-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

How to use TLSA "2 s m" , "3 s m" ?

Please correct me anytime, my understanding is:

zone/domain-owners/holders can use simple tools like openssl/gnutls,
to create their own various types of self-signed private (aka:
non-public) CA cert or server certs, and then combine such with
DNSSEC + DANE based implementation in DNS records, when basic/simple
level of HTTPS/TLS secured web solution/service is expected.

For those (above) approaches to work:

* domain-owners/holders can, either use TLSA "2 s m" when they want
to use their own CA cert and other certs based on that CA cert
(these approach is aka : TA, non-public CA cert, self-signed private
CA cert, etc),

* or, domain-owners/holders can use TLSA "3 s m" when they want to
provide a secure service by using a very specific & single server
cert from a very specific server (these approach is aka :
domain-issued cert, domain cert, EE cert, server cert, no cert
chain, etc).

Since domain-owner's/holder's self created certificate is not
included in any web-browser software, when any visitor/user will try
to visit such site/zone securely using HTTPS/TLS encrypted
connections, then web-browser will ask/prompt visitors/users with 1
or more questions/messages that if visitor/user wants to
load+trust+use that unknown cert from that site or not.

cert = certificate , aka = also known as , CA = Certificate
Authority , TA = Trust Anchor, EE = end entity.

And, when higher level of secured solution is expected AND when
extra info are needed to be shown to visitors/users verified by a
mutually/known Trusted notarizing/vouching type of party, then TLSA
"u s m" would be "0 s m" or "1 s m". These type of cert comes from
public CA cert based company, such CA cert are usually pre-included
in web-browsers or in client software, and usually these companies
charge a fee/money to issue such domain cert or intermediate CA cert.

Both of these ("0 s m" , "1 s m") solutions are favored by
web-browser developing groups, so they kept it in such a condition
that : it will not create any extra warning and it will not
ask/prompt visitors/users with a question/message, when a HTTPS/TLS
based secured site is visited or web service is used.

Since, domain-owner/holder has publicly declared what exact cert
he/she/they trusts using TLSA "2 s m" or "3 s m" based dns rr, then
why web-browser will ask question/prompt visitor/user ? !
it is not unknown anymore, it is already+clearly declared+known+shown.

More practical use cases, guidance are needed to be shown publicly
for both "3 s m" and "2 s m" cases, specially for "2 s m" as it
involves extra configurations.

- - - - - - - - - - - - - - - - - - - - - - - - - -

For example, I own 3  domain-names which are related, and want to
use a common root CA cert for all these 3 domains/zones, so i did
these, as i have 3 set of server computers tuned for 3 different
type of tasks, and located in 3 different network locations :

Self-signed private non-public root CA cert (My_root_CA_cert) -->
intermediate high-strength CA cert (My_i_CA_1_cert) -->
dom1.tld_cert --> { www.dom1.tld_cert , m.dom1.tld_cert ,
mail.dom1.tld_cert , mail2.dom1.tld_cert , ns.dom1.tld_cert ,
ns2.dom1.tld_cert , livemsg.dom1.tld_cert }

and then i created for dom2.tld :

intermediate high-strength CA cert (My_i_CA_1_cert) -->
dom2.tld_cert --> { www.dom2.tld_cert , m.dom2.tld_cert ,
mail.dom2.tld_cert , mail2.dom2.tld_cert , ns.dom2.tld_cert ,
ns2.dom2.tld_cert , livemsg.dom2.tld_cert }

and so on.

Physical_Server_1 has:
* 'www', 'ns' and 'mail' hosts of "dom1.tld" in 3 separate VM instance.
* above hosts of "dom2.tld".
* above hosts of "dom3.tld".

Physical_Server_2 has:
* 'm', 'ns2' and 'mail2' hosts of "dom1.tld" in 3 separate VM instance.
* above hosts of "dom2.tld".
* above hosts of "dom3.tld".

Physical_Server_3 has:
* 'livemsg' host of "dom1.tld" in a VM instance, * 'livemsg' host of
"dom2.tld", * 'livemsg' host of "dom3.tld"

"dom1.tld" is for providing certain set of tasks/services/projects
01. "dom2.tld" is for providing another set of
tasks/services/projects 02. "dom3.tld" is for providing images,
videos, etc and may be placed in another server location.

If Physical_Server_01 is restarted or updated or downed or
disconnected for some reason, all essential services will be
delivered to visitors/users from redundant services from
Physical_Server_02.

So how many & what DNS RR will "www" host/server for "dom1.tld" will
exactly need/have for providing DANE based HTTPS service ?

In apache/nginx server software (HTTPS service daemon), in what
order it will have to provide those tls/ssl certs ?

What else need to be configured ?

Thanks in advance,

- -- Bright Star.
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJRpcd1AAoJEID2ikYfWSP6a0IP/jnU05dv1SYZ2cALBx1x0klE
cYa1OzMPSkZiS04kzTBcu/FH9X0QHKzY4qFDgloV21APRRG/JYEPrhRMgdqERQaK
qP5+w91w9lhKNXv1wvkwsPjXuYu7S/ULg1Lco6KeCpcZpssemE/lYuPevnGv+RCF
upEJnJq5Fa+xT2bxSmClUvnH3e70n614BwHoh+64a5C03S235AbsauAVy2z0wWg/
lNxbevfUuFr7jzSNb3frvVxr0Dwf53aafRuN2i8T1I0Gj2ss6KqFpdyFbpnWY3GP
9ZIR9UAqL2GgryB6t11rg5SZ3APDc4hFYPo4obhJ7V9JNlTGln3wfvdwQhwwuAzt
ayaY3iO9yzUHhIsBYGjPbSmybkvxfdgEpWQ8GHVUwcONk6dajZ28YWCdIG02LF0f
6pGr19MfSF8MJngKYB5FhAFs0HqJ2KieS7ClmJ5GF9gj3Kbl9BKNnCF7HQVY/sMd
MRPKYfhytA5+rSjkzorRR2f4lv26wboi9RlONdtJMUru1AH/GsWUcce+myyH+5gN
6mLKXQ+yBJsXgPFBpO2Ofup6Fs4jVEA54YLahcidBkEzEtKGbl5fbAvy5t7S90S5
cwaBzHIAVFFKubd8siCjZfIdr3MRBPblC2Xxdc2vlIoo4qTBA/zXY9yVitNMinYG
ISuDUPn39Y3XW5ZsZhpZ
=9MYe
-----END PGP SIGNATURE-----
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to