Re: [dane] Draft ietf-dane-srv-07

Peter Saint-Andre <stpeter@stpeter.im> Mon, 25 August 2014 23:27 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 481F51A0476 for <dane@ietfa.amsl.com>; Mon, 25 Aug 2014 16:27:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.13
X-Spam-Level:
X-Spam-Status: No, score=0.13 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RP_MATCHES_RCVD=-0.668, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w8lY89ykQnsY for <dane@ietfa.amsl.com>; Mon, 25 Aug 2014 16:27:36 -0700 (PDT)
Received: from stpeter.im (mailhost.stpeter.im [207.210.219.225]) by ietfa.amsl.com (Postfix) with ESMTP id 3C4121A0462 for <dane@ietf.org>; Mon, 25 Aug 2014 16:27:36 -0700 (PDT)
Received: from aither.local (unknown [73.34.202.214]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id DC43240FA4; Mon, 25 Aug 2014 17:28:04 -0600 (MDT)
Message-ID: <53FBC668.3000204@stpeter.im>
Date: Mon, 25 Aug 2014 17:27:36 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dane@ietf.org
References: <E97563AC-9012-45BB-BBE0-44D35C8419F9@edvina.net> <20140724125827.GX2595@mournblade.imrryr.org> <53F37F9C.3050504@stpeter.im> <m3vbpoqs2g.fsf@carbon.jhcloos.org> <53F39F1A.2080108@stpeter.im> <20140819194607.GJ14392@mournblade.imrryr.org>
In-Reply-To: <20140819194607.GJ14392@mournblade.imrryr.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/arqKFf4gr_PZrXb3KT7t3hFe0vw
Subject: Re: [dane] Draft ietf-dane-srv-07
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Aug 2014 23:27:38 -0000

On 8/19/14, 1:46 PM, Viktor Dukhovni wrote:
> On Tue, Aug 19, 2014 at 01:01:46PM -0600, Peter Saint-Andre wrote:
>
>> I think that's a more precise way to put it. Thus I propose the following
>> revised text:
>>
>>     Developers of application clients that depend on DANE-SRV often would
>>     like to prepare as quickly as possible for making a connection to the
>>     intended service, thus reducing the wait time for end users.  To make
>>     this possible, a DNS library might perform the SRV queries, address
>>     queries, and TLSA queries in parallel (although the TLSA records are
>>     not usable if the address records are not secure, performing the TLSA
>>     queries in parallel is not harmful from a security perspective).
>
> Almost right, but note that the reason to "supress" TLSA RRs when
> address RRs are insecure is that TLSA RR lookups have been observed
> to generate spurious lookup errors in that case (which one might
> misconstrue to be an attack).
>
> If TLSA RRs are actually returned, they are most likely to be also
> "insecure" when the A records are insecure.  In fact any other
> outcome would require a DLV configuration for say either
> _tcp.imap.example.com or _143._tcp.imap.example.com to re-establish
> trust below the "insecure" imap.example.com.  Such configurations
> seem most unlikely.
>
> Also avoid "not usable", since that has special meaning in 6698.
> So the thing to say is something along the lines that when the
> A/AAAA results are "insecure" errors in TLSA lookup can be ignored,
> but otherwise, any errors in TLSA lookup should be considered
> equivalent to an active attack and cause the peer to be skipped.

How about this?

    (because the TLSA records can
    be ignored if the address records are not secure, performing the TLSA
    queries in parallel is not harmful from a security perspective).

Peter