RFC Errata
Found 1 record.
Status: Rejected (1)
RFC 6698, "The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA", August 2012
Note: This RFC has been updated by RFC 7218, RFC 7671, RFC 8749
Source of RFC: dane (sec)
Errata ID: 3594
Status: Rejected
Type: Technical
Publication Format(s) : TEXT
Reported By: Viktor Dukhovni
Date Reported: 2013-04-16
Rejected by: Stephen Farrell
Date Rejected: 2016-09-19
Section 2.1.1 says:
2 -- Certificate usage 2 is used to specify a certificate, or the public key of such a certificate, that MUST be used as the trust anchor when validating the end entity certificate given by the server in TLS. This certificate usage is sometimes referred to as "trust anchor assertion" and allows a domain name administrator to specify a new trust anchor -- for example, if the domain issues its own certificates under its own CA that is not expected to be in the end users' collection of trust anchors. The target certificate MUST pass PKIX certification path validation, with any certificate matching the TLSA record considered to be a trust anchor for this certification path validation.
It should say:
2 -- Certificate usage 2 is used to specify a certificate, or the public key of such a certificate, that MUST be used as the trust anchor when validating the end entity certificate given by the server in TLS. This certificate usage is sometimes referred to as "trust anchor assertion" and allows a domain name administrator to specify a new trust anchor -- for example, if the domain issues its own certificates under its own CA that is not expected to be in the end users' collection of trust anchors. The target certificate MUST pass PKIX certification path validation, with any certificate matching the TLSA record considered to be a trust anchor for this certification path validation. Since clients cannot be presumed to have their own copy of the trust-anchor certificate, when the TLSA association specifies a certificate digest, the TLS server MUST be configured to provide the trust-anchor certificate in its "certificate_list" TLS handshake message.
Notes:
As per discussion on the DANE WG list, this was overtaken by events and so is rejected.
This is critical for interoperability between clients and servers. A client that commits to verify TLSA RR certificate associations will fail if it can't obtain the required certificates. With usage "2" there is no presumption that these are available to the client. If servers are not obligated to provide them the protocol will consistently fail. With non-interactive protocols where there is no user to "click OK", such as SMTP, there is no good work-around and both client and server owners suffer.
--VERIFIER NOTES--
As per discussion on the DANE WG list, this was overtaken by events and so is rejected.