Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys

Viktor Dukhovni <viktor1dane@dukhovni.org> Fri, 06 June 2014 16:00 UTC

Return-Path: <viktor1dane@dukhovni.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79FA21A009C for <dane@ietfa.amsl.com>; Fri, 6 Jun 2014 09:00:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jID2JzY0ouzf for <dane@ietfa.amsl.com>; Fri, 6 Jun 2014 09:00:12 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E78691A0080 for <dane@ietf.org>; Fri, 6 Jun 2014 09:00:11 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id B682F2AAB4F; Fri, 6 Jun 2014 16:00:03 +0000 (UTC)
Date: Fri, 06 Jun 2014 16:00:03 +0000
From: Viktor Dukhovni <viktor1dane@dukhovni.org>
To: dane@ietf.org
Message-ID: <20140606160003.GZ27883@mournblade.imrryr.org>
References: <20140602172922.GS27883@mournblade.imrryr.org> <alpine.LFD.2.10.1406030056500.19868@bofh.nohats.ca> <20140603130839.GY27883@mournblade.imrryr.org> <m3ppip5s57.fsf@carbon.jhcloos.org> <20140604025535.GJ27883@mournblade.imrryr.org> <4e941a7fe4be00884d43cf848b30bec228883452@8b5064a13e22126c1b9329f0dc35b8915774b7c3.invalid> <20140605151145.GA27883@mournblade.imrryr.org> <201406060140.s561esBT021883@new.toad.com> <20140606023114.GT27883@mournblade.imrryr.org> <alpine.LFD.2.10.1406061131360.16748@bofh.nohats.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.LFD.2.10.1406061131360.16748@bofh.nohats.ca>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/fWmagrSudxOQAqnZqQAo6-DWbIY
Subject: Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dane@ietf.org
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jun 2014 16:00:13 -0000

On Fri, Jun 06, 2014 at 11:35:04AM -0400, Paul Wouters wrote:

> Okay, I understand this example now and your desire to not mixup TLSA
> types. However, the operations document could simply advise not to
> combine a key rollover with a usage/type/selector rollover at once,
> which seems more appropriate than banning all other valid scenario's
> that mixup type such as:
> 
>  	IN TLSA 2 0 1 {current TA}
>  	IN TLSA 3 1 1 {current leaf}

I am not suggesting to ban mixed TLSA RRs. Rather, I was suggesting
that clients encountering mixed TLSA RRs might want to avoid RPK, but
we'll handle that question in the other thread.

To your point about transitions and changing one thing at a time,
yes that's the right high-level description of the BCP TLSA RRset
change strategy.  Keep all other things fixed and apply one of:

    * Add future keys presented with the same U/S/M combinations as
      existing keys.

    * Remove all U/S/M combinations for legacy keys leaving only
      current keys.

    * Add new U/S/M combinations that match the same keys as existing
      U/S/M combinations.

    * Remove all records with a given U/S/M combination.

    * Or combine the two previous and replace one U/S/M combination with
      another, while still matching the same set of keys.

The required invariant is that at all times each currently published,
or not yet expired from DNS caches, U/S/M combination comtains at
least one record that matches the current server keys.

Whether or not client RPK behaviour includes any work-arounds for
"mixed" TLSA RRsets, the above should be a BCP for server TLSA RRset
management.

-- 
	Viktor.