Skip to content

Commit e7e0455

Browse files
authored
Explain the reasons why <hostname> TLS certificate is needed rather than <delegated_hostname> for SRV delegation. (#3322)
Signed-off-by: Niels Basjes <[email protected]>
1 parent a03ea34 commit e7e0455

File tree

2 files changed

+10
-0
lines changed

2 files changed

+10
-0
lines changed
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Explain the reasons why `<hostname>` TLS certificate is needed rather than `<delegated_hostname>` for SRV delegation.

content/server-server-api.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,15 @@ to send. The process overall is as follows:
134134
8448 and a `Host` header containing the `<hostname>`. The target
135135
server must present a valid certificate for `<hostname>`.
136136

137+
{{% boxes/note %}}
138+
The reasons we require `<hostname>` rather than `<delegated_hostname>` for SRV
139+
delegation are:
140+
1. DNS is insecure (not all domains have DNSSEC), so the target of the delegation
141+
must prove that it is a valid delegate for `<hostname>` via TLS.
142+
2. Consistency with the recommendations in [RFC6125](https://datatracker.ietf.org/doc/html/rfc6125#section-6.2.1)
143+
and other applications using SRV records such [XMPP](https://datatracker.ietf.org/doc/html/rfc6120#section-13.7.2.1).
144+
{{% /boxes/note %}}
145+
137146
The TLS certificate provided by the target server must be signed by a
138147
known Certificate Authority. Servers are ultimately responsible for
139148
determining the trusted Certificate Authorities, however are strongly

0 commit comments

Comments
 (0)