-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bind-9.9.2-P1 incompatible? #4
Comments
I can confirm that chain.py doesn't seem to recognize when a TLSA record is in a zone. I tried with several of the sites known to have valid TLSA records that are listed here:
For instance, I can see a valid TLSA record if I do:
However, when I try to run chain.py I get the same messages reported here:
Separately I raised issue #5 to document the fact that the example for chain.py shown in README.md doesn't work correctly on my system. |
I also get this: but https://dnssec.imperialviolet.org shows valid certificate in last Chrome. |
You're correct that BIND's recent support for the TLSA presentation format breaks chain.py. Chrome support for this feature has actually been removed due to lack of interest. I'll update chain.py if you have a need but this code is mostly for historical interest. I'll update the README in just a second to reflect this. Sorry for not doing that previously but I didn't think anyone ever looked at this! (https://dnssec.imperialviolet.org may continue to work due to CAA record support still existing in some older versions of Chrome, but I think that's gone in the next stable release.) |
If I understand correctly Chrome support of DANE certificates will be remove after RFC published and all work done? |
The CAA support existed for quite some time with essentially no use I'm afraid. It was also a large amount of code in a security critical area of the code and I'm afraid that the cost/benefit wasn't positive. That's not to say that it couldn't come back in the future, but the idea seemed to be before its time at the moment. |
Dang... sorry to hear that the CAA support is being removed from Chrome... particularly when we're at a point where many of us are looking for full DANE support within Chrome and all the other browsers. I think you are correct that the idea was before its time. Right now we're starting to get the tools out there for people to publish TLSA records and are encouraging them to do so... so now we could use a browser that performed TLSA/DANE validation to be able to show people how it works. |
It is evident that DANE will kill SSL certification business. The development suspension may result from pressure coming from CA's. |
Still broken in BIND 9.9.3-ESV (released today). |
Hello, it seems that chain.py is incompatible with dnssec-signzone from bind-9.9.2-P1 package.
Steps that i do:
Put this string into unsigned zone file and sign zone with dnssec-signzone.
dnssec-signzone transforn TYPE52 string into this:
Try to make chain:
My dig version also 9.9.2-P1.
You can explore it:
The text was updated successfully, but these errors were encountered: