On Wed, Apr 4, 2018 at 7:20 PM, Nico Williams <n...@cryptonector.com> wrote:

> On Wed, Apr 04, 2018 at 07:22:38PM -0700, Eric Rescorla wrote:
> > I don't think that this comparison is particularly apt.The
> > representation in HSTS is simply "I support HSTS". The representation
> > in HPKP is "I will use either consistent keying material *or* a
> > consistent set of CAs". The representation here is "I will continue to
> > have DNSSEC-signed DANE records". That is a significantly more risky
> > proposition than continuing to support TLS (and I'm ignoring the risk
> > of hijacking attacks that people were concerned with with HPKP), and
> > so this seems rather more like HPKP to me.
>
> Without a TTL (with zero meaning "clear the pin to DANE") this extension
> can only really be used with mandatory-to-use-with-DANE protocols, where
> the commitment to "continue to have DNSSEC-signed DANE records" is
> implied.
>

This simply isn't true, for the reasons Richard Barnes indicated in his
response
to you.


> The TTL allows one to put a bound on that commitment, thus alleviating
> the risk.
>
> That's the whole point: to alleviate the risk of commitment to DANE in
> order to not discourage opportunistic deployment.
>

HPKP had a TTL and yet as a practical matter, people found it very
problematic.
And, of course, if you're concerned with hijacking attacks, the hijacker
will
just advertise a very long TTL.

-Ekr

Nico
> --
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to