Re: [dane] draft-ietf-dane-smime

"Osterweil, Eric" <eosterweil@verisign.com> Mon, 20 October 2014 16:08 UTC

Return-Path: <eosterweil@verisign.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE5F21A1BDE for <dane@ietfa.amsl.com>; Mon, 20 Oct 2014 09:08:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x__vBb33EK5K for <dane@ietfa.amsl.com>; Mon, 20 Oct 2014 09:08:21 -0700 (PDT)
Received: from exprod6og115.obsmtp.com (exprod6og115.obsmtp.com [64.18.1.35]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4750B1A0369 for <dane@ietf.org>; Mon, 20 Oct 2014 09:06:58 -0700 (PDT)
Received: from brn1lxmailout01.verisign.com ([72.13.63.41]) (using TLSv1) by exprod6ob115.postini.com ([64.18.5.12]) with SMTP ID DSNKVEUzIUXTKofQfHYXS56iKiPbiH6o+kb3@postini.com; Mon, 20 Oct 2014 09:06:59 PDT
Received: from brn1wnexcas01.vcorp.ad.vrsn.com (brn1wnexcas01.vcorp.ad.vrsn.com [10.173.152.205]) by brn1lxmailout01.verisign.com (8.13.8/8.13.8) with ESMTP id s9KG6ura005347 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 20 Oct 2014 12:06:57 -0400
Received: from BRN1WNEXMBX01.vcorp.ad.vrsn.com ([::1]) by brn1wnexcas01.vcorp.ad.vrsn.com ([::1]) with mapi id 14.03.0174.001; Mon, 20 Oct 2014 12:06:56 -0400
From: "Osterweil, Eric" <eosterweil@verisign.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Thread-Topic: [dane] draft-ietf-dane-smime
Thread-Index: AQHP2+CXduy9obN06UaH3lWvHXXI5ZwabJwAgBgn4ICAAikmgIAEwWkAgAAIngCAAANjAA==
Date: Mon, 20 Oct 2014 16:06:56 +0000
Message-ID: <DDDF307A-9180-43C2-B612-2B13C2E98A18@verisign.com>
References: <273F9612-13AF-4CB8-B15C-912AAD04C738@verisign.com> <CF875C06-E4DA-4DCA-A722-5FDEE04B3069@vpnc.org> <67BDE5B6-58C7-4E0B-8CB4-045E51027D85@ieca.com> <3473729E-BC37-48DB-9ACD-FB872CB666DE@vpnc.org> <FE426405-9658-41BD-BD3B-68D358CC3CEB@verisign.com> <63BF3336-C9B8-4D16-BEB7-D42EFBB7A113@vpnc.org>
In-Reply-To: <63BF3336-C9B8-4D16-BEB7-D42EFBB7A113@vpnc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.173.152.4]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <FDCEA986E8E0824E8B40074DE01575A6@verisign.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/O38luJOwslwygFHZXxRa3UjgxOs
Cc: "<dane@ietf.org>" <dane@ietf.org>
Subject: Re: [dane] draft-ietf-dane-smime
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Oct 2014 16:08:24 -0000

On Oct 20, 2014, at 11:54 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:

> On Oct 20, 2014, at 8:23 AM, Osterweil, Eric <eosterweil@verisign.com> wrote:
> 
>> TLS and S/MIME use pretty different security models (session vs. object security)
> 
> Sure, but how is that difference relevant here? DANE is about distributing certificates and keying information through DNS: it is agnostic to the security model.

The relevant information needed during distribution would seem to vary based on the security model (as evidenced by this thread).  Actually, that’s been one of the main points of this thread.

>> , so necessarily coupling the RRs doesn’t seem to make sense.  
> 
> It has so far in the WG. The WG asked us early on to make as few changes as possible to the TLSA definition.

Paul, we are all part of the working group.  This is the the working group.  I feel like I must be missing some nuanced distinction you have in mind between working group discussions (like this one) and some other arbitration?

>> In addition, to echo what others have already said on the list, I really don’t think it is reasonable to gate updates to the SMIMEA proposal on updating TLSA.
> 
> Fully agree, and that's not what I was proposing. The two changes that you have proposed (revocation indication and alternate sources for getting the information)

Paul, these were not my proposals.  These were proposed by Scott Rose.  I saw merit in them and when they seemed to be dismissed out of hand I voiced my support.  Also, the proposal included the _encr + _sign labels.

> can be done as new values to the existing RR subfields. Doing so would make what you want usable for both SMIMEA and TLSA. Proposals to make those changes can trivially be done as stand-alone Internet Drafts.

But we are still roughing out this draft.  This would seem to be a good opportunity to try and get things write in the initial work.

>>> A better process would be for the proponents to offer a standalone draft for the idea that will be an extension that would be usable to both TLSA and SMIMEA and any other documents that come later.
>> 
>> Just by looking at the list, it seems like there are a number of voices that disagree with you on this.  
> 
> Where "a number" means "two", and even they didn't actually disagree about creating standalone drafts, simply that the assumption that the use cases might be different.

I think this thread is devolving.  The number is greater than two, and reviewing the posts of this thread should corroborate the higher level of interest.

>> Also, isn’t the SMIMEA work still an evolving draft?  
> 
> Yes, of course.
> 
>> What else does one need besides: articulated rationale, proposed requirements, operational data, suggested text, and running code from multiple people in order to support suggested revisions?  
> 
> Consensus in the WG. That may seem anathema to you, but it's the way that the IETF works.

Paul, what constituted ``the WG’’ in your mind? 

Eric