> On Oct 17, 2018, at 9:18 AM, Eric Rescorla <e...@rtfm.com> wrote:

>> (1) provides a channel for DANE records that is reliable in the absence of
>>     an attack
> 
> I think this alone would be worthwhile -- and is the purpose I have always had
> in mind for the draft.

Well, a security mechanism that "works in the absence of attack" looks
rather pointless to me.  Cleartext transmission with no authentication
also works in the absence of attack, and yet does not a security mechanism
make.  The -07 draft covers only the use-cases where the extension is
mandatory (pin interval of "from now and forever"), all the other use-cases
fail.

> I don't agree with Viktor's "no substantial issues have been
> raised" claim.

Then, please raise them!  Just saying "hostile pinning, QED" is
not a substantial issue.  We've argued in detail that:

1.  This was never the real problem with e.g. HPKP, and the credible
    concern is footgun, not "hostile pinning".  We've shown that footgun
    is not a substantive problem here.

2.  We've also argued that even with "hostile pinning" the domain owner
    recovers if he is able to deploy the extension (unlike never known
    keys with HPKP).  And clients that can do real DNSSEC lookups can
    always pay the extra latency, and if necessary do DNS over TLS to
    1.1.1.1, et. al. to get around last-mile barriers, and thus clear
    any unauthorized pins even prior to server-side extension support.
    
3.  And, frankly, I find hostile pinning not a credible threat, and to
    the extent that it yields client-visible side-effects of major prior
    compromise, I see any resulting tamper-evidence as a feature, not a
    bug.
    
4.  Lastly, if nevertheless the "hostile pinning" concern is what makes
    or breaks consensus on this draft, then we're OK with introducing
    exponential scaling-up (over time) of max pin TTL, which will keep
    it reasonably low until the last few years of the scaling horizon.

>From where I stand, mere repetition of "hostile pinning QED" frankly no
longer counts as a responsive objection. :-(

Likewise, mere repetition of a claimed benefit from downgradable DANE
signalling, without explaining why or how this is useful, is also not
a substantive argument to support a claim that the use-cases are served
without downgrade protection.  Which additional attacks does such
signalling militate, beyond those already handled by WebPKI?  There
would need to be a use-case where:

        * The extension is not mandatory.
        * Just WebPKI alone does not protect the server.
        * WebPKI + downgradable DANE signal protects the server.

I've not seen any such use-case.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to