I finally made time to read it through in one sitting.

And it looks spot on. (Presuming I correctly grokked the intent. :)

AIUI:

When dnssec is bogus:

  die!die!die!  ;^)

In the case where dnssec is unavailable:

  if the server was specified by the user:

     that hostname:port is used for sni
     (and CN if the client lacks sni)

  or, if the server was specified via SRV:

     the email addr's right-hand-part is used
     for sni (and CN if the client lacks sni)

When dnssec is available and verifies:

  whether the server was specified by the user or via SRV:

     that hostname:port is use for tlsa, sni
     (and CN if the client lacks sni)

  if tlsa rr exists:

     the server MUST support tls

With, in the non-SRV cases, port defaulting to:

      tcp/143    for    imap://
      tcp/993    for    imaps://
      tcp/110    for    pop://
      tcp/995    for    pops://
      tcp/587    for    submission://


Yes?

That seems to meet all of the needs and current realities.

-JimC
-- 
James Cloos <[email protected]>         OpenPGP: 1024D/ED7DAEA6
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to