Re: [keyassure] Bare keys again

Eric Rescorla <ekr@rtfm.com> Mon, 21 March 2011 20:48 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: keyassure@core3.amsl.com
Delivered-To: keyassure@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 98B1728C172 for <keyassure@core3.amsl.com>; Mon, 21 Mar 2011 13:48:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.939
X-Spam-Level:
X-Spam-Status: No, score=-102.939 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C1flb6bsMsv3 for <keyassure@core3.amsl.com>; Mon, 21 Mar 2011 13:48:06 -0700 (PDT)
Received: from mail-iy0-f172.google.com (mail-iy0-f172.google.com [209.85.210.172]) by core3.amsl.com (Postfix) with ESMTP id BF40928C17E for <keyassure@ietf.org>; Mon, 21 Mar 2011 13:48:06 -0700 (PDT)
Received: by iyi12 with SMTP id 12so7902216iyi.31 for <keyassure@ietf.org>; Mon, 21 Mar 2011 13:49:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.42.117.8 with SMTP id r8mr1677817icq.37.1300740579422; Mon, 21 Mar 2011 13:49:39 -0700 (PDT)
Received: by 10.42.217.2 with HTTP; Mon, 21 Mar 2011 13:49:39 -0700 (PDT)
In-Reply-To: <alpine.LFD.1.10.1103211631260.20162@newtla.xelerance.com>
References: <92D68A5E-5CB7-4C80-8D7B-0B8D55D93608@kumari.net> <alpine.LFD.1.10.1103201932370.20162@newtla.xelerance.com> <9D285351-8D73-4C15-BE2C-5DF731C08DCE@vpnc.org> <alpine.LFD.1.10.1103202028110.20162@newtla.xelerance.com> <1300669586.2117.12.camel@localhost> <alpine.LFD.1.10.1103202211390.20162@newtla.xelerance.com> <1300739370.2117.40.camel@localhost> <alpine.LFD.1.10.1103211631260.20162@newtla.xelerance.com>
Date: Mon, 21 Mar 2011 13:49:39 -0700
Message-ID: <AANLkTimyOXv66UeG2q2dmt1-e_Ek6WPPH-coueFc7fDS@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
To: Paul Wouters <paul@xelerance.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: keyassure@ietf.org
Subject: Re: [keyassure] Bare keys again
X-BeenThere: keyassure@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Key Assurance With DNSSEC <keyassure.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/keyassure>
List-Post: <mailto:keyassure@ietf.org>
List-Help: <mailto:keyassure-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/keyassure>, <mailto:keyassure-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 20:48:07 -0000

On Mon, Mar 21, 2011 at 1:39 PM, Paul Wouters <paul@xelerance.com> wrote:
> On Mon, 21 Mar 2011, Matt McCutchen wrote:
>
>>>    -  "pre_agreed": no CA root key identity supplied.
>>
>> "pre_agreed" stands for a set of one or more trust anchors that is
>> already known to the other side in the context of a particular
>> deployment.  Hence, bandwidth is saved by not sending identifiers for
>> the trust anchors.
>
> which is the case of the TLS client has gotten the public key from DNS using
> DANE. But it does not matter how the client obtained the trust. The client
> is telling the server it has all the required trust anchors, and that the
> server can ommit sending them over.

There's a difference between end-entity certificates and trust anchors, and the
RFC 6066 text simply does not say that you can omit the EE cert.


> That is exactly what the option is meant
> to do.

I'm not sure it makes sense to get into questions of textual hermeneutics here,
but I don't recall anyone suggesting the omission of the EE cert while this
draft was under discussion, so I don't think this assertion is very convincing.


> I can see how we would want the TLS client behaviour to be written down in a
> standards document, and I am more then happy to do so.

In my opinion this is what would be required, and that document would need to
be standardized by the TLS WG.


> But adding a new
> TLS client/server extension is silly. it would have the exact same semantics
> as "pre_agreed", as I don't think we would want to state that the "new
> pre-agreed"
> can only be used if the client has used DANE to validate the key. This is
> like
> writing separate laws for email spam and fax spam....

That's for the TLS WG to decide.


>> Using "pre_agreed" to tell the server it can skip
>> sending a certificate chain is not envisioned by RFC 6066.
>
> On the contrary, that is *exactly* what the goal of 6066 is. It specifies as
> reason "memory starved clients" and "reducing bandwidth", but why is that
> list treated as an exclusive list?

See above.

-Ekr