On Fri, Dec 12, 2014 at 11:24:06AM +0100, Jonas Wielicki wrote:

> > Great care must be exercised here, for example, after PKIX 
> > validation succeeds, a naive request to OpenSSL for the peer's 
> > chain returns the list of wire certificates, not the validated 
> > chain.
> 
> But I assume that one can obtain the actually validated chain using
> the verify_callback mechanism provided by OpenSSL?

Yes with usage 0/1, with usage 2 the traditional chain building
code cannot be used as-is.

> > * Usage DANE-TA(2) is the most difficult to support, and "toy" 
> > implementations neglect to perform chain construction and integrity
> > checks or perform name checks, apply name constraints, depth
> > constraints, handle IDNA conversion of hostnames, ...
> 
> I wonder whether adding certificates provided by DANE-TA records
> (assuming we have a Cert+Full record) to the trusted store of the SSL
> implementation (only for that particular connection) and check whether
> these have been used after the fact would be sufficient?.

It is not "sufficient", as these are not necessarily self-signed,
and OpenSSL (before 1.0.2) does not have a way to validate chains
that start with trust-anchor that is not self-signed.  Postfix can
also verify chains via a "2 1 0 <public key>" TLSA record, even
when the chain does not include the associated certificate!

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to