Yo Richard!

On Thu, 28 Mar 2019 18:36:54 -0500
Richard Laager via devel <devel@ntpsec.org> wrote:

> On 3/28/19 6:26 PM, Hal Murray via devel wrote:
> > 
> > Gary said:  
> >>> There is a downside. Every time it changes, you have to take
> >>> a leap of faith when you re-pin it, rather than getting normal
> >>> CA validation.  
> >> You miss the point, this is addition to normal CA validation, not
> >> an alternative to it.  Just like HPKP.   
> > 
> > I'm missing something important.  Why would I need additional
> > validation? Isn't normal certificate validation good enough?  
> 
> In normal validation, ANY root CA can sign a certificate for my domain
> and it will be trusted by clients.

Yes, a bad thing.  Why DANE and HPKP were invented.

> I might want to pin the NTS association for ntp1.wiktel.com to require
> that its certificate be issued by Let's Encrypt. Or, I might want to
> pin it to my internal CA.

Yup.  Now you're getting it.  Thus the 4 DANE types.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgpZsUfWKRcsd.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to