Am 03.12.22 um 01:22 schrieb Daniel Migault:
adding dns-privacy to the thread.
Yours,
Daniel

On Fri, Dec 2, 2022 at 4:35 PM Michael Richardson <[email protected] 
<mailto:mcr%[email protected]>> wrote:
    https://www.ietf.org/rfc/rfc9103.html#name-mutual-tls 
<https://www.ietf.org/rfc/rfc9103.html#name-mutual-tls> tells me how I could
    use mutual TLS to authenticate (and I think, authorize) a zone transfer.

    What it does not tell me is whether there should be any Extended Key Usage
    bits set on the certificates.  Are the WebServer/WebClient required? 
forbidden? tolerated?

Hello,

the e-mail eco-system is fine with the current values.

$ openssl x509 -noout -ext extendedKeyUsage -in /path/to/mailservers/cert.pem
X509v3 Extended Key Usage:
    TLS Web Server Authentication, TLS Web Client Authentication

So I see no reason to add something like "DNSServer/DNSClient" as Extended Key 
Usage

Andreas

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to