On Wed, Oct 17, 2018 at 06:18:27AM -0700, Eric Rescorla wrote:
> I'm responding to Ben here, because I think it's worth adding some clarity.
> However, I want to flag that I'm going to be rather short on time for the
> next
> few week and not able to spend a lot of time replying to traffic on this
> topic. Even more than usual, non-response to some point does not
> necessarily indicate agreement.
> 
> On Tue, Oct 16, 2018 at 6:15 PM Benjamin Kaduk <bka...@akamai.com> wrote:
> 
> > (1) provides a channel for DANE records that is reliable in the absence of
> >     an attack
> >
> 
> I think this alone would be worthwhile -- and is the purpose I have always
> had
> in mind for the draft.

It's interesting to hear that, as I seem to recall a lot of discussion
about how a security mechanism that folds in the presence of an attack
.... isn't really a security mechanism.

So while I could concoct a few scenarios in which just (1) would be
*useful*, the main one that comes to mind isn't really a security
mechanism, but would rather be part of a reporting mechanism for seeing
what kind of DANE penetration is possible.  Well, and I guess any case
where the client has some other reason to expect to see this extension
and choke if it's absent, such as a "greenfield" case or
application-level pinning.  So I'm curious what kind of use case(s) you had
in mind for just the transport aspect.

> 
> 
> > (2) reduces the ability of an attacker to cause the client to ignore the
> >     server's authentication preference
> >
> > I think that just meeting the above two conditions could provide enough
> > value to merit publishing, even without attempting to add something
> > like:
> >
> > (3) allows the client to realistically hard-fail connections where DNSSEC
> >     validation returns bogus or indeterminate.
> >
> 
> I'm not sure I see a meaningful difference between (2) and (3), given
> that the mechanism for (2) is likely (3).

Mostly I'm just claiming that the "realistically" in (3) is weasel-words
that we don't need to get involved with at the protocol level.  Whether
or not to hard-fail is an application decision that we don't need to
mandate.

> 
> > Getting (1) is probably trivial (though with middleboxes you never
> > know), and it seems fairly clear that a pinning scheme can provide (2).
> >
> 
> Yes, the question is whether such a scheme is worth the other costs that
> it imposes (in particular, hostile pinning, and in the version that people
> have currently proposed, the ability to break yourself by inconsistent
> deployments, though that's at least conceivable fixable). In case it's
> not clear, I don't agree with Viktor's "no substantial issues have been
> raised" claim.

Seeing as you are busy the next few weeks, perhaps I can ask the chairs
to go through the email history and summarize these substantial issues
that have been raised -- I am not confident that I could reproduce them
from memory, myself.

-Ben

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to