On Thu, 11 Sep 2025, Timothe Litt via curl-library wrote:
If curl doesn't verify the responses itself, how can a user be *sure* the
DANE cert they are going to use is the right one?
The same way that (s)he is *sure* that a non-DANE TLS host is the right
one. At some point, you trust your configuration.
"Everyone" has a CA store to verify TLS certificates against. And if not, we
fail such attempts by default. DNSSEC is not in the same boat.
Even if curl were to (correctly) validate responses itself, it would
ultimately count on the root zone's signing keys.
Yeps. Which is similar in spirit to a CA cert store I think. Magic that has to
be somehow setup.
Implement the full DNSSEC validation
...
and serious scope expansion for curl.
There's this magic concept of *libraries* poeple make to provide
functionality. A concept we use quite a lot already. We don't have to
implement everything ourselves.
I don't see how supporting DANE is a "serious scope expansion".
I also don't think supporting DANE in a half-baked insecure way is too
interesting.
It's not a perfect world. But curl shouldn't take on replicating the
functions of other available services.
Agreed. But if those other services can't be proven to be trusted, then they
can't be used. So we're back to square one.
--
/ daniel.haxx.se || https://rock-solid.curl.dev
--
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette: https://curl.se/mail/etiquette.html