Re: [dane] S/MIME draft

"Osterweil, Eric" <eosterweil@verisign.com> Tue, 26 August 2014 17:28 UTC

Return-Path: <eosterweil@verisign.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E3131A00A8 for <dane@ietfa.amsl.com>; Tue, 26 Aug 2014 10:28:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g2m9FmQEuqLz for <dane@ietfa.amsl.com>; Tue, 26 Aug 2014 10:28:17 -0700 (PDT)
Received: from exprod6og108.obsmtp.com (exprod6og108.obsmtp.com [64.18.1.21]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8ECFF1A0045 for <dane@ietf.org>; Tue, 26 Aug 2014 10:28:13 -0700 (PDT)
Received: from osprey.verisign.com ([216.168.239.75]) (using TLSv1) by exprod6ob108.postini.com ([64.18.5.12]) with SMTP ID DSNKU/zDrO9Iy5ZJ/wWCJidP7glBoCoJgYkU@postini.com; Tue, 26 Aug 2014 10:28:17 PDT
Received: from BRN1WNEXCHM01.vcorp.ad.vrsn.com (brn1wnexchm01.vcorp.ad.vrsn.com [10.173.152.255]) by osprey.verisign.com (8.13.6/8.13.4) with ESMTP id s7QHSBb7023832 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 26 Aug 2014 13:28:12 -0400
Received: from BRN1WNEXMBX01.vcorp.ad.vrsn.com ([::1]) by BRN1WNEXCHM01.vcorp.ad.vrsn.com ([::1]) with mapi id 14.03.0174.001; Tue, 26 Aug 2014 13:28:10 -0400
From: "Osterweil, Eric" <eosterweil@verisign.com>
To: Paul Wouters <paul@nohats.ca>
Thread-Topic: [dane] S/MIME draft
Thread-Index: AQHPwTzSp2zLy/0IwEiIGXszYmLFzpvjQ5kAgAAjMIA=
Date: Tue, 26 Aug 2014 17:28:09 +0000
Message-ID: <68A831F1-9066-41AD-81A2-2A2EEE2CE556@verisign.com>
References: <CE2072BD-39C8-42FE-B08D-7930667D5DEC@verisign.com> <alpine.LFD.2.10.1408261110540.28003@bofh.nohats.ca>
In-Reply-To: <alpine.LFD.2.10.1408261110540.28003@bofh.nohats.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.173.152.4]
Content-Type: multipart/signed; boundary="Apple-Mail=_51EE2C05-391E-4CF6-8A81-7422B6405BE1"; protocol="application/pkcs7-signature"; micalg="sha1"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/asqmLFTsiIXm3pFpLzIkWoemkvM
Cc: dane WG list <dane@ietf.org>
Subject: Re: [dane] S/MIME draft
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Aug 2014 17:28:21 -0000

Hey Paul,

Wow, thanks for the really quick read! :)

On Aug 26, 2014, at 11:22 AM, Paul Wouters <paul@nohats.ca>
 wrote:

> On Tue, 26 Aug 2014, Osterweil, Eric wrote:
> 
>> Some time ago we had some discussions about draft-ietf-dane-smime, which led to
>> 	https://www.ietf.org/mail-archive/web/dane/current/msg06338.html
>> A few of us felt that it might be productive to outline a set of requirements that we foresee DANE facing in enterprises environments (w.r.t. encrypted/signed email).  To that end, we put together the draft:
>> 	``Enterprise Requirements for Secure Email Key Management''
>> 	http://tools.ietf.org/html/draft-osterweil-dane-ent-email-reqs-00
> 
> I'm not an smime person at all and I'm a little confused about what the
> document is trying to do. It talks about "key management requirements",
> and then suggests specific requirements for a "protocol"?
> 
> Which protocol?

By protocol, we were talking about the process of trying to find, verify, and use keys from DNS for email encryption and signing.

> I would think this would be very much in the realm of
> local policies. If something is missing in the smime-dane draft for
> "enterprise deployment", does that mean the smime-dane draft itself is
> incomplete? Could you send PaulH and Jakob text to ensure it can support
> enterprise roll-out?

In the referenced email thread, we had a discussion about adding specific text, but we wound up not being able to resolve things.  As a result, we were hoping that this draft would server as a step back that provides focused intuition behind the general ideas from the previously offered specific text.  The previous suggestions are in the email archive, but this draft is intended to spark any needed discussions in order to clarify (and hopefully overcome) fundamental misunderstandings/disagreements/etc.  We're definitely open the prospect that there might be more optimal ways to update the smime-dane draft than the text that was previously suggested before.

> If it is complete, then your document should only list the
> requirements on HOW to use it, instead of defining a new future protocol?

I think we feel it is the former.

> 	REQ-16  Encryption keys MUST be discoverable separately from
>           signature keys.  Possible means includes (but not limited to)
>           naming conventions, sub-typing or unique RR types for each
>           use
> 
>               Intuition: Not all certificates for a user may be needed
>               for all circumstances.  Fetching them separately can be a
>               management, a scaling, or even a security concern.
> 
> This requirement for example is impossible with the current smime-dane draft? And
> sub-typing these days is frowned upon.

RFC 5751 has support for this behavior in Section 2.5.3, so I think it's worth considering that this policy choice exists in operational deployments.  That said, I think your comment raises a very good point though because it underlies some of our motivation for writing this draft.  We think supporting existing practices is important to help bolster DANE's deployment.  I don't think we want our protocols to show up and be incompatible with existing deployments on day 1, if we can reasonably avoid it, right?  That could actually deal a much harsher blow to DANE than anything else: 
	``this thing just doesn't work at all…'' 
could be quite hard to overcome.

> I'm not sure how fetching the keys for encryption and signing separately
> would be a security concern? That seems a little uhm, far fetched :)

Maybe an organization wants to control the ability of external RPs to learn specific types of keying material, but may want/need to continue to expose other types.  That was actually an operational problem encountered after Heartbleed for some places.

> If it is in public DNS, anyone can do it. If it is in private DNS, I'd
> say it is already secured?

If I want to ensure that some keys are public and some are not (based on how they are used, i.e. signing or encrypting), I likely want configuration options to help me there.  That's part of the point.  Do the other two points (management and scaling) make more sense than this one?  Is it primarily the ``security concern'' statement that seems untenable?

Eric