On Sat, Apr 18, 2020 at 10:59:51AM -0400, Wietse Venema wrote:
> Rich Felker:
> > > It would be a mistake to use TLSA records from an unsigned domain.
> > > That would be no more secure than accepting a random server
> > > certificate. All the pain of doing TLSA and none of the gain, just
> > > security theatre.
> > 
> > It's not security theater. It (1) ensures that you do use records for
> > a signed domain even if you were unable to determine it was signed,
> > due to issues like lack of AD bit in musl or stripping of AD bit by
> > glibc default configuration, and (2) makes it so an attacker wanting
> > to MITM needs to be able to do so on DNS channel, not just route to
> > the MX. (For example this might be difficult or impossible for the
> > attacker if DNS is routed over DoH, or if attacker can sit somewhere
> > between client and MX but not between client and the nearest anycast
> > 8.8.8.8.)
> 
> Congratulations! You just gave a new definition of security theatre:
> using an unauthenticated channel to distribute trust anchors.

It's not security theater because nobody's claiming it's secure.
Rather it's a fairly weak form of hardening that increases the
required capabilities an attacker needs to exploit a known-insecure
system.

> You can consider libc-musl as unsupported from now on.

I am really not appreciating the hostility and utterly petty
vindictiveness of folks from this project.

Rich

Reply via email to