generated from martinthomson/internet-draft-template
-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #71 from oej/issue-68
Add reference to new RFC for internationalised email addresses
- Loading branch information
Showing
1 changed file
with
2 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -173,11 +173,11 @@ Decoupled applications benefit from an out-of-band public key discovery mechanis | |
|
||
The client sets up a TLS connection to a server, attaches a client certificate with one | ||
subjectAltName element dNSName indicating the DNS owner name of the client {{?RFC5280}}. | ||
If the client is a user, their user identity is added in one subjectAltName element otherName holding their uid attribute {{?RFC4519}}. | ||
If the client is a user, their user identity is added in one subjectAltName element | ||
otherName holding their uid attribute {{?RFC4519}} or email address {{?RFC9598}}. | ||
|
||
In the TLS connection the DANE-client-id extension is used to tell the server to use the certificate dNSName to find a DANE record including the public key of the certificate to be able to validate. | ||
If the server can validate the DNSSEC response, the server validates the certificate and completes the TLS connection setup. | ||
(PKIX offers rfc822Name with [email protected] as alternative for a user's uid & dNSName, but it is limited to ASCII and suggests email only). | ||
|
||
Using DANE to convey certificate information for authenticating TLS clients gives a not-yet-authenticated client the ability to trigger a DNS lookup on the server side of the TLS connection. | ||
An opportunity for DDOS may exist when malicious clients can trigger arbitrary DNS lookups. | ||
|