Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys

Paul Wouters <paul@nohats.ca> Tue, 03 June 2014 05:05 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D87B1A00B2 for <dane@ietfa.amsl.com>; Mon, 2 Jun 2014 22:05:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.651
X-Spam-Level:
X-Spam-Status: No, score=-2.651 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l3Ve6p7e4m1H for <dane@ietfa.amsl.com>; Mon, 2 Jun 2014 22:05:03 -0700 (PDT)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD5631A00B1 for <dane@ietf.org>; Mon, 2 Jun 2014 22:05:02 -0700 (PDT)
Received: from bofh.nohats.ca (bofh.nohats.ca [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 4C531802BF for <dane@ietf.org>; Tue, 3 Jun 2014 01:04:56 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1401771896; bh=mklkAzB18CA+tHmPAAkdTuNl85s+dEwzrte8CQiqkLU=; h=Date:From:To:Subject:In-Reply-To:References; b=rz4t6mdAbxpKSP1iMmDKTDZs9RCvVr03JiVNanrBIy0byWt2jLK1XcFtJZSBEuaxU BWJHJQCySDk5LwaXFPlJEZLMuRqENvip7EtlWgLEkGljfjzRZz1leiAa8u1ihz+JD7 OT6tr5KuuQ48LXJRqyPDdrBrdSn/PV5nYahWicvI=
Received: from localhost (paul@localhost) by bofh.nohats.ca (8.14.7/8.14.7/Submit) with ESMTP id s5354tkT022885 for <dane@ietf.org>; Tue, 3 Jun 2014 01:04:55 -0400
X-Authentication-Warning: bofh.nohats.ca: paul owned process doing -bs
Date: Tue, 03 Jun 2014 01:04:55 -0400
From: Paul Wouters <paul@nohats.ca>
To: dane@ietf.org
In-Reply-To: <20140602172922.GS27883@mournblade.imrryr.org>
Message-ID: <alpine.LFD.2.10.1406030056500.19868@bofh.nohats.ca>
References: <201405290805.s4T85HBT008757@new.toad.com> <76254E90-245A-4502-AFBE-74A3038BB08F@vpnc.org> <OFB1999EAD.836E27A5-ON85257CE8.0067D557-85257CEB.000B5F5E@us.ibm.com> <20140602022733.GK27883@mournblade.imrryr.org> <538C86C7.8000805@cs.tcd.ie> <20140602145215.GP27883@mournblade.imrryr.org> <20140602172922.GS27883@mournblade.imrryr.org>
User-Agent: Alpine 2.10 (LFD 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/XzcXslVOHE8v85oivEOT4q6Z1iE
Subject: Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jun 2014 05:05:05 -0000

On Mon, 2 Jun 2014, Viktor Dukhovni wrote:

> In whatever document ends up publishing the details,  I would say:
>
>    TLS clients that support out of band public keys ([TLS WG
>    document reference]) authenticated via DANE TLSA records SHOULD
>    NOT employ the "oob public key" TLS extension unless all the
>    server's TLSA records are compatible with out of band public
>    keys.  The client SHOULD send an SNI extension with the server's
>    TLSA base domain even if it is willing or expecting to use out
>    of band public keys.

Again, I don't see why. If there is one TLSA record that matches the
public key of the server, that's good enough. If you do any kind of TLS
key rollover, the TLS admin better pre-publish the proper TLSA records.

Saying that all TLSA records should be of a type compatible with oob
serves no purpose and could hinder deploymentment of oob TLS.

If a TLS client local policy prefers oob, and it finds only non-oob
compatible TLSA records, it could omit using oob to prevent issues.
But I don't think that is a MUST.

> For the server side, I would add:
>
>    Servers that support "oob public key" MAY employ SNI to select
>    the correct public key, either by identifying a matching
>    certificate from which to extract the key, or via some other
>    mapping from the requested domain to the corresponding key.

I do not see why we need to drag SNI into this. How is SNI different for
bare keys versus certificates? If the client tells the server the SNI,
the server picks the right identity - regardless of the 7250 extension.

Paul