Re: Quic: the elephant in the room

Phillip Hallam-Baker <phill@hallambaker.com> Sat, 10 April 2021 16:58 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 604543A14D1 for <ietf@ietfa.amsl.com>; Sat, 10 Apr 2021 09:58:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TPwjLtEQQZnV for <ietf@ietfa.amsl.com>; Sat, 10 Apr 2021 09:58:38 -0700 (PDT)
Received: from mail-yb1-f178.google.com (mail-yb1-f178.google.com [209.85.219.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C76513A14D0 for <ietf@ietf.org>; Sat, 10 Apr 2021 09:58:38 -0700 (PDT)
Received: by mail-yb1-f178.google.com with SMTP id c195so10108888ybf.9 for <ietf@ietf.org>; Sat, 10 Apr 2021 09:58:38 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Adp5UoUTNCyT4W0IOYav/29RiTcLrZi/8S9gfX1w6I8=; b=DZOZ0rIZMrqOtOtHeXyFZB4yLOtd9CrPuyDodxrw0vg0al+ORbilr7PqXht8C0A/DA S2R/Fy87+PaZj/Y6YpS8/qs8iayXrGJK+cINz2qmiRNI7N4yVuWXEcoeN+kuRV8RxuZI B5coo93grnzdu0IRpKq+0LYbX3hmVNNbA0Cqx4OGinu3C194rTFKci3cFZQ3EN+b31/O x6xjI+AhE/gL+gxSv7tVEsNjmeAaAbjfUeG/Q/oqLLb3xfvBZx0WV0s467XPEoGrEC7u 2GRPwJum6lb03Vi9xIxLnON2e2at+HJeQRclUPcxtL/Xsfvd6QR4qPD2YYHjOPPOZgoJ 4ZXg==
X-Gm-Message-State: AOAM531mtMNRSzeg7MpsdwX/ddTfPcnp2N6vPhn3haWzwqKBuYoYIjcA kTHvND0m6eljUK8WyFWfZZ8WxoxmvbI9aPGuQ82wb/4dtqJiYQ==
X-Google-Smtp-Source: ABdhPJyl9QeplvAVhIic9UZrZqTPnqlHTYefOvjid2C3FYgW0FZ4NQ0UeBQSsMPFCtluNlAhJ1t6i7FIgDzOfV46ptE=
X-Received: by 2002:a5b:585:: with SMTP id l5mr25979885ybp.213.1618073917735; Sat, 10 Apr 2021 09:58:37 -0700 (PDT)
MIME-Version: 1.0
References: <3b25c77d-e721-e86d-6c34-a90039aab0e2@mtcc.com> <CAMm+Lwhi8xwFgZJL7jod2g4urZt_f+dm0tNi+3y1osqOfch2mQ@mail.gmail.com> <3593a01f-73f4-7d03-a85b-dff64a8b070e@mtcc.com> <CABrd9STZXonBDvWB7Z36H2mD20Juubc01TUmEvpfWkvJggQVOQ@mail.gmail.com>
In-Reply-To: <CABrd9STZXonBDvWB7Z36H2mD20Juubc01TUmEvpfWkvJggQVOQ@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Sat, 10 Apr 2021 12:58:28 -0400
Message-ID: <CAMm+Lwif3x9Vs9LQ=gn3-mqNVvoavTUCQmJm23uhXhOEv8rASQ@mail.gmail.com>
Subject: Re: Quic: the elephant in the room
To: Ben Laurie <benl@google.com>
Cc: Michael Thomas <mike@mtcc.com>, IETF Discussion Mailing List <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001648ab05bfa13107"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/LQHYpg_lJbeFI6N7DVS-Tlyr9Qw>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Apr 2021 16:58:43 -0000

On Sat, Apr 10, 2021 at 5:29 AM Ben Laurie <benl@google.com> wrote:

>
>
> On Sat, 10 Apr 2021 at 00:35, Michael Thomas <mike@mtcc.com> wrote:
>
>>
>> On 4/9/21 4:26 PM, Phillip Hallam-Baker wrote:
>>
>> It is only a 'three packet handshake' if you ignore the off path
>> interactions with the DNS service. The timeout on DNS tens to be rather
>> smaller than that most would be comfortable with for crypto.
>>
>> I don't see why it can't be long lived, but even normal TTL's would get
>> amortized over a lot of connections. Right now with certs it is a 5 message
>> affair which cannot get better. But that is why one of $BROWSERVENDORS
>> doing an experiment would be helpful.
>>
>
> When I was designing Certificate Transparency, Chrome ruled out any side
> channel communications requirement during handshake. Given that DNS is
> required anyway, perhaps this would be different. However, the other
> problem is introducing DNS as a trust root - the DNS hierarchy is
> considerably less secure than CAs were even before CT but now it's really a
> very poor option in comparison.
>
> Could be fixed with DNS Transparency, of course.
>

That is not the approach I am planning to take.

DNSSEC will always be an afterthought and Domain Validation in the WebPKI
will always be weak because the role of the CA is to recover information
thrown away in the DNS registration scheme.

Build out the name registry and the PKI in parallel and the need for Domain
Validation goes away entirely.

My current proposal is focused on the never solved problem of credentialing
people rather than organizations and employees in organizations. But it
could also be used for organizations:

GitHub - hallambaker/Callsign <https://github.com/hallambaker/Callsign>
Mathematical Mesh 3.0 Part VII: Mesh Callsign Service (ietf.org)
<https://www.ietf.org/id/draft-hallambaker-mesh-callsign-00.html>

This is not built on Certificate Transparency but it does apply many of the
same ideas.