On Sun, Jun 01, 2014 at 10:04:13PM -0400, Tom Gindin wrote:

> On a technical, or at least quasi-technical point, doesn't usage 3 say
> that it must match the "end-entity certificate given by the server in 
> TLS"?

Usage DANE-EE(3) with selector SPKI(1) matches the subject public
key info of the peer.  While as specified in 6698 this SPKI is
expected to be adorned in X.509 finery, it is a natural extension
to allow the same association to apply to bare public keys.

There is simply no need for a new certificate usage here (one for
which selector 0 would make no sense).  Indeed it would force
server operators to needlessly publish the SPKI digest twice:

        example. IN TLSA 3 1 1 {blob}
        example. IN TLSA 4 1 1 {blob}

for no good reason.

> Certificate usage 4 is used to specify a certificate, or the 
> public key of such a certificate, that MUST match the public key given by 
> the server in TLS or TLSA.  Unlike  certificate usage 3, this usage 
> implies that the server supplies a key with neither validity dates nor 
> name in the session negotiation.

Those qualifications already apply to usage 3 (ops draft document
which specifies this to be published soon), with SPKI(1), DANE-EE(3)
is already a bare key usage, just sometimes embedded in an X.509
cert.  There is no need for a usage 4 (yet), at least not for this
use-case.

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to