[ I hope the below is short enough...]

> On Nov 5, 2018, at 9:37 AM, Salz, Rich <rs...@akamai.com> wrote:
> 
> Is it fair to describe the draft as enabling a trust model based on DNSSEC, 
> rather than the default X.509 hierarchy and trust store which is implemented 
> by default?
> 
> Please try very hard to keep the answer brief.

The original (-07) draft only does the job for applications that
go all in on DANE and statically skip the WebPKI.

What we're trying to do is to make DANE meaningfully available
also to existing applications where the WebPKI still rules the
roost, and where clients can only determine which servers support
DANE "opportunistically", but for that to be useful, the signal
needs some downgrade resistance.

The ultimate goal is to be able to use DANE either instead of,
or in combination with the WebPKI.  Which it is depends on the
DANE certificate usages that the application supports and server
publishes.  We're not trying to kill the WebPKI, rather we want
the *option* to use DANE when client and server opt-in.

Finally, of course, the reason for the extension is last-mile
issues with DNSSEC in captive portals and behind DNS-challenged
home routers, plus a bit of latency concern (that may be overblown,
but still seems an issue for some).

-- 
        Viktor.



-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to