-
Notifications
You must be signed in to change notification settings - Fork 29.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DNS] TLSA records [HTTPS] DANE request #39569
Comments
@nodejs/dns |
There has been no activity on this feature request for 5 months and it is unlikely to be implemented. It will be closed 6 months after the last non-automated comment. For more information on how the project manages feature requests, please consult the feature request management document. |
This request is a bit old, but I'd like to +1, it would be really helpful. Even if Looks like it's just adding a few lines next to Line 304 in 1000eb1
Line 457 in 3914354
For reference, I'm looking at how |
The first step would be to add TLSA support to upstream c-ares, then add a binding to node. |
In some time I also would be in need of this feature. |
There has been no activity on this feature request for 5 months and it is unlikely to be implemented. It will be closed 6 months after the last non-automated comment. For more information on how the project manages feature requests, please consult the feature request management document. |
There has been no activity on this feature request and it is being closed. If you feel closing this issue is not the right thing to do, please leave a comment. For more information on how the project manages feature requests, please consult the feature request management document. |
👋 Hey - we made 🍊 Tangerine with support for TLSA records among others (such as CERT) that the DNS module does not provide. We used inspiration from dnspython for the format of objects returned. 🍊 Tangerine is a 1:1 drop-in replacement for the Node.js DNS module and it also supports const Tangerine = require('tangerine');
const tangerine = new Tangerine();
console.log(await tangerine.resolveTlsa('_25._tcp.internet.nl')); [
{
cert: Buffer @Uint8Array [
e1ae9c3d e848ece1 ba72e0d9 91ae4d0d 9ec547c6 bad1ddda b9d6beb0 a7e0e0d8
],
mtype: 1,
name: 'proloprod.mail._dane.internet.nl',
selector: 1,
ttl: 622,
usage: 2,
},
{
cert: Buffer @Uint8Array [
d6fea64d 4e68caea b7cbb2e0 f905d7f3 ca3308b1 2fd88c5b 469f08ad 7e05c7c7
],
mtype: 1,
name: 'proloprod.mail._dane.internet.nl',
selector: 1,
ttl: 622,
usage: 3,
},
] See https://github.com/forwardemail/tangerine#tangerineresolvetlsahostname--options-abortcontroller for more insight. |
c-ares will support this in v1.22 by year's end. c-ares/c-ares#600 |
Thanks for the update. I'll reopen the issue. |
c-ares 1.22.0 released with this capability |
Awesome, can't wait to get DANE support added to our project @forwardemail |
How is the process here? Am I too naive assuming this could be done by simply copying and renaming the binding of another DNS record? |
Unfortunately the implementation for TLSA uses the new DNS Record helpers in c-ares, and not the legacy parser style, so if you're looking to just copy paste and make slight modifications, that's not going to work, though I don't think you'll find it too difficult. The general logic is you'll pass Then to extract the results, you'd call:
There's also Docs here on the new functionality: |
There has been no activity on this feature request for 5 months. To help maintain relevant open issues, please add the
never-stale
|
Commenting so that stalebot does not close the issue. There is a PR for this: #52983 |
Is your feature request related to a problem? Please describe.
I'd like to make an HTTPS request to a server that uses a self-signed certificate that follows the DANE protocol (Wikipedia)
Describe the solution you'd like
I believe the best option would be an extra option on HTTPS request:
Describe alternatives you've considered
I tried to create a new
https.Agent
that forcesrejectUnauthorized: false
;Then, I got the
tlsSocket
instance in thekeylog
event and added a listener for thesecureConnect
event;This moment I realised that the DNS api don't have a
resolveTLSA
.Not sure how to continue from here.
The text was updated successfully, but these errors were encountered: