Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Tue, 08 May 2012 15:53 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15F4621F863B for <dane@ietfa.amsl.com>; Tue, 8 May 2012 08:53:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.625
X-Spam-Level:
X-Spam-Status: No, score=-2.625 tagged_above=-999 required=5 tests=[AWL=-0.026, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nwoZ7qkbzOmy for <dane@ietfa.amsl.com>; Tue, 8 May 2012 08:53:04 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 6237B21F8628 for <dane@ietf.org>; Tue, 8 May 2012 08:53:04 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id BF32F1ECB41D for <dane@ietf.org>; Tue, 8 May 2012 15:53:03 +0000 (UTC)
Date: Tue, 8 May 2012 11:53:00 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120508155300.GJ10226@mail.yitter.info>
References: <20120504165512.GC7394@mail.yitter.info> <CABcZeBO4zRSa=JexqZ8uw7o26tM4SZk2GDivTAWD5ZF1pZR9Og@mail.gmail.com> <20120504194132.GF7394@mail.yitter.info> <alpine.LFD.2.02.1205041553030.7798@bofh.nohats.ca> <AD11709E-F662-492E-BE3B-23ADD82536F0@icsi.berkeley.edu> <C8A32DF2-E912-4D53-B0E3-D79852632A3E@kumari.net> <C8244A46-63BD-4903-B72C-6AB43413FB61@ICSI.Berkeley.EDU> <DEED37B2-216E-44DA-8EDC-8E4271BDCBD5@vpnc.org> <A6208FF0-4544-470C-BBBD-5C4E328C6EC4@ICSI.Berkeley.EDU> <201205072316.q47NGbcF013098@new.toad.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <201205072316.q47NGbcF013098@new.toad.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 May 2012 15:53:05 -0000

On Mon, May 07, 2012 at 04:16:37PM -0700, John Gilmore wrote:
> I think that if the DANE TLS implementation can't get either a
> dnssec-validated TLSA rrset, or a dnssec-validated absence of a TLSA
> rrset, then to meet its security responsibilities, it has to fail to
> connect.

This is a strong statement, and is perhaps what ekr was asking for
too.  It's that "fail to connect" that bugs me.  For it means that, if
a client is TLSA-aware and it happens to find itself in some sort of
environment in which TLSA records don't work, or DNSSEC records don't
work, or both, there is exactly one thing it can do: foil all TLS
connection attempts.

> In browsers there will likely be a switch to "Use DANE TLS" just like
> today there's a preference checkbox in Firefox for "Use SSL 3.0" and
> "Use TLS 1.0".  When behind a broken coffeeshop gateway, the human may
> need to manually turn off that switch.

Just to be clear, what that does it cause the user to turn the browser
into a TLSA-unaware client.  If I had to bet, I'd bet that it will
persist and that it will itself become a barrier to operation.

It feels to me like this discussion lies right on the barrier of
"protocol" and "local policy", and that may be the reason it appears
to be intractable.  On the one hand, I can't believe anyone wants a
requirement that actually increases the chances people will make
connections without TLS, by making TLS impossible in some networks
where it sort of works today.  On the other hand, I understand (and
agree with) the analysis pointing out the attack available if a
complete non-response causes fall-through to traditional TLS
processing.  I'm wondering whether implementation or deployment advice
(perhaps in another document) is something that's not just nice to
have, but needed.

Best,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com