On 12.5.2014 22:42, Viktor Dukhovni wrote:
On Mon, May 12, 2014 at 04:21:10PM -0400, Olafur Gudmundsson wrote:

> >The RFC6698-specified lookup key of _<port>._<proto>.<fqdn> is not
> >universally applicable.  It works OK for well known services such
> >as SMTP on ports 25/587 or HTTPS on 443, but is not always well
> >suited to environments in which service ports are dynamically
> >registered.  Also, sometimes the verifier wants to authenticate a
> >TLS client acting on behalf of some domain in an appropriate
> >capacity.
>
>This also works well for services looked up via SRV records.
>As the SRV contains the port number.
>For a protocol that has some kind of other selector of port,
>still at the end of the day the "Server" side has a "known-port"
>to the client, if the service moves from one port to another port OR
>provides service on multiple ports then it is possible that the
>protocol definition for the DANE variant of that protocol can say
>lookup of Authentication records is <Proto>FP at hostname.
I am mostly pointing out that port is not universally the right
choice.  Sometimes a service name or other identifier is more
appropriate, whether this is the case, or what might be a better
lookup key is application dependent.

I totally agree, some guidance how to use DANE in application-specific way would be handy. An example from Kerberos world:

There is a Kerberos extension called PKINIT [RFC 4556] which relies on secure CA certificate distribution. This CA cert is shared by the whole "Kerberos realm". Maybe Kerberos protocol should be extended to look-up CA cert in DNS, e.g. from
_kerberos.[REALM] IN TLSA ...

I'm sure there will be other cases like that.
(Note: I'm not saying that this particular case cannot be solved in other ways, it is just an example.)

--
Petr Spacek  @  Red Hat

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to