2017
DOI: 10.17487/rfc8162
|View full text |Cite
|
Sign up to set email alerts
|

Using Secure DNS to Associate Certificates with Domain Names for S/MIME

Abstract: This document describes how to use secure DNS to associate an S/MIME user's certificate with the intended domain name, similar to the way that DNS-Based Authentication of Named Entities (DANE), RFC 6698, does for TLS.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Furthermore, the most popular approach is the use of additional third-parties to extend or replace the rigid CA trust model. In this approach, users can select one or more third-parties to confirm the authenticity of a certificate in order to improve the chances of detecting a MITM attack [19]. However, this approach has several shortcomings such as significant deployment and operational costs (e.g., additional infrastructure with high availability requirements), more complex trust model for users, privacy concerns and more complex revocation procedures.…”
Section: B Tls Mitm Attacks and Countermeasuresmentioning
confidence: 99%
“…Furthermore, the most popular approach is the use of additional third-parties to extend or replace the rigid CA trust model. In this approach, users can select one or more third-parties to confirm the authenticity of a certificate in order to improve the chances of detecting a MITM attack [19]. However, this approach has several shortcomings such as significant deployment and operational costs (e.g., additional infrastructure with high availability requirements), more complex trust model for users, privacy concerns and more complex revocation procedures.…”
Section: B Tls Mitm Attacks and Countermeasuresmentioning
confidence: 99%
“…In this case the CA needs a secure way to look up the public key of the domain owner, who is not necessarily identical with the applicant. There are experimental DNS-based approaches to achieve this objective for both, S/MIME [24] and OpenPGP [41].…”
Section: E Email-based Validationmentioning
confidence: 99%
“…Traditionally, this was done using dedicated key/certificate servers, LDAP servers, etc., but these methods are not always easy to deploy and standardize for every enterprise. �ese certificates can be published through the DNS by a different implementation of the DANE mechanism for S/MIME [RFC8162] and OpenPGP [RFC7929]. S/MIME and OpenPGP, with their strengthening by DANE authentication are discussed below.…”
Section: End-to-end Authentication Using S/mime Digital Signaturesmentioning
confidence: 99%
“…�e usual case is for the receiver to authenticate the supplied certificate using PKIX back to the Certificate Authority. Users who want more assurance that the key supplied is bound to the sender's domain can deploy the SMIMEA mechanism [RFC8162] in which the certificate and key can be independently retrieved from the DNS and authenticated per the DANE mechanism, similar to that described in Subsection 5.2.5, above. �e user who wants to encrypt a message retrieves the receiver's public key: which may have been sent on a prior signed message 23 .…”
Section: S/mime and Smimeamentioning
confidence: 99%