Thanks to Todd Short, RFC7250 raw public keys should be available in OpenSSL ~3.2. Applications that use unauthenticated opportunistic TLS, employ DANE or have other ways to avoid X.509 certificates and make do with raw peer public keys can avoid the overhead of receiving and processing certificate chains.
The pull request <https://github.com/openssl/openssl/pull/18185> is still a work in progress, but complete enough for application integration testing. Likely too late for OpenSSL 3.1 (in beta now), but seems likely to land by 3.2. The TODO items on the OpenSSL side are at this point IMHO minor. Review eyeballs of course always appreciated. I have a Postfix branch with a reasonably complete implementation: # posttls-finger -c <domain> posttls-finger: <mxhost>[192.0.2.1]:25: raw public key fingerprint=<...> posttls-finger: <mxhost>[192.0.2.1]:25: Matched DANE raw public key: 3 1 1 <...> posttls-finger: Verified TLS connection established to <mxhost>[192.0.2.1]:25: TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256 based on the the current state of the pull request. -- Viktor. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls