Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys

Viktor Dukhovni <viktor1dane@dukhovni.org> Sat, 31 May 2014 01:10 UTC

Return-Path: <viktor1dane@dukhovni.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 964061A06DA for <dane@ietfa.amsl.com>; Fri, 30 May 2014 18:10:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7UtCa0XS6E33 for <dane@ietfa.amsl.com>; Fri, 30 May 2014 18:10:54 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C7461A043C for <dane@ietf.org>; Fri, 30 May 2014 18:10:54 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 1BE1A2AB137; Sat, 31 May 2014 01:10:48 +0000 (UTC)
Date: Sat, 31 May 2014 01:10:48 +0000
From: Viktor Dukhovni <viktor1dane@dukhovni.org>
To: dane@ietf.org
Message-ID: <20140531011048.GE27883@mournblade.imrryr.org>
References: <201405290805.s4T85HBT008757@new.toad.com> <20140529141626.GH27883@mournblade.imrryr.org> <alpine.LFD.2.10.1405291257210.14277@bofh.nohats.ca> <20140529180356.GL27883@mournblade.imrryr.org> <m3a99zgkdk.fsf@carbon.jhcloos.org> <20140530192840.GC27883@mournblade.imrryr.org> <m3mwdyg7do.fsf@carbon.jhcloos.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <m3mwdyg7do.fsf@carbon.jhcloos.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/Cx2ncqea7l4A8jV0fsXsBpgE7sw
Subject: Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dane@ietf.org
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 31 May 2014 01:10:58 -0000

On Fri, May 30, 2014 at 07:43:06PM -0400, James Cloos wrote:

> VD> Not true.  If the server's "3 1 x" RRs reflect only keys that were
> VD> active in the past, or only keys that will be active in the future,
> VD> while the currently active certificate key matches other TLSA RRs
> VD> ((usage, selector) != (DANE-EE(3), SPKI(1)) then the client loses
> VD> if it negotiates "oob public key" and server only presents a leaf
> VD> SPKI instead of a leaf cert.
> 
> That is irrelevant.  Config errors like that will happen w/o oob just as
> much as with.  And clients need to decline then, too.  The fact that an
> oob client which expects to use tlsa to validate the spki needs a tlsa
> which works with that should be noted, but we (the wg) don't need to
> do any more than mention it.

It is not a configuration error, rather a valid transition state,
that clients must support.  With DANE, I don't expect clients to
be statically configured for each "oob public key" destination.

Rather, clients will be capable of "oob public key" support, and
of DANE, and will use the two in combination when it makes sense.
Thus, if a client sees only "3 1 X" or "3 0 0" TLSA RRs, and using
DANE for authentication, it can go ahead and use "oob public key".
If the TLSA records don't include any of the above, or are mixed,
the client must not negotiate "oob public key".

The idea is that clients will offer "oob public key" when possible,
which might lead to wide-scale use of the extenion.  Otherwise, it
is just a curiousity.

-- 
	Viktor.