+1

Plus, this is for TLS, and in TLS, the server is required to present a cert
chain.  So the situation cited in the erratum can't happen.



On Tuesday, April 16, 2013, John Gilmore wrote:

> > This errata is currently posted as "Reported". If necessary, please
> > use "Reply All" to discuss whether it should be verified or
> > rejected. When a decision is reached, the verifying party (IESG)
> > can log in to change the status and edit the report, if necessary.
>
> I think it should be rejected.
>
> There are numerous ways to make any protocol fail, by selecting
> mutually incompatible options.  The draft does not have to require
> that users of DANE-TLS configure their servers to work; they are free
> to configure them to fail.  Similarly, there are often numerous ways
> to make any protocol work, by selecting different combinations of
> compatible options.  The RFC does not have to require ("MUST") a
> particular combination, nor should it do so.
>
> The issue is certificate usage "2", defining a new trust anchor.
>
> To make a system interoperate with DANE-TLS clients when publishing
> TLSA records that specify usage 2, a server operator and domain
> administrator must:
>
>   *  Supply the entire trust anchor certificate in their TLSA record,
>      specifying selector 0 (full certificate) and matching type 0
>      (exact match); or
>
>   *  Configure their TLS server to supply the relevant trust anchor
>      certificate in the certificate list that it sends [the option
>      that Mr. Dukhovni suggests]; or
>
>   *  Supply the public key of the trust anchor in their TLSA record,
>      specifying selector 1 (Subject Public Key Info) and matching type 0
>      (exact match), allowing any certificate(s) signed by the trust anchor
>      to be validated; or
>
>   *  Only interact with clients who already have a copy of the trust
>      anchor certificate or public key.  Some applications may be
>      designed or configured to work only with a restricted set of
>      clients.
>
> Any or all of these options are valid and will result in DANE-TLS
> interoperability.  The erratum should be rejected.
>
>         John
> _______________________________________________
> dane mailing list
> [email protected] <javascript:;>
> https://www.ietf.org/mailman/listinfo/dane
>
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to