On Wed, Apr 04, 2018 at 05:33:27PM -0400, Paul Wouters wrote:
> On Wed, 4 Apr 2018, Joseph Salowey wrote:
> >A) Recommendation of adding denial of existence proofs in the chain provided 
> >by the extension
> >B) Adding signaling to require the use of this extension for a period of 
> >time (Pinning with TTL)
> >C) Both
> 
> These options need a bit of clarification.
> 
> If you do A) then by publishing the proof of non-existance records, you
> can cancel any outstanding kind of pin done. And you would not need B)

Hmm, not quite.  You might want to publish the "clear the pin" (TTL ==
zero) without having to first stop publishing TLSA RRs.

The idea is to first ramp up the TTL, and if there's any problems /
change of mind, ramp it down and remove the TLSA RRs when the last
possible extant pin must have expired.

Therefore I think (B) is more urgent.  (A) is even more trivial than
(B), so there's no reason not to do both ((C)).

> [..]
> 
> So to support all cases, I would say C) but I think B) would get us
> pretty far on a lot of deployments.

+1

> The document's intension is clearly to staple DNSSEC answers for the
> TLSA query on the TLS handshake. Omiting proof of non-existence means
> it fails to achieve its specified goal and makes this TLS extension
> completely useless[*]

+1

Thanks,

Nico
-- 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to