Thanks to Todd Short, RFC7250 raw public keys should be available in
OpenSSL ~3.2.  Applications that use unauthenticated opportunistic TLS,
employ DANE or have other ways to avoid X.509 certificates and make do
with raw peer public keys can avoid the overhead of receiving and
processing certificate chains.

The pull request <https://github.com/openssl/openssl/pull/18185> is
still a work in progress, but complete enough for application
integration testing.  Likely too late for OpenSSL 3.1 (in beta now), but
seems likely to land by 3.2.  The TODO items on the OpenSSL side are
at this point IMHO minor.  Review eyeballs of course always appreciated.

I have a Postfix branch with a reasonably complete implementation:

    # posttls-finger -c <domain>
    posttls-finger: <mxhost>[192.0.2.1]:25: raw public key fingerprint=<...>
    posttls-finger: <mxhost>[192.0.2.1]:25: Matched DANE raw public key: 3 1 1 
<...>
    posttls-finger: Verified TLS connection established to 
<mxhost>[192.0.2.1]:25:
        TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
        key-exchange X25519
        server-signature RSA-PSS (2048 bits)
        server-digest SHA256

based on the the current state of the pull request.

-- 
    Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to