On Tue, Jul 29, 2014 at 05:10:25PM +0200, Robert Schetterer wrote:

> Hi Viktor, perhaps silly question, I sometimes asked myself why not use
> something like advanced SPF with i.e
> 
> IN      SPF     "v=spf1  mx  ip4:1.2.3.4/24
> TLSPOLICY:require-valid-certificate -all"

Well SPF records are for policy applied by receiving systems to
sending systems, while the problem at hand is TLS policy that
sending systems should apply to receiving systems.  So SPF is
the wrong place to publish the information.

Generalizing your suggestion to some other DNS record, if it is
not DNSSEC protected (including verified non-existence), then
it serves no purpose since an active attacker can suppress such
a record.  To thwart passive attacks, just STARTTLS is enough.

Thus DANE, which provides a downgrade-resistant signal of TLS
support, and also publishes the requisite certificate or public
key fingerprints to resist TLS MiTM attacks.

You're re-inventing DANE... The key observation is that DNS
policy records that are not DNSSEC validated don't add any
value in terms of MiTM resistance.

The EFF registry presumably publishes the data over a "secure
channel" (https, presumably via a sensibly chosen CA), and once
Postfix policy tables are generated from this data, active attacks
are difficult.

-- 
        Viktor.

Reply via email to