Op 27-02-18 om 16:12 schreef Viktor Dukhovni: > > >> On Feb 27, 2018, at 9:34 AM, Benjamin Kaduk <bka...@akamai.com> wrote: >> >> There doesn't seem to be much interest in pinning-like schemes for TLS >> at this point (see also the "TLS server identity pinning" proposal from >> the SAAG/secdispatch session at IETF 100). >> And I do think the lack of authenticated denial of existence is >> something the WG was aware of during our earlier discussions, so it's >> unclear that there is a need to hold things up for this issue. > > Awareness of is different from thinking through the full implications. > I for one did not have the cycles to consider all the implications, > and many others likely also focused on the data format, and may not > have considered the use-cases with care. > > Note that DANE-based "pinning" is fundamentally different from other > "pinning" approaches, in that the client does not store the key > digests for any significant length of time. All it may do is > cache the DANE TLSA records for a short time bounded by the DNS TTL. > The digests that "pin" the server's (or issuing CA's) keys are managed > in the server's DNS zone, and can be promptly updated by the server, > and the client can learn of the change when presented with new TLSA > records, OR as I now believe is essential for this specification to > be at all useful, presented with authenticated denial of existence. > > The only thing needed for denial of existence to be workable, is > that the client cache a commitment by the server (a boolean value) > to support the extension until such time as the server provides > authenticated denial of existence of TLSA records. > > This is much less brittle than client-side key pinning, with all > its attended problems with stale data. > > If this protocol has no denial of existence, I don't see any reason > for anyone to deploy it. Why publish something that's basically > useless?
Well.. support of the option could be obligatory for new TLS services, like DNS over TLS. With DNS over TLS there is no user interaction making third-party PKIX (i.e. a CA store) impractical. Another possibility to authenticate DNS-over-TLS upstreams by clients, is to setup the TLS without authentication, and then use that to do the DANE queries over it (for privacy and to bypass hampering middle-boxes), then authenticate the certificate and upgrade the connection to be usable for all queries. This works but is harder to implement and causes a latency penalty because of the extra negotiations. Note that the new initial draft (not WG yet) for encrypting the path from the recursive to the authoritative, suggests DANE authentication of the authoritative, and references the tls-dnssec-chain-extension draft as the initial method -of acquiring the needed DNSSEC data- to try: https://tools.ietf.org/html/draft-bortzmeyer-dprive-resolver-to-auth Also, with DANE I like the fact that a DNS domain holder/owner can vouch for it's own domain name instead of needing a third party. And although, opposed to DANE over DNSSEC, this extension doesn't add any security, it still has that property. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls