> This is surprising to me. What data are you basing this statement on [...]?

Nothing particularly concrete, but I've heard a bunch about wanting to forego 
"normal" CA certs for DANE-EE. Re browsers, I know of at least one extension 
that tries to verify DANE[1].

> getting the DNSSEC stuff done correctly with the all the keys etc to verify 
> that the records we get are legitimate for the domain.

Yeah I'm personally proposing that curl shouldn't concern itself with this, 
asking the user to use a resolver that verifies DNSSEC is fairly reasonable to 
me.
In the case of the ad-hoc DoH resolver for ECH (and c-ares), it's probably best 
to "just" enable dnssec validation or fail the request entirely if not 
available/possible.

> Maybe you can start easy by explaining the libcurl API you have envisioned 
> for this, and what actions that would trigger?

Sure, if we go the route of my proof-of-concept, the user would have to provide 
the TLSA/DANE records (wirefmt base64'd) via some CURLOPT[2]; a nicer extension 
could have libcurl do the resolution itself if requested, trusting the 
underlying resolver for DNSSEC validation.

Alternatively I can see an API that would take the records as parsed fields, 
but I think it's worth having more "generic" RR support - I know at least MX 
is/was being discussed at some point.

> It looks like you use c-ares for the DNS record fiddling, right?

Right, for ease of implementation really, though parsing that particular record 
type isn't _too much_ work in isolation.


[1]: <https://addons.mozilla.org/en-US/firefox/addon/dnssec-dane-padlock>
[2]: 
<https://github.com/alimpfard/ladybird/blob/d82765d82bbb823a0d56f75b9a13180bd5dd383c/Services/RequestServer/ConnectionFromClient.cpp#L446>

Am 1. September 2025 15:53:41 MESZ schrieb Daniel Stenberg <[email protected]>:
>On Mon, 1 Sep 2025, Ali Mohammad Pur Fard via curl-library wrote:
>
>Thanks for your interest and willingness to help improving curl!
>
>> Since DANE/TLSA has become much more common as a replacement for PKI
>
>This is surprising to me. What data are you basing this statement on and what 
>PKI do you speak of here? The popular browsers don't support DANE, so 
>deploying it for the web seems like a lot of work for a rather small audience.
>
>> In particular, I'm mostly interested in having libcurl expose a way for 
>> users to provide (or request the use of) a set of TLSA records, or somehow 
>> communicate that DANE should be used for the connection (as I'm trying to 
>> have DANE be a native alternative to PKI in Ladybird[1]). The request side 
>> of this is reasonably straightforward with openssl, at least.
>
>We added "Support DANE" to the TODO document already in August 2012. I think 
>it would be cool to get support in and I know there is at least some interest 
>"out there".
>
>We once had an attempt and I recall that we then had some challenges on 
>getting the DNSSEC stuff done correctly with the all the keys etc to verify 
>that the records we get are legitimate for the domain.
>
>> I do have a patchset[2] that implements this as a proof of concept
>
>Maybe you can start easy by explaining the libcurl API you have envisioned for 
>this, and what actions that would trigger?
>
>It looks like you use c-ares for the DNS record fiddling, right?
>
>-- 
>
> / daniel.haxx.se || https://rock-solid.curl.dev

--
Cheers,
~Ali Mohammad Pur
-- 
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to