My rough notes of the meeting. All mistakes are mine, please speak up to the 
list if I got something wrong

2018-10-14 TLS interim meeting

problem statement
viktor: authors seemed focus on dprive but not scoped as such. Scope in 
document is DANE PKI.
        dprive can make extension mandatory.
ekr: doing DANE as alternative to x509/webpki been around forever. been failing 
for long time
     two purposes of DANE: assert keys without X.509 and restrict webpki. 
DNSSEC unreliable
     for clients. from browser vendor, we need to be able to distinguish 
between bad network
     and attack. we cannot hard fail ever.
     ekr: mainly to not need CA based certs ("tax")
viktor: with acme, the really only use case is DANE restrictive use case
richard: 1) incremental deployment, 2) downgradability
        baseline: same properties as DNSSEC over a clean wire
        1) dont understand incremental deployment issue.
ben: two incremental scenarios: 1) enable the use of DANE.. seems richard 2) 
use case is not wanted?
nico: Its my (server)'s choice of cert not TLS client.
viktor: its another road block
paul: just like selfsigned cert or bad_ca is a hard fail, dane failure can be a 
hard fail
      protocol shoudl allow hardfail so implementors can make a choice
      re: richard: is a downgrade attack too and additional roadblock
ekr: let me clarify hard fail. if we do dnssec and get a malformed A record, we 
would ignore.
     bogus seldsigned cert, we fall back to dialog for user.
     extra hardfail if server hsts, we wont allow override.
     not viable for generic client to act on dnssec failures.
nico/viktor: an operator should have the choice to be on the webpki, dane or 
both.
             pinning of extension gets us the last mile problem solved.
viktor: can't tell operators with a downgrade attack they get no benefits for 
years.
nico: that's why the extension pinning is so important. To get immediate 
benefit for cost
nico: in real life, it will be the same key/cert whether it is webpki or dane.
viktor/nico: give operators choice, make no value judgement about webpki or dane
richard: you cannot expect this tls extension to become mandatory
paul: TLSA is the authoritatve source. the tls extension is a temporary 
solution to fix the last mile
ekr: SNI example.... coordinated actions in community. that is how things are 
done.
viktor: SNI doesnt cost. Deploying DANE has a cost. if the new signal is 
downgradable it makes no sense
        to pay the cost. You dont pay anything to use SNI.
richard:  if we want restrictive DANE, we need pinning.
paul: yes, it is the main use case in my opinion.

ben: strawman proposal:   what if client signals server 'i am willing to do 
dnssec, or surely doing dnssec
     and 'i already have records' or 'i need records'
viktor: can we decide the restrictive use case on this call?
ben: not sure if we can make further process on this call. we need consensus
nico: real question is, should we say "no one can get it". The question is not 
what we want.
      the question is what are we letting the operators do?
richard: some want restrictive usage for restrictive usage. some want additive 
usage.[ did not understand
         what richard said here]
ekr: Q is not what the server operators want. but what the internet wants. 
comes back to cost / benefit
analyses of pinning. nico: cost of changing deployment is free. i can change it whenever i want.
viktor: HPKP is people shooting themselves in the foot, not really real 
attackers.
        Here [with extension pinning] you cannot shoot yourself in the foot. 
you can immediate fix anything
        [implies ekr's cost is not really there, other then some imaginary near 
zero risk cases]
richard: even in waterdown pinning, if my dnssec blows up there is breaking risk
paul: ekr: i think there was bricking but also hijacking with HPKP. user's at risk, should we give them the option?
viktor: there is no real longterm risk, just a very small narrow if-chain of 
events that could go wrong
ben: pinning semantics is an open question. HPKP lesson is about why it was 
unexpected and then pulled as
     failure, not the specific technical issues within that proposal.
nico: there is 1 pinning proposal and has 1 analyses. it is fundamentally 
different.
ben: there is no consensus on the approach
viktor: there is no concensus on whether we can have pinning  [?]
ekr: pinning also depends on being able to create the tls-dnssec-chain to get 
usable data for the extension
ekr: new failure mode is bad extension data nico: but you can fix instantly. there is no pinning time period of failure in the future
ekr: important to know commitment with pin. I dont say it is catastrophic
ekr: someone maybe ben can write up neutral description . then re-discuss in WG
nico: i wish we could agree that TLSA is always restrictive. would be nice to 
agree on that fact as well
nico: it would be nice to know the specific objections to pinning, like risk to 
the internet, or two bytes,
      or what it is.
ekr: I am happy to answer that. [didnt get what he said]
nico: would be good to talk about the pinning risk scenario and 
likeliness/impact
viktor: think we have more work to do as focus group do an interim before going 
back to the WG
ben: going to be more discussion. logistically, we have to see.
ekr: lets see. this was productive, lets see how it goes
ben: it is one big diff, can you break it up
viktor: it is 24 commits
ben: ok

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to