On Fri, Feb 21, 2014 at 03:19:10PM -0500, Stephen Nightingale wrote:

> It is now possible to test from both TLSlite based and GnuTLS based
> clients.

The GnuTLS DANE implementation does not implement DANE-TA(2) or
correctly.  It may also IIRC not do PKIX-TA(0) right either.  The
issue is that the TA is incorrectly constrained to be the immediate
issuer of the leaf certificate.  There may be other problems, I
did not perform a comprehensive code review.

So results from GnuTLS DANE verification can be misleading.

> A golden, canonical CA list would be nice to find. But I guess that its
> non-universal availability is one of the problems of the CA system
> that DANE is aiming squarely at.

There is no such beast.  A form of Goedel's incompleteness theorem
applies: any list of CAs is either incomplete or untrustworthy (or
both).

> The differences between TLSlite and GnuTLS clients highlight the
> fact that there are unresolved interoperability issues among TLS
> implementations.

Default configurations of GnuTLS typically enforce unreasonable
minimum sizes on EDH primes.  Applications have to work around
these with policy overrides.

> I look forward to seeing the newly upgraded OpenSSL
> client with added DANE.  It is quite possible that as an interim step
> before its appearance I will add this DANE-in-the-App implementation
> to pyOpenSSL and/or Twisted.

Such a project should not be undertaken lightly, it is too easy to
get it wrong.

> If you find any glaring errors, I will be embarrassed but thankful.
> If you find any subtle errors I will be impressed and thankful.

A code review is required to rule out subtle errors, glaring errors
may show up in tests if the test bed is sufficiently comprehensive.

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to