> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf Of
> Viktor Dukhovni
> Sent: Monday, March 04, 2013 9:25 PM
> To: [email protected]
> Subject: Re: [dane] Certificate usages 1/3 and subject name checks
> 
> On Mon, Mar 04, 2013 at 08:25:00PM -0500, Jim Schaad wrote:
> 
> > For types 0, 1 and 2 - the DANE check is in addition to ALL existing
> > PKI checks.
> 
> So the client validates two separate cryptographically signed name
bindings
> (DNSSEC and EE cert contents), just to maximize the odds of failure?  Why?
> What is gained by such checks?

Yes - we want to maximize the security checks that are done.  In this case
the DANE checks are additional checks.  If you don't like it - don't use
these values.

> 
> Does the group believe that in practice most TLS applications do CRL
and/or
> OCSP checks and it is operationally easier to publish a timely revocation
via a
> public CA than to maintain sensibly short RRSIG time limits and update
one's
> own DNS when a key is lost?
> 
> If this is not the case, then why doubt the DANE binding?
> 
> [ One data point if you like: though Postfix has supported TLS for
>   a decade, it doesn't and won't have CRL or OCSP support, but it
>   will soon have DANE support. ]
> 
> > For type 3 - I would agree that no PKI checks are to be done.  That
> > would include the name matching check.
> 
> Thanks, I hope this is the consensus view of the working group.
> 
> --
>       Viktor.
> _______________________________________________
> dane mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dane

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to