On May 28, 2013, at 3:59 PM, Viktor Dukhovni wrote:

- a number of very useful comments.- 

Hi Victor,

I believe that having multiple independent implementations of TLSA validation 
code is "a good thing" in that it allows us to flag and fix issues early and 
build more confidence in the code we use down the line. So your comments in 
that respect are particularly useful.

For the purpose of this list I'll try and summarize the broad problems that 
you're flagging with the libval DANE implementation and will attempt to move 
the gory details of the implementation to our project mailing list. Feel free 
to suggest corrections if I've not captured all the points you were trying to 
bring up.

1. There are issues with the usage 2 implementation. Specifically (paraphrasing 
what you've said earlier):
        a) The code is inefficient
        b) It does not handle "IN TLSA 2 1 0" where only the public key is in 
DNS, and the chain omits the corresponding TA certificate.
        c) if the TLSA record trust anchor is in the middle of the chain, DANE 
verification incorrectly fails.
        d) There needs to be additional name checks on the leaf cert

2. The curl patch is broken with respect to DANE usage 2.

I wasn't able to tell if you were pointing out any specific issues with the 
implementation for the other usage types, but if there are any I'd be happy to 
add them to my list.

Thanks!
Suresh



_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to