On Wed, May 15, 2013 at 09:19:39PM +0200, Andy Polyakov wrote:

> >>    0.    The TLSA lookup function does not check the "bogus"
> >>field, which is
> >>    documented as possibly set together with "secure", indicating a bogus
> >>    DNS reply (unbound still returns the data it seems) and lets
> >>the caller
> >>    decide.  So the new TLSA lookup function is not safe.
> >
> >OK.
> 
> Or? Manual page says if both are zero, then no security for domain.
> It says nothing about both being set to 1. And example at
> unbound.net suggests that they can't be set together:
> 
>       if(result->secure)
>               printf("Result is secure\n");
>       else if(result->bogus)

Yes, it seems I did not find a sufficiently clear reference in my
quick search for ub_resolve() documentation.  The "secure" bit
precludes bogus.

When you're implementing the verification code for TLSA RRs, we
should talk.  I have a working implementation via the verify
callback, and have spent a bunch of time thinking through some of
the more subtle issues.

You can look at tls_verify_certificate_callback() in:

    
https://github.com/vdukhovni/postfix/blob/20130405-nonprod/postfix/src/tls/tls_verify.c

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to