On Thu, Jan 14, 2016 at 2:25 PM, Rob Austein <s...@hactrn.net> wrote:

>
> I would recommend that you think about how any of these proposed
> schemes interact with DNS wildcards.  Yes, some people use wildcards
> with TLSA RRs, or even with CNAME RRs pointing to TLSA RRs: this
> allows one to express "every service on machine foo.example.org uses
> the same certificate" concisely.
>

Sure. For client credentials, the most natural use of wildcards I envision
would be to specify that a given client uses the same credentials for all
application protocols. In our proposed form, this can be accomplished
by replacing the leading _app label with a wildcard. Or by aliasing a
defined set of per-app names to a generic name.

So if one buys George's analysis of this as a role vs protocol
> distinction, the question becomes whether it's more useful to be able
> to group by roles or by protocols.  That is, are you more likely to
> want to say "all roles for protocol foo use the same certificate",
> "all protocols for role foo use the same certificate", or just not
> allow any kind of grouping here at all.  The first of these makes the
> most sense to me, YMMV.
>

I assume here that role means a "client", "server" or other role for the
same application protocol.

We also need to define what protocol means - is it the application
protocol or the transport protocol? If considering both independently,
we have additional possible groupings.

But yes, I agree that making it easy to group the commonly expected
ways should be a goal. Assuming the base domain name will be the
same in each grouping, "all protocols for role foo" should be expressible
with wildcards. "All roles for application protocol Foo" is a bit more
challenging, since the client TLSA record uses a symbolic name for the
application whereas the server TLSA record uses a port number. Assumptions
could be made about applications using well known ports I guess, but
that doesn't offer a complete solution.

-- 
Shumon Huque
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to