Re: [dane] I-D Action: draft-ietf-dane-smtp-with-dane-04.txt
Viktor Dukhovni <viktor1dane@dukhovni.org> Sun, 24 November 2013 21:28 UTC
Return-Path: <viktor1dane@dukhovni.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E53571AE349 for <dane@ietfa.amsl.com>; Sun, 24 Nov 2013 13:28:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MQMO8RhQnRJw for <dane@ietfa.amsl.com>; Sun, 24 Nov 2013 13:28:55 -0800 (PST)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) by ietfa.amsl.com (Postfix) with ESMTP id E64951AE342 for <dane@ietf.org>; Sun, 24 Nov 2013 13:28:54 -0800 (PST)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 6A9352AB15E; Sun, 24 Nov 2013 21:28:45 +0000 (UTC)
Date: Sun, 24 Nov 2013 21:28:45 +0000
From: Viktor Dukhovni <viktor1dane@dukhovni.org>
To: dane@ietf.org
Message-ID: <20131124212845.GJ761@mournblade.imrryr.org>
References: <20131124073554.16862.64720.idtracker@ietfa.amsl.com> <20131124074249.GH761@mournblade.imrryr.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20131124074249.GH761@mournblade.imrryr.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] I-D Action: draft-ietf-dane-smtp-with-dane-04.txt
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dane@ietf.org
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Nov 2013 21:28:57 -0000
On Sun, Nov 24, 2013 at 07:42:49AM +0000, Viktor Dukhovni wrote: > On Sat, Nov 23, 2013 at 11:35:54PM -0800, internet-drafts@ietf.org wrote: > > > Title : SMTP security via opportunistic DANE TLS > > Author(s) : Viktor Dukhovni, Wes Hardaker > > Filename : draft-ietf-dane-smtp-with-dane-04.txt > > This is a bugfix update to 03. The new material in 03 is a > description of digest algorithm agility. Here it is for your comments, extracted from the draft: === Digest algorithm agility While RFC 6698 specifies multiple digest algorithms, it does not explicitly specify a protocol by which the SMTP client and TLSA record publisher can agree on the strongest shared algorithm. Such a protocol would allow the client and server to avoid exposure to any deprecated weaker algorithms that are published for campatibilty with less capable clients, but should if possible be ignored. We specify such a protocol below. Suppose that a DANE TLS client authenticating TLS server considers digest algorithm X stronger than digest algorithm Y. Suppose further that that a server's TLSA RRset contains some records with X as the digest algorithm. Suppose that for every raw public key or certificate object that is included in the server's TLSA RRset in digest form, whenever that object appears with digest Y (with some usage and selector) it also appears with digest X (with the same usage and selector). In that case our client can safely ignore TLSA records with the weaker digest Y, because it suffices to check the records with the stronger algorithm X. We take the simplest appraoch and mandate that all published TLSA RRsets conform to the above assumptions. Then clients can unconditionally ignore all but the (equal) strongest digest records with a given usage and selector. The ordering of digest algorithms by strength is entirely up to the client. Only the future will tell which algoritms might be weakened by new attacks and when. Therefore, server operators MUST ensure that for any given usage and selector, ALL objects with certificate association data with that usage and selector that are published with a digest matching type are published with the SAME SET of digests (non-zero matching types). In other words, for each usage and selector, the records with non-zero matching types will be a cross-product of a set of underlying objects and a fixed set of digests that apply uniformly to all the objects. Records with a matching type of "0", that publish the full object value play no role in digest algorithm agility. They neither preempt the processing of records that employ digests, nor are they ignored in the presence of any digest records. SMTP clients SHOULD use digest algorithm agility when processing the DANE TLSA records of an SMTP server. Algorithm agility is to be applied after first discarding any unusable or malformed records (unsupported digest algorithm, or incorrect digest length). Thus, for each usage and selector, the client SHOULD only process any usable records with a matching type of "0" and any usable records whose digest is believed to be the strongest among usable records with the same usage and selector. The main impact of this requirement is on key rotation, when the TLSA RRset is pre-populated with digests of new certificates or public keys, before these replace or augment their predecessors. Were the newly introduced RRs to include previously unused digest algorithms, clients that employ this protocol could potentially ignore all the digests corresponding to the currently deployed certificates causing connectivity issues until the new keys or certificates are deployed. Similarly, publishing new records with fewer digests could cause problems once the new keys are deployed. Server operators SHOULD follow the following rules. When adding or removing objects from the TLSA RRset (e.g. during key rotation), DO NOT change the set of digests used, change just the list of objects. When changing the set of digests used, change only the set of digests, and generate a new RRset in which all the current objects are re-published with the new set of digests. The client-side of this "digest algorithm agility" protocol is enabled by default in the first DANE for SMTP implementation. For key rotation to work non-disruptively server operators MUST ensure that their TLSA records conform with the above specification. -- Viktor.
- [dane] I-D Action: draft-ietf-dane-smtp-with-dane… internet-drafts
- Re: [dane] I-D Action: draft-ietf-dane-smtp-with-… Viktor Dukhovni
- Re: [dane] I-D Action: draft-ietf-dane-smtp-with-… Viktor Dukhovni