On Sat, Dec 14, 2013 at 12:04:15AM -0500, John Allen wrote:

> >     The main difficulty with server-side DANE is that your zone
> >     must be DNSSEC signed.  Deployment of DNSSEC is still fairly thin.
> >     With a bit of luck DANE might motivate folks to consider DNSSEC.
>
> My interest in TLSA was sparked by my looking for info when setting
> up my DNS with DNSSEC (still a work in progress).  It seemed to
> provide a better level of security than the current standard
> practice.

The trick is to find tools that make operating a DNSSEC zone
relatively painless.  You get security, but it easier to mess up
leaving the zone with stale signatures and thus essentially
invisible to all DNSSEC-aware clients.  By all means deploy
DNSSEC, but carefully.

> If I have understood what I have read TLSA appears to be a
> mechanism for publishing security certs is a secure manner.
> My interest in TLSA lead me to DANE, I am not sure that I fully
> understand DANE or TLSA, however my understanding is, that DANE is a
> high(er) level TLS encryption standard.

You're naturally confused:

    - DNSSEC: a man-in-the-middle hardened means of publishing DNS data.

    - DANE: an IETF working group to develop standards for using DNSSEC
      to publish authentication information (public keys and the like)
      that binds DNS names to corresponding credentials.

        http://datatracker.ietf.org/wg/dane/charter/

    - TLSA: one of the DNS record types developed by the DANE working group
      that publishes TLS server keys in DNS.  TLSA records are defined in
      RFC 6698.

          http://tools.ietf.org/html/rfc6698
          http://datatracker.ietf.org/doc/rfc6698/

So, neither DANE nor TLSA encrypt your data, TLS does that.  DANE
TLSA DNS records can be used to authenticate your server (or for
you to authenticate other servers).  Since the existing public CA
PKI is largely incompatible with MX record indirection (thus not
scalably usable for SMTP), I'm attempting to drive DANE adopting
for SMTP which will scale, provided DNSSEC gets off the ground.

        http://datatracker.ietf.org/doc/draft-ietf-dane-smtp-with-dane/

Postfix 2.11 will support DANE TLSA.  Work is due to begin on similar
support in Exim based on library code for DANE TLS over OpenSSL that
grew out of the DANE support in Postfix.  I'm hoping to participate
in making DANE TLSA support generally available in OpenSSL.

DANE TLSA records allow sites to independently create leaf and CA
certificates after first registering their DNSSEC key-signing-keys
with their DNS registrar.  So in effect you do have a CA, but it
is your DNS registrar and they effectively make you a sub-CA for
your own domain.

-- 
        Viktor.

Reply via email to