Skip to content

Cryptographically generated domain names #11840

@DemiMarie

Description

@DemiMarie

What problem are you trying to solve?

There is no good way to connect to a device over TLS if it is not exposed to the public Internet via any mechanism.

What solutions exist today?

  1. Require users to use a native mobile app.
  2. Expect the user to click through certificate warnings. This promotes insecure behavior.
  3. Use a cloud-based solution for accessing the device. This creates obvious and severe risks to privacy and security.
  4. Use a cloud-based solution to provide the device with a public domain name and the DNS challenge to obtain a certificate. This requires trusting the operator of the cloud service, who is not held to the same standards that certification authorities are.
  5. Expect the user to upload a certificate themselves. This requires knowledge most users do not have.

How would you solve it?

Embed a hash either the server’s TLS private key or the server’s root certificate in the domain name. This ensures that the domain name includes all of the information needed to verify the security of the connection. There is no reliance on third-party certificate authorities, and they should not be trusted for such domains.

Anything else?

This is the same mechanism used by onion services.

Metadata

Metadata

Assignees

No one assigned

    Labels

    addition/proposalNew features or enhancementsneeds implementer interestMoving the issue forward requires implementers to express interest

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions