> -----Original Message----- > From: Petr Špaček <[email protected]> > Sent: Tuesday, March 4, 2025 6:11 PM > To: Robert Wagner <[email protected]>; Klaus Darilion > <[email protected]> > Cc: [email protected] > Subject: Re: XoT Testing: TLS peer certificate verification failed > > > I think I have solved the mistery: Bind (or openssl, who ever does the > > validation) requires Subject Alternative Name. Regardless if using the > > hostname or the IP address, they must be in the subject alternative > > name. When using self-signed certificates, it is probably best to put > > both in the SAN. Using the following certificate on the server, the > > validation in dig works fine, regardless if using the hostname or IP > > address. > > The DNS-over-TLS specification insists on this behavior. See > https://datatracker.ietf.org/doc/html/rfc8310.html#section-8.1 > > Quote: > A compliant DNS client MUST only inspect the certificate's > subjectAltName extension for the reference identifier. In > particular, it MUST NOT inspect the Subject field itself.
Thanks for the reference. It seems I should have read the whole RFC before playing around with TLS. 😊 Regards Klaus -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list [email protected] https://lists.isc.org/mailman/listinfo/bind-users

