Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Tue, 15 May 2012 15:55 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1026E21F8944 for <dane@ietfa.amsl.com>; Tue, 15 May 2012 08:55:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.623
X-Spam-Level:
X-Spam-Status: No, score=-2.623 tagged_above=-999 required=5 tests=[AWL=-0.024, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e7-YTrt-GxcX for <dane@ietfa.amsl.com>; Tue, 15 May 2012 08:55:18 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 61D5521F88AD for <dane@ietf.org>; Tue, 15 May 2012 08:55:18 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id C68671ECB41C for <dane@ietf.org>; Tue, 15 May 2012 15:55:17 +0000 (UTC)
Date: Tue, 15 May 2012 11:55:15 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120515155515.GH20521@mail.yitter.info>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <643D87CD-D01E-47B8-82E5-D3F57D50C80B@vpnc.org> <alpine.LFD.2.02.1205142229552.10990@bofh.nohats.ca> <CABcZeBMS9cJ3m6JwJED7XAqdsF=zbTUUU_o3-opiZvqMyr7mdw@mail.gmail.com> <20120515111318.GZ20521@mail.yitter.info> <CABcZeBNE9jeWejY=bsV6U0v8Ar04mw7ENpHwDEBqniUQdS2WXg@mail.gmail.com> <20120515145506.GC20521@mail.yitter.info>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20120515145506.GC20521@mail.yitter.info>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 May 2012 15:55:19 -0000

I know, replying to myself. 

On Tue, May 15, 2012 at 10:55:06AM -0400, Andrew Sullivan wrote:

> In the DANE case, as you point out, what we're doing is adding to the
> DNS supplementary data about a different data path.  That's the reason
> that, when you get an error or don't get a response, you need to draw
> a conclusion.  This is an unusual thing to do with the DNS.

An off-list conversation with Paul Hoffman (thanks, Paul) leads me to
try to make this more precise.  What we are doing in the DANE case,
with uses 0 and 1, is to add constraints to the operation of another
protocol.  That is, use 2 and 3 provide a full-blown change to another
protocol.  E.g., 3 says "use this cert or key" so you don't end up
following an X.509 chain of trust when doing your TLS negotiation.
But 0 and 1 don't do that; instead they say, "Do your PKIX work as
normal, but here's an additional constraint." 

This adding of constraints is the thing that is unusual to do with the
DNS.  Paul convinced me pretty quickly that this is not the first time
we've done it, but it's unusual enough that when we do it we may not
realise what we're doing.  (On reflection, for instance, I think that
SPF, when used with a mail server that rejects the mail at EHLO due to
SPF failure, amounts to a case like this.)

I am currently calling these cases "constraint assertions in the DNS"
because I don't have a nicer name.  I think those calling for funny
handling of normal DNS conditions like error messages have identified
a fundamental need in constraint-assertion cases, because if one
cannot receive a message about the existence of such a constraint
assertion, one has a problem.  

This doesn't leave me more certain of what to say in the draft, but at
least I have a clearer idea of what's at issue.  Does anyone else
think this way of thinking about the difference is helpful?

Best,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com