Re: [dane] Behavior in the face of no answer?

Paul Hoffman <paul.hoffman@vpnc.org> Tue, 15 May 2012 02:12 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C14E321F8503 for <dane@ietfa.amsl.com>; Mon, 14 May 2012 19:12:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.556
X-Spam-Level:
X-Spam-Status: No, score=-102.556 tagged_above=-999 required=5 tests=[AWL=0.044, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rWKHBIlWEc6U for <dane@ietfa.amsl.com>; Mon, 14 May 2012 19:12:28 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 35ACC21F8501 for <dane@ietf.org>; Mon, 14 May 2012 19:12:28 -0700 (PDT)
Received: from [10.20.30.102] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.3) with ESMTP id q4F2CNT7037360 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 14 May 2012 19:12:24 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset=us-ascii
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com>
Date: Mon, 14 May 2012 19:12:23 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <643D87CD-D01E-47B8-82E5-D3F57D50C80B@vpnc.org>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
X-Mailer: Apple Mail (2.1278)
Cc: dane@ietf.org
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 May 2012 02:12:28 -0000

There doesn't seem to be convergence here, and the WG chairs and AD have asked the authors to propose wording that might bring consensus. The following text may be insufficient, but it's the best I can do at the moment, and if it isn't good enough, having you propose specific changes may be helpful.

This proposed text tries to pull together:

- Ekr's security analysis

- The desire for a MUST that is likely to be deployed, not ignored

- Acknowledgement that if the user doesn't know TLSA is being used, they are not losing anything from the attack

(And, yes, I think that the chairs should be doing this bit instead of Jakob and I. Oh, well.)

An attacker who is able to divert a user to a server under his control is also
likely to be able to block DNS requests from the user or DNS responses being
sent to the user. Thus, in order to achieve any security benefit from
certificate usage 0 or 1, an application that sends a request for TLSA records
needs to get either a valid signed response containing TLSA records or
verification that the domain is insecure or indeterminate. If a request for a
TLSA record does not meet one of those two criteria but the application
continues with the TLS handshake anyway, the application has gotten no benefit
from TLSA and should not make any internal or external indication that TLSA
was applied. If an application has any indication that TLSA is in use (such as
through a configuration setting), that application MUST not start a TLS
connection or abort a TLS handshake if either of the two criteria above are
not met.

Livable? Better specific suggestions?

--Paul Hoffman