> On May 16, 2018, at 12:20 PM, Tom Ritter <t...@ritter.vg> wrote:
> 
> On the balance, I support adding the two bytes.

Thanks for responding, and sorry to frame the request as "please
support", I've previously tried to careful and ask people to
respond with their comments whatever they might be, and should
have done so this time too.

> I would argue that the top-most or bottom-most bit should be used as a
> testing bit (0 = Testing, 1 = Enforcement), and that the draft (or a
> second draft) specifying the policy should add a generic
> problem-reporting extension that allows one to post a description of
> errors encountered. But these arguments do not hinge my support of two
> bytes.

For the record, the reason that we're confident that two bytes are
enough is that DNS TTLs already take care of sub-hour continuity
for any provided TLSA records.  So units of hours are natural, and
make 16 bits quite sufficient.

We've given the need for other pinning properties from other STS-like
protocols some thought, and it turns out that none apply.  IN particular
a testing mode is not possible with this extension.  Such a testing mode
would itself be a downgrade attack.  Any testing mode for DANE would
have to be specified as a new element type for the TLSA RRset to be
authenticated via DNSSEC, not as a WebPKI-authenticated element of this
extension.

The extension is a channel to deliver security-relevant data
from DNS, and the pin when specified, would just pin support
to continue to provide the channel.  The STS-analogy is the
closest available but it is not a faithful one, the requirements
here are much simpler.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to