Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys

"Simon Arlott" <simon@arlott.org> Thu, 05 June 2014 11:48 UTC

Return-Path: <simon@arlott.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A34121A0071 for <dane@ietfa.amsl.com>; Thu, 5 Jun 2014 04:48:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g0C5j9026D13 for <dane@ietfa.amsl.com>; Thu, 5 Jun 2014 04:48:11 -0700 (PDT)
Received: from proxima.lp0.eu (proxima.lp0.eu [IPv6:2001:8b0:ffea:0:205:b4ff:fe12:530]) by ietfa.amsl.com (Postfix) with ESMTP id B6CCD1A0058 for <dane@ietf.org>; Thu, 5 Jun 2014 04:48:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=arlott.org; s=exim; h=Content-Transfer-Encoding:Content-Type:MIME-Version:To:From:Subject:Date:References:In-Reply-To:Message-ID; bh=//Xgw7uCN5FUPxdByMiad3QvX03LlwplmasxgrkCIe8=; b=nB6dT9fZoF0nR9C1RoI830+TCB9WXife1WFsgx629RkmWLtJqm6XqaT67eyngC5OMzgMeQ/T4381CTsbNz6qi/KWZIy9aVcVL4cAFBh/miOE60QE7OuSqBKZdhUsaJV1kF+3TqH6ewPG3Y89ETG3jnCsmi+gPFXii2YBTeGBJeVSt+1T1qi99I7lVswFlre2/+HDXJmSeHKdYXNVqaa+HBzTWC8ugPGzjIojMW9bJ9WE7JywVpr6NtbzPdnGnCvH8ZVe4SbQGkgkLew8T6P/CBFxdrLBdVOxzWvCZ9KOtgsgswCBlFxVqscwcjWzJyQdDu5Rm8HMY9M/f/Vl9bpqHg==;
Received: from lp0_webmail by proxima.lp0.eu with local id 1WsW9G-0005xQ-Fw for dane@ietf.org; Thu, 05 Jun 2014 12:47:59 +0100
Received: from simon by proxima.lp0.eu with https; Thu, 5 Jun 2014 12:47:58 +0100
Message-ID: <4e941a7fe4be00884d43cf848b30bec228883452@8b5064a13e22126c1b9329f0dc35b8915774b7c3.invalid>
In-Reply-To: <20140604025535.GJ27883@mournblade.imrryr.org>
References: <201405290805.s4T85HBT008757@new.toad.com> <76254E90-245A-4502-AFBE-74A3038BB08F@vpnc.org> <OFB1999EAD.836E27A5-ON85257CE8.0067D557-85257CEB.000B5F5E@us.ibm.com> <20140602022733.GK27883@mournblade.imrryr.org> <538C86C7.8000805@cs.tcd.ie> <20140602145215.GP27883@mournblade.imrryr.org> <20140602172922.GS27883@mournblade.imrryr.org> <alpine.LFD.2.10.1406030056500.19868@bofh.nohats.ca> <20140603130839.GY27883@mournblade.imrryr.org> <m3ppip5s57.fsf@carbon.jhcloos.org> <20140604025535.GJ27883@mournblade.imrryr.org>
Date: Thu, 05 Jun 2014 12:47:58 +0100
From: Simon Arlott <simon@arlott.org>
To: dane@ietf.org
User-Agent: SquirrelMail/1.4.22
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/qH5pr6kjzFb0x7UX77ir37M1tJk
Subject: Re: [dane] Extending TLSA RFC to operate with TLS's new raw public keys
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jun 2014 11:48:13 -0000

On Wed, June 4, 2014 03:55, Viktor Dukhovni wrote:
> On Tue, Jun 03, 2014 at 10:23:39PM -0400, James Cloos wrote:
> The onus to get this corner case avoided needs to be either on the
> client or on the server.  The client-side solution is simpler:
>
>     * Avoid "oob public key" negotiation when authentication is
>       via DANE and TLSA records may require a full certificate.

If at least one TLSA record is DANE-EE(3) then a full certificate
is not required for that record.

Why do you need to restrict the client behaviour when the other
currently defined record types are also present?

What is the intended behaviour of the oob-capable client when new
TLSA record types are defined? Do those records also cause it to
refuse to do OOB or does it ignore them?

-- 
Simon Arlott