> On Feb 27, 2018, at 10:47 AM, Willem Toorop <wil...@nlnetlabs.nl> wrote: > >> If this protocol has no denial of existence, I don't see any reason >> for anyone to deploy it. Why publish something that's basically >> useless? > > Well.. support of the option could be obligatory for new TLS services, > like DNS over TLS. With DNS over TLS there is no user interaction > making third-party PKIX (i.e. a CA store) impractical.
Sure, if restricted to applications in which the extension is mandatory, the problem goes away. But much of the appeal of this specification was I believe that it would finally make it possible to do use DANE between a browser and web server, and without authenticated DoE, it falls well short of at least that goal. > Note that the new initial draft (not WG yet) for encrypting the path > from the recursive to the authoritative, suggests DANE authentication of > the authoritative, and references the tls-dnssec-chain-extension draft > as the initial method -of acquiring the needed DNSSEC data- to try: > > https://tools.ietf.org/html/draft-bortzmeyer-dprive-resolver-to-auth This is a very different context from that faced by most other application clients. Here the client is a DNS server (iterative resolver) talking to authoritative servers, and sending the TLSA records over TLS is just an optimization, the client can retrieve these separately. > Also, with DANE I like the fact that a DNS domain holder/owner can vouch > for it's own domain name instead of needing a third party. And > although, opposed to DANE over DNSSEC, this extension doesn't add any > security, it still has that property. For existing applications, with a deployed base of PKIX (WebPKI) servers, this extension provides no secure upgrade path. This problem severely limits the utility of this extension. I now think we can and should do better. Otherwise, this specification will not be a suitable basis for DANE-based peer authentication in HTTPS, except for a narrow set of situations in which DANE is required by some out-of-band external mechanism. I think it makes sense to add a DANE latch TTL to the server's response, which communicates to the client that the server commits to continue to support the extension for some time considerably in excess of the TLSA record TTL. The client can cache that commitment for use with future connections to the server. With that in place, we get meaningful applicability to HTTPS as used by general-purpose web browsers. Or have we given up on ever using DANE for HTTPS in browsers? -- Viktor. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls