Re: [dane] Behavior in the face of no answer?

Paul Hoffman <paul.hoffman@vpnc.org> Fri, 04 May 2012 16:32 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3B3921E8045 for <dane@ietfa.amsl.com>; Fri, 4 May 2012 09:32:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.547
X-Spam-Level:
X-Spam-Status: No, score=-102.547 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eKEyS9CRnlTN for <dane@ietfa.amsl.com>; Fri, 4 May 2012 09:32:34 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id 2347D21E800F for <dane@ietf.org>; Fri, 4 May 2012 09:32:34 -0700 (PDT)
Received: from [10.20.30.102] (50-0-66-4.dsl.dynamic.fusionbroadband.com [50.0.66.4]) (authenticated bits=0) by hoffman.proper.com (8.14.5/8.14.3) with ESMTP id q44GWW06029206 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <dane@ietf.org>; Fri, 4 May 2012 09:32:33 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1257)
From: Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <CAMfhd9XYS=9SGotCTwa7NJU4L8WFys2rDVsQZxn4a0wz+NxS3Q@mail.gmail.com>
Date: Fri, 4 May 2012 09:32:32 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <6015A12B-8CA9-426B-9AFF-32CD4211DAB5@vpnc.org>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <0526D60A-3F1B-4C55-9796-256BC2556AAB@vpnc.org> <20120503223745.GC1804@mail.yitter.info> <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com> <20120504021044.GB4560@mail.yitter.info> <B25C977F-6B4E-458C-879D-A36EDB94DA75@icsi.berkeley.edu> <20120504023602.GA4683@mail.yitter.info> <CABcZeBO93n_C5detefBcOjAoswe2inGKDj65gQPDQmREyGnhAw@mail.gmail.com> <20120504112922.GB4929@mail.yitter.info> <CABcZeBPTTa07iUHo9XL5WrHGMYHwaQzs6xYtiF25O4Jek8E3RQ@mail.gmail.com> <20120504144426.GD4929@mail.yitter.info> <CABcZeBOM_0L42Rng75AsVda9u4G=FH8=OB8Qg=nQpL-BzRoBuQ@mail.gmail.com> <3FF36EBA-F8B1-4D66-BA00-E8E36A7E449D@kumari.net> <CABcZeBP2iRLa76rSXu4A0OwFxP=tqK1ShZ6wv=6wnaEC6uad+w@mail.gmail.com> <CAMfhd9XYS=9SGotCTwa7NJU4L8WFys2rDVsQZxn4a0wz+NxS3Q@mail.gmail.com>
To: IETF DANE WG list <dane@ietf.org>
X-Mailer: Apple Mail (2.1257)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 16:32:34 -0000

On May 4, 2012, at 9:18 AM, Adam Langley wrote:

> On Fri, May 4, 2012 at 12:08 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>> Before we discuss how to proceed, I think it would be useful to get agreement
>> on the security analysis. I claim that for Usages 0 and 1, treating
>> TLSA non-response
>> as if no TLSA records exist means that DANE adds minmal/no security
>> value for those
>> usages.
> 
> I believe that you're completely correct.
> 
> Browsers are not going to enable DANE hard fail in the short or medium
> term because of the fraction of clients that have broken DNS and can't
> fetch the records.
> 
> Therefore, browsers are not going to see a security benefit from DANE.
> The DNSSEC stapled certificates that Tom points to are addressing a
> very different use case: people who would otherwise use self-signed
> certificates and who get annoyed that we throw errors for them.
> 
> However, browsers are not the world. Other clients, which may benefit
> from a smaller, more controlled, deployment may be able to enforce
> DANE hard-fail and see security benefits.
> 
> I would personally suggest that the spec requires hard fail, or at
> least discusses the fact that, without hard-fail, the security
> benefits are moot. Implementations frequently ignore requirements in
> specs, but rarely add to them!

My preference is that the spec discuss the issue, propose hard-fail as an option, and explain that without hard-fail the benefits for usage 0 and 1 can be circumvented but that the client is no worse off than without DANE. It's important to emphasize that this is about usage 0 and 1, and that a different security analysis applies to types 2 and 3 (well, 3 certainly; I need to think about 2).

I would prefer that we not require hard fail while assuming some implementers will not follow our requirement, since that leads to us being dishonest about what we expect. If we believe (as Adam says) that implementations ignore these types of requirements, let's be honest about that and let the implementer know what it means to ignore the suggested action.

--Paul Hoffman