Skip to content

Commit

Permalink
Explain the reasons why <hostname> TLS certificate is needed rather…
Browse files Browse the repository at this point in the history
… than `<delegated_hostname>` for SRV delegation. (#3322)

Signed-off-by: Niels Basjes <[email protected]>
  • Loading branch information
nielsbasjes authored and richvdh committed Aug 27, 2021
1 parent 19a96c2 commit cf5b519
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 0 deletions.
1 change: 1 addition & 0 deletions changelogs/server_server/newsfragments/3322.clarification
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Explain the reasons why `<hostname>` TLS certificate is needed rather than `<delegated_hostname>` for SRV delegation.
9 changes: 9 additions & 0 deletions content/server-server-api.md
Original file line number Diff line number Diff line change
Expand Up @@ -134,6 +134,15 @@ to send. The process overall is as follows:
8448 and a `Host` header containing the `<hostname>`. The target
server must present a valid certificate for `<hostname>`.

{{% boxes/note %}}
The reasons we require `<hostname>` rather than `<delegated_hostname>` for SRV
delegation are:
1. DNS is insecure (not all domains have DNSSEC), so the target of the delegation
must prove that it is a valid delegate for `<hostname>` via TLS.
2. Consistency with the recommendations in [RFC6125](https://datatracker.ietf.org/doc/html/rfc6125#section-6.2.1)
and other applications using SRV records such [XMPP](https://datatracker.ietf.org/doc/html/rfc6120#section-13.7.2.1).
{{% /boxes/note %}}

The TLS certificate provided by the target server must be signed by a
known Certificate Authority. Servers are ultimately responsible for
determining the trusted Certificate Authorities, however are strongly
Expand Down

0 comments on commit cf5b519

Please sign in to comment.