Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DANE-TA mode "2 0 0" doesn't work with CA cert omitted from chain sent in TLS handshake #2

Open
richfelker opened this issue May 19, 2020 · 0 comments

Comments

@richfelker
Copy link
Owner

RFC 7671 introduced a new allowance (section 5.2) that servers may omit the trust anchor certificate from the cert chain sent to the client if it's included in full (not hash) in the TLSA record and all TLSA records are of this form ("2 0 0"). This is a rather awful usage, since it requires gigantic DNS messages, but it should be supported since the standard allows it. I believe the right way to do it is by pre-processing the TLSA records to put the trust anchor(s) they define into a chain to pass into br_ssl_client_init_full. I'm not doing it yet since this is a low-priority feature, but documenting it here so it can be done later.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant