On Fri, Jun 24, 2022 at 07:04:28PM +0300, Yaron Sheffer wrote:
> * Similarly, it is not clear to me whether certs obtained through DANE
> are in or out of scope.
I may be able to help, but I am struggling to understand the question in
sufficient detail. Can you be more specific about:
- What do you mean by "certs obtained through DANE" (typically the
certs are obtained from the TLS server certificate message, and
matching type Full(0) certificates in the TLSA record are very
rare)? Even then, these are semantically not much different from
those sent in the server certificate message, other than being
asserted or required trust anchors.
- Did you perhaps mean *validation* of certificates (received in the
usual way) via DANE TLSA records? That is, are DANE-based
expected to adhere to all the normative text in the draft?
The main thing that's different about DANE is that in some
application protocols Unknown Key Share issues are not believed to
be a concern. And in these cases EE TLSA records that specify
only the certificate or public key hash validate a presented
certificate with a matching public key regardless of lack of
matching presented identifiers or inception / expiration dates.
Validation via DANE trust-anchors is the same as validation via
local WebPKI trust anchors, except that in the case DANE-TA(2) the
trust-anchor certificate must appear in the server certificate
chain when the TLSA record provides just a hash of its SPKI (or
even just the SPKI, which I expect some implementations might not
support, though this is supported in OpenSSL).
- Either way, what is it that might then be in or out of scope?
--
Viktor.
_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta