Hi folks,

This is way outside the range of my DISCUSS, so maybe we should change the
thread title.

Paul, can you walk me through the security value of a proof of nonexistence
here? Perhaps describe an attack that it stops.

-Ekr


On Sat, Mar 3, 2018 at 7:09 PM, Paul Wouters <p...@nohats.ca> wrote:

> On Thu, 1 Mar 2018, Shumon Huque wrote:
>
> I do not know if the draft authors and/or WG have an appetite to do the
>> much
>> more major change suggested by Viktor (i.e in-protocol pinning TTL
>> commitment
>> and requiring subsequent denial of existence proof if DANE is removed).
>>
>
> I think it is worth discussing in London and/or some people meeting up
> to talk about this and bring something to the list/WG.
>
> The original idea of this extension I believe (and one of my reasons
> behind writing RFC 7901) was to provide an alternative path for DNS
> that couldn't be blocked or broken and that provides DNS answers without
> additional latency. To me, that always included proof of non-existence,
> as it would come in as the answer to a DNS chain-query via TLS headers
> as the transport.
>
> I don't know why this got turned into something that is almost like DNS
> but not quite DNS. I think that is a mistake.
>
> The TLS extension should be nothing more (and nothing less) than
> stappled DNS suitable for a DNS routines.
>
> Paul
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to