentally browsers can't rely on DNS to provide information about
> authentication because resolvers break that connection, and enforcing
> that means a lot of important things don't work. DNSSEC never gives
> the right signal (vanishes at resolver) so DANE doesn't really work,
> even if we could resolve extra records reliably.
>
> To my mind the registry should be able to issue X509 certs for second
> level domains/whoever controls a public suffix. After all, they know
> where you change DNS. Haven't sorted out how to deal with the level
> below that. Do others find this line of thought compelling?
>
> Sincerely,
> Watson Ladd
>
> --
> Astra mortemque praestare gradatim
>
> _______________________________________________
> Uta mailing list -- uta@ietf.org
> To unsubscribe send an email to uta-le...@ietf.org
>
_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to