Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add DANE-TA(2) support #10

Open
buffrr opened this issue Apr 26, 2021 · 1 comment
Open

Add DANE-TA(2) support #10

buffrr opened this issue Apr 26, 2021 · 1 comment
Labels
enhancement New feature or request

Comments

@buffrr
Copy link
Owner

buffrr commented Apr 26, 2021

While PKIX certificate usages are optional, for complete DANE implementation we should support DANE-TA(2). This is useful if server administrators that would like to pin self-signed CA instead of pinning an individual end entity certificate for each service.

From RFC7671

Some domains may prefer to avoid the operational complexity of
publishing unique TLSA RRs for each TLS service. If the domain
employs a common issuing CA to create certificates for multiple TLS
services, it may be simpler to publish the issuing authority as a TA
for the certificate chains of all relevant services. The TLSA query
domain (TLSA base domain with port and protocol prefix labels) for
each service issued by the same TA may then be set to a CNAME alias
that points to a common TLSA RRset that matches the TA

@buffrr buffrr added the enhancement New feature or request label Apr 26, 2021
@yagikota
Copy link
Contributor

RFC7671 also says that DANE-TA(2) and DANE-EE(3) certificate usages are RECOMMENDED.

https://datatracker.ietf.org/doc/html/rfc7671#section-4

Designs in which clients support just the DANE-TA(2) and DANE-EE(3)
certificate usages are RECOMMENDED. With DANE-TA(2) and DANE-EE(3),
clients don't need to track a large changing list of X.509 TAs in
order to successfully authenticate servers whose certificates are
issued by a CA that is brand new or not widely trusted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants