> On Feb 27, 2018, at 9:34 AM, Benjamin Kaduk <bka...@akamai.com> wrote:
> 
> There doesn't seem to be much interest in pinning-like schemes for TLS
> at this point (see also the "TLS server identity pinning" proposal from
> the SAAG/secdispatch session at IETF 100).
> And I do think the lack of authenticated denial of existence is
> something the WG was aware of during our earlier discussions, so it's
> unclear that there is a need to hold things up for this issue.

Awareness of is different from thinking through the full implications.
I for one did not have the cycles to consider all the implications,
and many others likely also focused on the data format, and may not
have considered the use-cases with care.

Note that DANE-based "pinning" is fundamentally different from other
"pinning" approaches, in that the client does not store the key
digests for any significant length of time.  All it may do is
cache the DANE TLSA records for a short time bounded by the DNS TTL.
The digests that "pin" the server's (or issuing CA's) keys are managed
in the server's DNS zone, and can be promptly updated by the server,
and the client can learn of the change when presented with new TLSA
records, OR as I now believe is essential for this specification to
be at all useful, presented with authenticated denial of existence.

The only thing needed for denial of existence to be workable, is
that the client cache a commitment by the server (a boolean value)
to support the extension until such time as the server provides
authenticated denial of existence of TLSA records.

This is much less brittle than client-side key pinning, with all
its attended problems with stale data.

If this protocol has no denial of existence, I don't see any reason
for anyone to deploy it.  Why publish something that's basically
useless?

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to