Re: [saag] [lamps] subordinate vs intermediate certification authority

Viktor Dukhovni <ietf-dane@dukhovni.org> Mon, 08 February 2021 20:03 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 479B03A1551 for <saag@ietfa.amsl.com>; Mon, 8 Feb 2021 12:03:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.432
X-Spam-Level:
X-Spam-Status: No, score=-0.432 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, LOTS_OF_MONEY=0.001, MONEY_NOHTML=1.467, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lWIYrepZEOqz for <saag@ietfa.amsl.com>; Mon, 8 Feb 2021 12:03:36 -0800 (PST)
Received: from straasha.imrryr.org (straasha.imrryr.org [100.2.39.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE7183A1552 for <saag@ietf.org>; Mon, 8 Feb 2021 12:03:36 -0800 (PST)
Received: by straasha.imrryr.org (Postfix, from userid 1001) id 02BCE1A34EE; Mon, 8 Feb 2021 15:03:36 -0500 (EST)
Date: Mon, 8 Feb 2021 15:03:35 -0500
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: saag@ietf.org
Message-ID: <YCGZF7UNmvN3TdII@straasha.imrryr.org>
Reply-To: saag@ietf.org
References: <CAMm+Lwjks9M+yV0SOsne85eiycyNPm2NtHreDY3=BitAsqt18Q@mail.gmail.com> <CAErg=HHesEG1T+39WCgFGa---wzd884FQNGLndT35dvVAKf+kA@mail.gmail.com> <YCF4hPTq1Myurgqv@straasha.imrryr.org> <CAMm+LwhzWxe2vvj-WbQA5z9sfZuD=FhC7cLdzKqJ0k1+RP=cdg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <CAMm+LwhzWxe2vvj-WbQA5z9sfZuD=FhC7cLdzKqJ0k1+RP=cdg@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/5M7t8HWmPO7SojN1bVoGg8UhkPQ>
Subject: Re: [saag] [lamps] subordinate vs intermediate certification authority
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Feb 2021 20:03:38 -0000

On Mon, Feb 08, 2021 at 01:41:15PM -0500, Phillip Hallam-Baker wrote:

> > With DANE-TA(2), the server is *asserting* the trust-anchor that's
> > relevant for validation of its certificate.  It is not a pin as such.
> > The real trust-anchor is the DNSKEY RRset that ultimately signs the
> > chain leading to validated TLSA records.
> 
> Using DNS to anchor WebPKI certs is like trying to nail oak posts to jello.

[ Colourful aside ignored. ]

> All you have is a chain of trust up to the ICANN yacht club root of trust.
> You don't own a DNS name, you rent it. And companies that charge $250,000
> to apply to register a name have shown themselves to be untrustworthy.

At least I know who it chains to.

> > Clients that implement DANE-TA(2) support will use whatever appears in
> > the TLSA record, so there's no assumption of client policy.  (Indeed
> > less assumption of client policy than with WebPKI, where one must
> > tacitly assume that the CA one has elected to issue one's certs is
> > trusted by the relevant clients).
> 
> And ten years after DANE started, those widely deployed clients would be?

Postfix, Exim, Power-MTA, Halon MTA, Cisco ESA, Microsoft Azure hosted
Exchange (scheduled to go live this month), gmx.de, Protonmail, Postini,
mailbox.org, ...

Of ~14 million DNSSEC signed domains, 2.54 million have DANE TLSA RRs
for their MX hosts.

> > This is entirely a server-side issue: operational negligence,
> > unrelated to client policy.
> 
> No, it is a protocol failure. There are no incompetent users, only
> incompetent service providers. There are no incompetent
> administrators, only incompetent protocol architects.

I disagree, but the protocol failure, if you really insist on calling it
one, resulted from a compromise, where some folks wanted DANE to be
simple and just support DANE-EE(3), but some others wanted more
features, and so DANE has four certificate usages, of which only 2 are
suitable for SMTP, but almost everyone is wisely using DANE-EE(3).

Once I release "danebot" (in alpha now), which makes it easy to manage
DANE-EE(3) reliably with Let's Encrypt, more users will switch to
DANE-EE(3) and DANE-TA(2) should become increasingly rare.


> The sine qua non for all security policy is to automate the management
> of the services so that the policy advertisements are always up to
> date.

100% agreement, hence "danebot" coming to github soon.

> > Perhaps this is the short version of what I tried to spell out in more
> > detail.
> 
> DNSSEC is simply the WebPKI with a minimum of two trusted parties per path
> (ICANN + TLD registry). Oh and a heck of a lot more registries.

A system that eliminates redundant third parties in asserting domain
control.  The same ICANN root and registrars are also trusted parties
in DV cert issuance.

> If people want to pin keys to a name, the only way to do that in a
> practical way is to make the naming system and PKI co-extensive. That is
> not a feature that can be added to DNSSEC or to PKIX.

If the names are *DNS* names, then the parties that can delegate and
transfer control of domains are the natural parties to publish
assertions about trusted keys for those domains.

Some would redesign the domain hierarchy with various block-chain like
schemes, I don't expect these to succeed, but have no prior objections
to exploring other trust models.  Whatever the model, it should not
have redundant trusted 3rd-parties publishing assertions that the
principals can publish directly.

-- 
    Viktor.