On 04/12/2017 10:04 PM, Alice Wonder wrote:
*snip*

Meant to type "third party *signed* DS records"

Okay this is how I would do it. I'm new to list and kind of a nobody but...

DANE is used to secure the long-term private key as an alternate to commercial DV certificates.

For OV and EV level of confidence - a company can get an x.509 certificate using their zone as the CN and extensions specifying the DS records that is signed by a trusted third party commercial CA.

This x.509 is only used as verification that the DNSSEC validated DS records are genuine and to give the consumer confidence the zone has been validated using OV or EV standards. It does not replace DS records secured by DNSSEC, only adds a second validation in addition to DNSSEC. Only OV and EV make sense for this type of x.509.

To compromise a zone protected by this second x.509 a bad actor would need to both obtain a fraudulently signed x.509 from a trusted authority *and* get fraudulent DS records into the zone's parent zone.

I'm not an expert on TLS but I think this would even work with existing TLS, just send this x.509 along with the DANE protected x.509 as part of the TLS handshake.

Would that work and solve the problem?

_______________________________________________
dane mailing list
dane@ietf.org
https://www.ietf.org/mailman/listinfo/dane

Reply via email to