> On Apr 28, 2018, at 3:04 PM, Shumon Huque <shu...@gmail.com> wrote:
> 
> This mean "additive" mandatory or non-mandatory, I assume. Viktor opposes 
> the latter case, I assume based on his (unproven) assertion that there will no
> incentive to deploy this.. I don't agree. Lots of sites already publish DANE 
> for 
> HTTPS records even before browsers can use them (IETF, freebsd, debian,
> torproject, defcon, ripe, etc). Once code is implemented/deployed they will be
> using it.

My arguments are sound.  Would you care to estimate what fraction of
published _443._tcp TLSA records actually match the site's certificate
chain?  What non-hobbyist sites publish such records?

It may be cool to play DANE for HTTPS when nobody is verifying, and
there's no operational burden of keeping the records correct, (the
one BENEFIT listed in my cost/benefit list), but real deployments
need real incentives.

With Let's Encrypt available, and no downgrade protection for
HTTPS with DANE (via this extension) the incentive to support
it is nil.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to