-
Couldn't load subscription status.
- Fork 3k
Open
Labels
addition/proposalNew features or enhancementsNew features or enhancementsneeds implementer interestMoving the issue forward requires implementers to express interestMoving the issue forward requires implementers to express interest
Description
What problem are you trying to solve?
There is no good way to connect to a device over TLS if it is not exposed to the public Internet via any mechanism.
What solutions exist today?
- Require users to use a native mobile app.
- Expect the user to click through certificate warnings. This promotes insecure behavior.
- Use a cloud-based solution for accessing the device. This creates obvious and severe risks to privacy and security.
- Use a cloud-based solution to provide the device with a public domain name and the DNS challenge to obtain a certificate. This requires trusting the operator of the cloud service, who is not held to the same standards that certification authorities are.
- Expect the user to upload a certificate themselves. This requires knowledge most users do not have.
How would you solve it?
Embed a hash either the server’s TLS private key or the server’s root certificate in the domain name. This ensures that the domain name includes all of the information needed to verify the security of the connection. There is no reliance on third-party certificate authorities, and they should not be trusted for such domains.
Anything else?
This is the same mechanism used by onion services.
Metadata
Metadata
Assignees
Labels
addition/proposalNew features or enhancementsNew features or enhancementsneeds implementer interestMoving the issue forward requires implementers to express interestMoving the issue forward requires implementers to express interest