Viktor Dukhovni wrote:
> Matt Miller wrote:
>>
>>> DANE-EE(3) CU records need to have meaningful semantics for the 
>>> publisher.  For example for a publisher to use the same
>>> certificate for many SRV hosts or without worrying about using a
>>> matching name, the use of non-use of name checks must be specified
>>> precisely.
>>> 
>>> Therefore I would suggest that the "MAY be ignored" in the second 
>>> paragraph of section 5, should be changed to "MUST be ignored". 
>>> Otherwise, the published TLSA records have unknown semantics.
>> 
>> Thank you for the feedback, Viktor.  These comments make sense to me.
>> We'll try to get an update out before the cutoff to address them.
> 
> Thanks.  You could mention that both name checks and key usage are
> effectively handled by the TLSA record for DANE-EE(3).

I'm sorry, but this simply isn't true today, I do not believe that
this is (nor should be) the intention of DANE, and I'm strongly
opposed to changing that part of the implementations.

DANE it self is about an alternative means to establish (a chain of) trust
to a peer entity, and the usage type 3 only overrides the server endpoint
identification that was originally described in rfc2818 section 3.1

  http://tools.ietf.org/html/rfc2818#section-3

and is described in a more elaborate fashion in rfc6125

  http://tools.ietf.org/html/rfc6125


DANE does NOT invalidate the keyUsage checks and requirements that are
normally part of TLS itself and described here:

  http://tools.ietf.org/html/rfc5246#page-56


There are a number of TLS protocol stacks that will check the
KeyUsage of X.509 certificates that are conveyed through TLS certificate
handshake messages, independent of how the application caller decides
to perform server endpoint identification and how the application caller
determines its trust.


-Martin

_______________________________________________
dane mailing list
dane@ietf.org
https://www.ietf.org/mailman/listinfo/dane

Reply via email to