On Mon, Mar 12, 2018 at 02:29:55PM -0400, Paul Wouters wrote:
> On Mon, 5 Mar 2018, Willem Toorop wrote:
> 
> > No Paul, the division in sections is irrelevant for a verifier.  The
> > only bit of information in a DNS message that is used by a verifier is
> > the question.  From the question, validation starts and the relevant
> > records are followed and verified.  But the question section is also not
> > needed as the question can be derived from the name and port of the
> > service, i.e. <port>._tcp.<name>. TLSA
> > 
> > The order described in the draft is both an optimization to reduce the
> > number of times a verifier has to go over the RRs, and it makes the
> > content easier to read (and understand) for humans too.
> > 
> > Also, for non existence answers, DNSSEC validators (and thus also a
> > verifier for the chain extension) simply ignore the DNS message header.
> > Proof of non-existence can and must be derived from the set of RRs in
> > the message body/sections too.
> 
> Willem (and Shumon and Viktor) have convinced me the DNS Header and
> Sections are not needed.
> 
> > The extension already supports Denial of Existence proof b.t.w., because
> > it is also needed for wildcard expansions (which are supported).
> 
> The issue here is the requirement of the TLS server to send these
> records in the absence of any TLS record. This allows the clients to
> detect a rogue webserver cert that is valid in webPKI but not valid
> based on DANE. Without this commitment, the TLS extension does not
> really work, as it can be omitted by an attacker.


One idea for adding pinning:

- Add pinned flag to the client request structure. This is set if
  the client has the server pinned, otherwise clear.
- Add max_age field to the server response structure.
- If max_age=0, the payload can either be authenticated TLSA RRset or
  proof no such thing exists. Any sent RRset applies to current
  connection. In either case, the pin breaks immediately.
- If max_age>0, the payload must be TLSA RRset. The TLSA RRset
  appiles to this connection. Pin the name as requiring this extension
  for next max_age seconds.
- Add security consideration that sending TLSA RRsets with max_age=0
  is vulernable to downgrade attacks.

The reason for the flag in client request is to tell the server if
it should bother sending ADoE back or not.


Also, could cached_info extension be extended to cover data for this
extension? It would save some bandwidth...


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to