Deutsch   English   Français   Italiano  
<vir4rb$kfq$1@tncsrv09.home.tnetconsulting.net>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: Grant Taylor <gtaylor@tnetconsulting.net>
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 4 Dec 2024 20:57:47 -0600
Organization: TNet Consulting
Message-ID: <vir4rb$kfq$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
 <vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
 <wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
 <vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
 <wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
 <viobpa$s79$2@tncsrv09.home.tnetconsulting.net> <viod8c$fp5p$1@dont-email.me>
 <vion3k$fau$1@tncsrv09.home.tnetconsulting.net> <vioqhn$mcr7$1@dont-email.me>
 <viquuk$l6k$1@tncsrv09.home.tnetconsulting.net>
 <vir1jv$17csf$4@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 5 Dec 2024 02:57:47 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
	logging-data="20986"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <vir1jv$17csf$4@dont-email.me>
Bytes: 3882
Lines: 66

On 12/4/24 20:02, Lawrence D'Oliveiro wrote:
> Which part of “depends on” are you having trouble with?

TLS doesn't /depend/ /on/ any domain information from the client.

It's perfectly possible to use a certificate that has nothing to do with 
the domain name the client was connected to.

N.B. that's entirely independent of if the client will continue using 
the connection after seeing that the name in the certificate (CN and / 
or SAN) doesn't match the domain name that the client thought it was 
connecting to.

But the server can use whatever certificate it wants to completely 
independently of the domain name that the client uses.  Hence there is 
no dependency.

There is correlation and usually mutual agreement.  But that's not a 
requirement.

> Which cannot be sent encrypted over HTTP because HTTP encryption
> hasn’t been set up yet.

Server Name Indication is part of TLS, not HTTP.  HTTP comes /after/ SNI.

> They don’t do “virtual hosting”, where multiple domains share 
> the same IP address, and is an important feature of HTTP. That’s 
> why there is a specific problem with that.

Link - Postfix — Multiple domain SSL certificates | by Dave Teu | Better 
Coder | Medium
  - 
https://medium.com/better-coder/postfix-multiple-domain-ssl-certificates-89c9f186ed73

Link - Dovecot SSL configuration — Dovecot documentation
  - 
https://doc.dovecot.org/2.3/configuration_manual/dovecot_ssl_configuration/#with-client-tls-sni-server-name-indication-support

> There are two rival specs for solving this: DNS-over-TLS, and 
> DNS-over-HTTPS.

DoT & DoH are about encrypted communications with a DNS server.  The are 
completely independent of of TLS & SNI.  What's more is that neither 
DoT, nor DoH can do shit about ensuring that the data sent through the 
DoT / DoH channel is valid.  It's trivial to lie through DoT & DoH. 
Unless client's use DNSSEC through DoT & DoH to catch the lie.

You can even use SNI while establishing a DoH session.

> DNS-over-TLS (DoT) is a separate protocol that can be identified 
> as such by firewalls, while DNS-over-HTTPS (DoH) is essentially 
> indistinguishable from any other HTTPS traffic.

DoH is still subject to the SNI exposure and can be filtered that way.

It's also possible to do traffic analysis to identify & block likely DoH 
traffic.

> DoH has become quite controversial.

This doesn't have anything to do with TLS / SNI, so I'm not responding 
to it.



-- 
Grant. . . .