Eric Rescorla writes:
> DNS-based priming is a seemingly attractive concept but unfortunately isn't
> really workable here, for several reasons:
> 1. It requires DNS security

No, it doesn't. MinimaLT sticks to the existing X.509 PKI for easy
deployability. The same server key that you're using for HTTPS, the key
where you've obtained a certificate from (say) Let's Encrypt, is also
signing your MinimaLT ephemeral keys. (Improvements in DNS security can
give _additional_ protection to MinimaLT beyond the X.509 PKI, whereas
TLS doesn't have this feature, but this is not the main point.)

You _do_ need to be able to automatically sign new ephemeral keys and
drop the signed data into your DNS database. If you're not used to this
level of automation---for example, if you've outsourced your DNS data to
a company that provides only manual web-based DNS editing---then you
might see this as a showstopper. But there are many other sites where
this is a trivial level of scripting. The resulting latency improvement
is huge---_always_ getting what 0RTT _sometimes_ gets.

> 2. Measurements indicate that penetration rates for DNS records other
> than the basic ones that are necessary for nearly all operation (A,
> CNAME, etc.) are fairly poor, so this adds a number of operational
> problems.

I agree that the original goal of extensible "query types" in DNS (see
RFC 1034, third paragraph) was ruined by poor implementation work (which
was in turn encouraged by other aspects of the DNS protocol design, but
let me not get sidetracked here), so trying to deploy new DNS "query
types" creates operational problems.

This does _not_ mean, however, that putting new applications into DNS
creates operational problems. It simply means that one has to avoid the
trap of thinking that new applications should encode their data as new
DNS "query types". Sticking to the limited set of well-supported DNS
"query types" is reasonably straightforward and eliminates all of the
operational problems.

Of course, the difference in encodings between DNS and TLS can produce
differences in the number of packets used to send a long chain of large
certificates. But it's an easy exercise to have DNS cache pretty much
everything for long periods. The only thing that changes frequently is a
new signature on a new ephemeral key.

---Dan

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to