On Thu, Jul 19, 2018 at 12:16:18PM -0400, Viktor Dukhovni wrote:
> On Wed, Jul 18, 2018 at 10:23:49PM -0500, Nico Williams wrote:
> > > At yesterday's WG meeting, Sam Weiler suggested that the pinning
> > > information could be conveyed via the DNS. That way you would not need new
> > > holes/fields in the TLS extension. Paul said it doesn't work. But Willem
> > > Toorop and I discussed it after the meeting, and think that it does.
> > 
> > I agree that it _could_ be done with a DNS RR.  However, that has two
> > negative effects: 1) it will bloat the extension's payload more than the
> > two bytes we're asking for, 2) it complicates deployment / the
> > operator's life.
> 
> In any realistic deployment, the publisher of the TLSA records is
> the *same* entity that provisions the certificate chain, anything
> else is operationally untenable.

To make it short, the problem is that with A RRs the customer has to
update TLSA RRs to match the hosting site's, and has to do this on a
timely basis.  That can certainly be arranged, but I agree that at least
initially, and until this is generally automated, that will indeed be a
problem.  But I'm not too concerned because it is just a matter of
automation.

My issues with a new DNS RR for specification of pinning remain.

Nico
-- 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to