Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Fri, 04 May 2012 13:08 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0540921F85B6 for <dane@ietfa.amsl.com>; Fri, 4 May 2012 06:08:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.632
X-Spam-Level:
X-Spam-Status: No, score=-2.632 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 93ZY4a7bcqHB for <dane@ietfa.amsl.com>; Fri, 4 May 2012 06:08:58 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 78D1E21F85A5 for <dane@ietf.org>; Fri, 4 May 2012 06:08:58 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 5E4E81ECB41C for <dane@ietf.org>; Fri, 4 May 2012 13:08:48 +0000 (UTC)
Date: Fri, 4 May 2012 09:08:46 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120504130846.GC4929@mail.yitter.info>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <0526D60A-3F1B-4C55-9796-256BC2556AAB@vpnc.org> <20120503223745.GC1804@mail.yitter.info> <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com> <20120504021044.GB4560@mail.yitter.info> <B25C977F-6B4E-458C-879D-A36EDB94DA75@icsi.berkeley.edu> <20120504023602.GA4683@mail.yitter.info> <CABcZeBO93n_C5detefBcOjAoswe2inGKDj65gQPDQmREyGnhAw@mail.gmail.com> <20120504112922.GB4929@mail.yitter.info> <2DDB5448-6A34-4D68-9421-4505CCC71A1A@icsi.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <2DDB5448-6A34-4D68-9421-4505CCC71A1A@icsi.berkeley.edu>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 13:08:59 -0000

On Fri, May 04, 2012 at 05:12:54AM -0700, Nicholas Weaver wrote:
> 
> DNSSEC at all requires client validation

No it does not.  You keep insisting that because you have in mind the
model of any DNS client in any network, but not every situation is
like that.  I personally think that end-point validation is the best
way to do things, but the protocol is written in such a way that it is
not required, and we can't make it so by wishing.

> , and client validation
> REQUIRES that the client be able to bypass the
> significant-probability-broken recursive resolver already.

Yes.

> DANE
> doesn't really add to that: If the client can fetch DNSSEC signed
> records, TLSA won't be a problem.

But I note that in my DNSSEC Trigger application, I have the ability
to turn it off -- and sometimes it disables itself.  This tells me
that the most-robust end-point validation tool we have already
concedes that it isn't perfect.  The proposal appears, AFAICT, to make
that known-bad path a critical dependency not just for TLSA, but for
doing TLS _at all_.  The way I read the proposal, if you can't get a
TLSA then you fail the TLS connection.  In some number of networks,
what you're arguing for is "no TLS, ever" for any TLSA-enabled
application.  Is that really the direction we want to go?  Because I
predict the result is going to be that everyone turns off TLSA in
their systems on the first day of failure, and then the protocol is dead.

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com