mirror of
https://github.com/matrix-org/matrix-spec
synced 2025-12-20 16:38:37 +01:00
Explain the reasons why <hostname> TLS certificate is needed rather than <delegated_hostname> for SRV delegation. (#3322)
Signed-off-by: Niels Basjes <niels@basjes.nl>
This commit is contained in:
parent
19a96c2484
commit
cf5b519963
|
|
@ -0,0 +1 @@
|
|||
Explain the reasons why `<hostname>` TLS certificate is needed rather than `<delegated_hostname>` for SRV delegation.
|
||||
|
|
@ -134,6 +134,15 @@ to send. The process overall is as follows:
|
|||
8448 and a `Host` header containing the `<hostname>`. The target
|
||||
server must present a valid certificate for `<hostname>`.
|
||||
|
||||
{{% boxes/note %}}
|
||||
The reasons we require `<hostname>` rather than `<delegated_hostname>` for SRV
|
||||
delegation are:
|
||||
1. DNS is insecure (not all domains have DNSSEC), so the target of the delegation
|
||||
must prove that it is a valid delegate for `<hostname>` via TLS.
|
||||
2. Consistency with the recommendations in [RFC6125](https://datatracker.ietf.org/doc/html/rfc6125#section-6.2.1)
|
||||
and other applications using SRV records such [XMPP](https://datatracker.ietf.org/doc/html/rfc6120#section-13.7.2.1).
|
||||
{{% /boxes/note %}}
|
||||
|
||||
The TLS certificate provided by the target server must be signed by a
|
||||
known Certificate Authority. Servers are ultimately responsible for
|
||||
determining the trusted Certificate Authorities, however are strongly
|
||||
|
|
|
|||
Loading…
Reference in a new issue