> On Apr 4, 2018, at 1:50 PM, Joseph Salowey <j...@salowey.net> wrote:
> 
> A) Recommendation of adding denial of existence proofs in the chain provided 
> by the extension
> B) Adding signaling to require the use of this extension for a period of time 
> (Pinning with TTL)
> C) Both

The discussion so far has demonstrated the need for an important clarification 
about the nature of the pinning in B):

  * The pin would not require *anything* more than continuing support for the 
extension.
  * In particular, it would not require continued presence of TLSA records, nor 
even
    continued DNSSEC support by the server's domain.
  * This is because the server can respond with denial of existence of either 
its TLSA
    records, or even of the the DS records for its domain or some parent domain.

This is why my claim that this is essentially like STS, and nothing like HPKP 
is valid.

A corollary of the above is that (B) requires (A).  Just (B) alone is not 
sufficient,
it is too limited a mechanism without denial of existence.

If support for the extension itself is mandatory in some application context 
(implicit
unbounded pin), then of course (A) alone is enough, but we should note that 
such implicit
indefinite pinning is fragile during partial deployment and does not protect 
applications
where the implicit requirement is not an option (incremental deployment).

Therefore, the real choice before us is (C) or not (C), the choices of (A) 
alone or (B)
alone are unsound half-measures.

(C) is essentially STS for dane chains over TLS with downgrade protection after 
first
contact, and imposes no burden on the present implementors.  If they were 
willing to
implement without a pin or denial of existence, they can ignore the pin TTL and 
never
transmit denial of existence (which their clients would not expect to process).

On the other hand, they may find after some experience that the proposed 
features
are actually useful, and might add them to their application logic.  I don't 
know
whether DANE is mandatory with DPRIV or is just an "additive" alternative to 
WebPKI.
If the latter, with the present draft it is trivially stripped, and again there 
is
little incentive to not just use WebPKI, especially if DANE support is not 
required
from all clients (thus servers need at least WebPKI).

Looking at RFC8310, I see hints of support for both WebPKI and DANE, with no 
guidance
as to how a client is to choose between them, accept either both, avoid 
downgrades
to one when the other is preferred, ...

So I rather suspect that even the DPRIV use-case, which supposedly does not need
the proposed changes, actually does need them for meaningful security from using
DANE, and we've not just not looked at the details closely enough yet.  It may
well turn out not substantially different from the browser use-case that is not
adequately met by the current draft.

Can someone explain briefly how DPRIV avoids the same downgrade issues, and
negative adoption incentives (cost-benfit comparison)?  If it turns out that
no adequate explanation is possible, and indeed the same issues are present,
then the proposed changes (which are still needed elsewhere) are all the
more pressing.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to