Re: [certid] What DNS-ID if also using a DNS-SRV?

Paul Hoffman <paul.hoffman@vpnc.org> Sat, 19 June 2010 14:04 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B1F7E3A6831 for <certid@core3.amsl.com>; Sat, 19 Jun 2010 07:04:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.658
X-Spam-Level:
X-Spam-Status: No, score=0.658 tagged_above=-999 required=5 tests=[AWL=0.104, BAYES_50=0.001, HELO_MISMATCH_COM=0.553]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WjPijhMWTtvR for <certid@core3.amsl.com>; Sat, 19 Jun 2010 07:04:43 -0700 (PDT)
Received: from hoffman.proper.com (Hoffman.Proper.COM [207.182.41.81]) by core3.amsl.com (Postfix) with ESMTP id DFAB23A69F2 for <certid@ietf.org>; Sat, 19 Jun 2010 07:04:42 -0700 (PDT)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by hoffman.proper.com (8.14.4/8.14.3) with ESMTP id o5JE4lRP072574 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 19 Jun 2010 07:04:48 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0624082bc8427e79bd60@[10.20.30.158]>
In-Reply-To: <4C1CABA1.2050205@isode.com>
References: <p062408bbc8388055fb6d@[10.20.30.158]> <4C1CABA1.2050205@isode.com>
Date: Sat, 19 Jun 2010 07:04:45 -0700
To: Alexey Melnikov <alexey.melnikov@isode.com>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Cc: certid@ietf.org
Subject: Re: [certid] What DNS-ID if also using a DNS-SRV?
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Jun 2010 14:04:43 -0000

At 12:36 PM +0100 6/19/10, Alexey Melnikov wrote:
>Hi Paul,
>
>Paul Hoffman wrote:
>
>>  1.  The certificate MUST include a "DNS-ID" (i.e., a subjectAltName
>>      identifier of type dNSName).
>>
>>  2.  If the service using the certificate deploys a technology in
>>      which a server is discovered by means of DNS SRV records
>>      [DNS-SRV] (e.g., this is true of [XMPP]), then the certificate
>>      SHOULD include an "SRV-ID" (i.e., an instance of the SRVName form
>>      of otherName from the GeneralName structure in the subjectAltName
>>      as specified in [SRVNAME]).
>>
>>If 2 is true, what is the value of the required DNS-ID?
>>
>One or more hostname for machines that would provide the specified service. I.e. most likely some/all hostnames from the output of DNS SRV lookup, but I can think of some examples where other hostnames can be used in addition to or instead of these. E.g. a machine on internal network, hostname of a NAT box, etc.

So a cert says "the hostname of this server is www.example.com, and you can look up the hostname for the server using SRV"? What does that mean in a security context? If I get back one name of yyy.example.com, does that mean that the host has both names, or that there was a lookup error?

--Paul Hoffman, Director
--VPN Consortium