DNS-over-TLS offered to clients; questions

Folks,

Configuring DNS-over-TLS to be offered to clients was easy with Unbound;
I'm running with ECC TLS from my private CA, and
https://github.com/bortzmeyer/monitor-dns-over-tls lets me confirm that
service is working, with a monitoring plugin no less!

Skimming RFC 7858, it appears that: (1) port 853 is mandated for an
opportunistic discovery mode, where clients just try it and see if it
works, without any signalling; (2) pinning is supposed to be available,
but there's no wire protocol way of signalling pins, whether via DHCP or
anything else; (3) certificate verification is _entirely_ chain
verification, no identity verification.

Is 3 correct? No hostname or other identifier validation at all, so a
stolen cert from elsewhere issued by a trusted CA can then impersonate
DNS? Anyone know if there are any moves to, eg, look for an IP address
in the SAN field?

Any conveying signalling of pins by some means?

Thanks,
-Phil

Hi Phil,

Is 3 correct? No hostname or other identifier validation at all, so a
stolen cert from elsewhere issued by a trusted CA can then impersonate
DNS? Anyone know if there are any moves to, eg, look for an IP address
in the SAN field?

When using unbound as DNS-over-TLS client (as forwarder), no certificate
validation is happening. So stealing (or requesting) a cert signed by a
"well know" CA is not necessary, any cert will do.

Also see the discussing on Unbound bug #658 [0] for the current TLS
authentication status in Unbound.

-- Ralph

[0] - https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=658#c5