WG Action: Rechartered DNS-based Authentication of Named Entities (dane)

The IESG <iesg-secretary@ietf.org> Fri, 13 June 2014 16:34 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED3B91A05CB; Fri, 13 Jun 2014 09:34:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FOfH4M0sn7C4; Fri, 13 Jun 2014 09:34:19 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C5A021B293F; Fri, 13 Jun 2014 09:34:18 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Action: Rechartered DNS-based Authentication of Named Entities (dane)
X-Test-IDTracker: no
X-IETF-IDTracker: 5.5.0.p2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20140613163418.19464.92042.idtracker@ietfa.amsl.com>
Date: Fri, 13 Jun 2014 09:34:18 -0700
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf-announce/H6_1iekSIindV1p1R5DEgASdcdM
Cc: dane WG <dane@ietf.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: ietf@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce/>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jun 2014 16:34:21 -0000

The DNS-based Authentication of Named Entities (dane) working group in
the Security Area of the IETF has been rechartered. For additional
information please contact the Area Directors or the WG Chairs.

DNS-based Authentication of Named Entities (dane)
------------------------------------------------
Current Status: Active WG

Chairs:
  Warren Kumari <warren@kumari.net>
  Olafur Gudmundsson <ogud@ogud.com>

Secretaries:
  Matt Lepinski <mlepinski.ietf@gmail.com>

Assigned Area Director:
  Stephen Farrell <stephen.farrell@cs.tcd.ie>

Mailing list
  Address: dane@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/dane
  Archive: http://www.ietf.org/mail-archive/web/dane/

Charter:

DANE is a set of mechanisms and techniques that allow Internet
applications to establish cryptographically secured communications
by using information made available in DNS. By binding the key 
information to a domain name and protecting that binding with 
DNSSEC, applications can easily discover authenticated keys for 
services.

Objective:

    The DANE WG will specify how to incorporate DANE and DANE-like
    functionality into protocols. The WG will specify the use of DANE 
    for protocols that use SRV to express service location. The WG will 
    specify DANE use for SMTP, SMIME, OPENPGP, IPSEC and  
    other base electronic mail protocols such as (IMAP or POP). The
    DANE WG shall also produce a set of implementation guidance 
    for operators and tool developers. 

    When work on currently chartered documents is complete the WG
    may re-charter if sufficiently pressing new work is identified.

    DANE is not intended to be a long-lived catch-all WG for all 
    public key distribution in DNS issues and so will generally not 
    adopt new work items without re-chartering. 

Problem Statement:

    The DANE working group has developed a framework for securely
    retrieving keying information from the DNS [RFC6698]. This
    framework allows secure storing and looking up server public key
    information in the DNS. This provides a binding between a domain
    name providing a particular service and the key that can be used
    to establish encrypted connection to that service.

    By requiring DNSSEC protection for the lookup of the public key
    information, DANE leverages the integrity protection provided by
    DNSSEC to enable secure discovery of keying information. Operators
    wanting to take advantage of DANE for their services must turn on
    DNSSEC signing on the zones used in finding the services. Using
    DNS this way, bindings of keys to domains are asserted by the 
    entities that operate the DNS for that domain, not by external 
    entities. 

    The DANE mechanisms provide flexibility in how the keying
    information is presented. DANE supports both Certificates and raw
    keys. Furthermore, the keys (raw or imbedded in certificates) can be 
    full keys or a hashes of keys. 
    The group will work on documenting the different approaches to use
    DANE keying, and the security implication of each. In addition
    the WG may develop a framework(s) to facilitate the lookup "client" 
    DANE records for authorization/authentication purposes. 

    The group may also create documents that describe how protocol
    entities can discover and validate these bindings in the execution
    of specific applications. This work would be done in coordination
    with the IETF Working Groups responsible for the protocols. 

    The group may in addition encourage interoperability testing and 
    document the results of such testing. 

Milestones:
  Jun 2014 - Advance DANE SRV document to IESG
  Jun 2014 - Advance DANE SMTP document to IESG
  Aug 2014 - Advance DANE SMIME document to IESG
  Aug 2014 - Advance DANE OPENPGP document to IESG
  Sep 2014 - Advance DANE operational guidance/errata document to IESG
  Jan 2015 - Advance DANE security model document to IESG
  May 2015 - Advance DANE IPSEC document to IESG
  Jun 2015 - Advance DANE reverse binding (server to client) document to
IESG
  Sep 2015 - Advance DANE RFC6698 and DANE SRV RFC to Internet Standard
  Nov 2015 - Recharter or close down