File tree Expand file tree Collapse file tree 2 files changed +10
-0
lines changed
changelogs/server_server/newsfragments Expand file tree Collapse file tree 2 files changed +10
-0
lines changed Original file line number Diff line number Diff line change 1+ Explain the reasons why `<hostname>` TLS certificate is needed rather than `<delegated_hostname>` for SRV delegation.
Original file line number Diff line number Diff line change @@ -134,6 +134,15 @@ to send. The process overall is as follows:
134134 8448 and a ` Host ` header containing the ` <hostname> ` . The target
135135 server must present a valid certificate for ` <hostname> ` .
136136
137+ {{% boxes/note %}}
138+ The reasons we require ` <hostname> ` rather than ` <delegated_hostname> ` for SRV
139+ delegation are:
140+ 1 . DNS is insecure (not all domains have DNSSEC), so the target of the delegation
141+ must prove that it is a valid delegate for ` <hostname> ` via TLS.
142+ 2 . Consistency with the recommendations in [ RFC6125] ( https://datatracker.ietf.org/doc/html/rfc6125#section-6.2.1 )
143+ and other applications using SRV records such [ XMPP] ( https://datatracker.ietf.org/doc/html/rfc6120#section-13.7.2.1 ) .
144+ {{% /boxes/note %}}
145+
137146The TLS certificate provided by the target server must be signed by a
138147known Certificate Authority. Servers are ultimately responsible for
139148determining the trusted Certificate Authorities, however are strongly
You can’t perform that action at this time.
0 commit comments