On Wed, Apr 04, 2018 at 07:22:38PM -0700, Eric Rescorla wrote:
> I don't think that this comparison is particularly apt.The
> representation in HSTS is simply "I support HSTS". The representation
> in HPKP is "I will use either consistent keying material *or* a
> consistent set of CAs". The representation here is "I will continue to
> have DNSSEC-signed DANE records". That is a significantly more risky
> proposition than continuing to support TLS (and I'm ignoring the risk
> of hijacking attacks that people were concerned with with HPKP), and
> so this seems rather more like HPKP to me.

Without a TTL (with zero meaning "clear the pin to DANE") this extension
can only really be used with mandatory-to-use-with-DANE protocols, where
the commitment to "continue to have DNSSEC-signed DANE records" is
implied.

The TTL allows one to put a bound on that commitment, thus alleviating
the risk.

That's the whole point: to alleviate the risk of commitment to DANE in
order to not discourage opportunistic deployment.

Nico
-- 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to