On Wed, May 04, 2016 at 12:19:58AM +0200, Daniel Margolis wrote:

> Yeah, that's basically what's in the current draft (albeit with
> underscores-d'oh!).

Yes, with a valid hostname.

> The security tradeoff of allowing the cert to match the fixed hostname is
> somewhat unclear to me,

It is not much of a trade-off.  A domain owner of example.com who
wants to do STS should not delegate or otherwise cede control of
the host or certificates for "smtp-sts-policy.example.com".

> do we want to force senders to validate the certificate manually
> (with a bit of code like John shared) against example.com, or do we just
> assume the second-level host is basically trusted (if you have an SSL cert
> that covers it) and use generic cert validation (allowing  smtp-sts-policy,
> *.example.com, etc)?

Though I am sure that John can whip up safe Python code to do HTTPS
with a hostname<->certificate mismatch, making this necessary is
best avoided.

--
        Viktor.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to