Re: [TLS] draft-ietf-tls-dnssec-chain-extensions security considerations

2018-06-27 Thread Paul Wouters

On Mon, 25 Jun 2018, Joseph Salowey wrote:


There has been some discussion with a small group of folks on github - 
https://github.com/tlswg/dnssec-chain-extension/pull/19. 
 I want to make sure there is consensus in the working group to take on the 
pinning work and see if there is consensus for
modifications in the revision.  Please respond to the following questions on 
the list by July 10, 2018. 

1.  Do you support the working group taking on future work on a pinning 
mechanism (based on the modifications or another
approach)?


Yes I support taking on the work to do the extension pinning. Just to
ensure people are not confused, this is not about pinning of TLS(A) data.


2.  Do you support the reserved bytes in the revision for a future pinning 
mechanism?


Yes I support both this proposal of reserved bytes or the previous the two
byte reservation. I have no strong preference.

I do not support using a second TLS extension to pin the first, or the
use of a TLS Extensions block, which is also basically two extensions
interacting with each other.


3.  Do you support the proof of denial of existence text in the revision?


Yes I support this text, provided the error in the example.com example is
fixed (it is using the wrong NSEC record, see Viktor's or my PR for the
fix)


4.  Do you support the new and improved security considerations? 


Yes I support the changes.

Do note that this part confuses me a little bit:

but under the assumptions of this specification, there may not be a
reliable way to obtain such DNS records.

where "such" refers to Denial of Existence records. Since your change
also has:

+Following the TLSA or denial of existence RRset,
+the subsequent RRsets MUST contain the full set of DNS records
 needed to authenticate the TLSA record set or denial of existence
 response via the server's trust anchor.

I think the "there may not be a reliable way to obtain such DNS records."
can be removed?

Paul

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] draft-ietf-tls-dnssec-chain-extensions security considerations

2018-06-27 Thread Viktor Dukhovni



> On Jun 26, 2018, at 12:20 AM, Joseph Salowey  wrote:
> 
> Hi Folks,
> 
> There has been some discussion with a small group of folks on github - 
> https://github.com/tlswg/dnssec-chain-extension/pull/19.   I want to make 
> sure there is consensus in the working group to take on the pinning work and 
> see if there is consensus for modifications in the revision.  Please respond 
> to the following questions on the list by July 10, 2018. 
> 
> 1.  Do you support the working group taking on future work on a pinning 
> mechanism (based on the modifications or another approach)?

Yes.

> 2.  Do you support the reserved bytes in the revision for a future pinning 
> mechanism?

Yes, no strong feelings whether it is exactly 2 bytes or an opaque<0..255>
to be defined as part of 1.  With either exactly 2 bytes, or an empty opaque,
the server signals that its operator does not (yet?) support unilateral
client-side pinning.  No to turning this into an extension block.

> 3.  Do you support the proof of denial of existence text in the revision?

Yes, with minor error corrections, where appropriate (perhaps
after the next I-D revision, easier perhaps to read a complete
snapshot than a pull request, and tools.ietf.org can also show
diffs).

> 4.  Do you support the new and improved security considerations?

Yes.  We can word-smith any minor blemishes when the next I-D
version comes out.

-- 
Viktor.

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls