[Dance] Minutes from the DANCE IETF-123 meeting

Wes Hardaker <wjhns1@hardakers.net> Sat, 26 July 2025 22:09 UTC

Return-Path: <wjhns1@hardakers.net>
X-Original-To: dance@mail2.ietf.org
Delivered-To: dance@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id DC2344BA2435 for <dance@mail2.ietf.org>; Sat, 26 Jul 2025 15:09:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=hardakers.net
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1J4GxXHI3T9v for <dance@mail2.ietf.org>; Sat, 26 Jul 2025 15:09:03 -0700 (PDT)
Received: from mail.hardakers.net (mail.hardakers.net [107.220.113.177]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 799A24BA2430 for <dance@ietf.org>; Sat, 26 Jul 2025 15:09:03 -0700 (PDT)
Received: from localhost (unknown [205.220.129.36]) by mail.hardakers.net (Postfix) with ESMTPA id BDD702351C for <dance@ietf.org>; Sat, 26 Jul 2025 15:09:00 -0700 (PDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 mail.hardakers.net BDD702351C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardakers.net; s=default; t=1753567742; bh=hHJ8Gju88xS9s8sfxGAiXFHcWEqrKXfWQmhAhA6frU4=; h=From:To:Subject:Date:From; b=B6QeyvFnAi1yw6mQoMFRt+gKmz0NKXU9fSRxIL2C2fTFw4PzGRCSe3EulREYj8a8v O3MIRq0ijTEFuUV08dAvat5MIFb1mvHN4fck1xQmXYioPuNJiWD4zWOEUXJNC/7U0c bZRn2eubNWdyBGa2TUL7X83W62rmSEuOnznvdkSU=
From: Wes Hardaker <wjhns1@hardakers.net>
To: dance@ietf.org
User-Agent: Gnus/5.13 (Gnus v5.13)
Date: Sat, 26 Jul 2025 15:08:52 -0700
Message-ID: <yblh5yyvc3v.fsf@wx.hardakers.net>
MIME-Version: 1.0
Content-Type: text/plain
Message-ID-Hash: VFE6Q44NHMT4ROF65BGVPYXLNM3NX3AY
X-Message-ID-Hash: VFE6Q44NHMT4ROF65BGVPYXLNM3NX3AY
X-MailFrom: wjhns1@hardakers.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Dance] Minutes from the DANCE IETF-123 meeting
List-Id: DANE Authentication for Network Clients Everywhere <dance.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dance/Lx0cQZu1C6xpJDaAlZbeVc98PEw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dance>
List-Help: <mailto:dance-request@ietf.org?subject=help>
List-Owner: <mailto:dance-owner@ietf.org>
List-Post: <mailto:dance@ietf.org>
List-Subscribe: <mailto:dance-join@ietf.org>
List-Unsubscribe: <mailto:dance-leave@ietf.org>

Below are the minutes taken during the DANCE meeting which I've now
published.  Let me know if there are any corrections.

HUGE thanks to Rich for taking these notes.

# DANCE

Thursday, 2025-07-24 -- 12:00 local -- 10:00 UTC
Notes: Rich "twisted arm" Salz

## All three about to go to IESG:
- draft-ietf-dance-architecture
- draft-ietf-dance-client-auth
- draft-ietf-dance-tls-clientid

## draft-hallambaker-dns-dance

- Vision: Every host (light bulb, etc) has a DNS name, even if it's not a public name. "Handle Service Provider" new/existing/AV/other to provide this kind of service.  HSP is open service, so users can switch providers (for paid case).

- "What if Internet goes down?" Now need client TLS auth. If everything has a DNS name, DANCE is a way to authenticate.

    Paul: Roughly "zero" people have their own DNS name. So unlikely to expect my family using "paul.gmail.com" to ever be able to migrate.
    PHB: There are ways to address it (see Bluesky practices, GNS free partition, etc). I think the main reason is there's no  use for general consumer to get a name. I think this creates demand.
    Paul: I got lucky and have easy "nohats" don't think DNS Ncan do that.
    Viktor: FB has a billion users, so I'm not skeptical of a billion users in a namespace.
    
- TLS client auth with reasonable name is the obvious tech choice. (HSP runs small private CA, probably via ACME; each user has their own root). Open questions: how to bind root, cert profile,

    Viktor: At TLS yesterday, discussion of draft for client to tell server "ask for my client certificate" You might find it helpful. Browsing with Kerberos can be cleaner than webauth, so look at GSS model.
    DKG: I think you're asking for a super-cookie. There are downsides to having completely friction-free identity system.
    PHB: Those are valid concerns. If people are going to partition their identity, it can be done once not every time.
    Q: Be careful about CA's, since they aren't held to same high standards of WebPKI root trust stores.
    PHB: Not expecting existing software to use there
    Discussion of X509 nameConstraints, who supported it, 
    Wes: This is DANE-based WG, so for off-line use how do you use DANE?
    Viktor: Local DNS infrastructure
    PHB: Cache roots; have a device in the user's house to handle this (e.g., DNS cache)
    
- Next steps?

    Viktor: want more details on protocols for me to understand the problem. If you're really off-line, time sync is very hard and we need time for our protocols.
    PHB: I was told DANCE is shutting down, wanted to get expertise. OFf-line/time *is* a big problem.
    Paul: A problem with DANCE is putting things into DNS that you don't want to share.
    PHB: Split-DNS (a records private; ACME records public while requesting renewal)
    Paul: SETTLE mailing list
    Jim Reid: Interesting, but not really appropriate for DANCE, lots of things in there. Private CA roots in split-DNS terrifies me. Maybe progress via mailing list.
    PHB: I 
    (Break while I was waiting on the mic line)
    Wes: Maybe come back before existing docs are done with IETF last call -- i.e., months.

    Paul as Sec AD: This has been very hard to get work in this WG. Need more than just five people interested for it to be believable that it would succeeed.


-- 
Wes Hardaker
USC/ISI