Re: [saag] [lamps] subordinate vs intermediate certification authority
Viktor Dukhovni <ietf-dane@dukhovni.org> Mon, 08 February 2021 20:03 UTC
Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 479B03A1551
for <saag@ietfa.amsl.com>; Mon, 8 Feb 2021 12:03:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.432
X-Spam-Level:
X-Spam-Status: No, score=-0.432 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, LOTS_OF_MONEY=0.001, MONEY_NOHTML=1.467,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id lWIYrepZEOqz for <saag@ietfa.amsl.com>;
Mon, 8 Feb 2021 12:03:36 -0800 (PST)
Received: from straasha.imrryr.org (straasha.imrryr.org [100.2.39.101])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id CE7183A1552
for <saag@ietf.org>; Mon, 8 Feb 2021 12:03:36 -0800 (PST)
Received: by straasha.imrryr.org (Postfix, from userid 1001)
id 02BCE1A34EE; Mon, 8 Feb 2021 15:03:36 -0500 (EST)
Date: Mon, 8 Feb 2021 15:03:35 -0500
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: saag@ietf.org
Message-ID: <YCGZF7UNmvN3TdII@straasha.imrryr.org>
Reply-To: saag@ietf.org
References: <CAMm+Lwjks9M+yV0SOsne85eiycyNPm2NtHreDY3=BitAsqt18Q@mail.gmail.com>
<CAErg=HHesEG1T+39WCgFGa---wzd884FQNGLndT35dvVAKf+kA@mail.gmail.com>
<YCF4hPTq1Myurgqv@straasha.imrryr.org>
<CAMm+LwhzWxe2vvj-WbQA5z9sfZuD=FhC7cLdzKqJ0k1+RP=cdg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <CAMm+LwhzWxe2vvj-WbQA5z9sfZuD=FhC7cLdzKqJ0k1+RP=cdg@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/5M7t8HWmPO7SojN1bVoGg8UhkPQ>
Subject: Re: [saag] [lamps] subordinate vs intermediate certification
authority
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>,
<mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>,
<mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Feb 2021 20:03:38 -0000
On Mon, Feb 08, 2021 at 01:41:15PM -0500, Phillip Hallam-Baker wrote: > > With DANE-TA(2), the server is *asserting* the trust-anchor that's > > relevant for validation of its certificate. It is not a pin as such. > > The real trust-anchor is the DNSKEY RRset that ultimately signs the > > chain leading to validated TLSA records. > > Using DNS to anchor WebPKI certs is like trying to nail oak posts to jello. [ Colourful aside ignored. ] > All you have is a chain of trust up to the ICANN yacht club root of trust. > You don't own a DNS name, you rent it. And companies that charge $250,000 > to apply to register a name have shown themselves to be untrustworthy. At least I know who it chains to. > > Clients that implement DANE-TA(2) support will use whatever appears in > > the TLSA record, so there's no assumption of client policy. (Indeed > > less assumption of client policy than with WebPKI, where one must > > tacitly assume that the CA one has elected to issue one's certs is > > trusted by the relevant clients). > > And ten years after DANE started, those widely deployed clients would be? Postfix, Exim, Power-MTA, Halon MTA, Cisco ESA, Microsoft Azure hosted Exchange (scheduled to go live this month), gmx.de, Protonmail, Postini, mailbox.org, ... Of ~14 million DNSSEC signed domains, 2.54 million have DANE TLSA RRs for their MX hosts. > > This is entirely a server-side issue: operational negligence, > > unrelated to client policy. > > No, it is a protocol failure. There are no incompetent users, only > incompetent service providers. There are no incompetent > administrators, only incompetent protocol architects. I disagree, but the protocol failure, if you really insist on calling it one, resulted from a compromise, where some folks wanted DANE to be simple and just support DANE-EE(3), but some others wanted more features, and so DANE has four certificate usages, of which only 2 are suitable for SMTP, but almost everyone is wisely using DANE-EE(3). Once I release "danebot" (in alpha now), which makes it easy to manage DANE-EE(3) reliably with Let's Encrypt, more users will switch to DANE-EE(3) and DANE-TA(2) should become increasingly rare. > The sine qua non for all security policy is to automate the management > of the services so that the policy advertisements are always up to > date. 100% agreement, hence "danebot" coming to github soon. > > Perhaps this is the short version of what I tried to spell out in more > > detail. > > DNSSEC is simply the WebPKI with a minimum of two trusted parties per path > (ICANN + TLD registry). Oh and a heck of a lot more registries. A system that eliminates redundant third parties in asserting domain control. The same ICANN root and registrars are also trusted parties in DV cert issuance. > If people want to pin keys to a name, the only way to do that in a > practical way is to make the naming system and PKI co-extensive. That is > not a feature that can be added to DNSSEC or to PKIX. If the names are *DNS* names, then the parties that can delegate and transfer control of domains are the natural parties to publish assertions about trusted keys for those domains. Some would redesign the domain hierarchy with various block-chain like schemes, I don't expect these to succeed, but have no prior objections to exploring other trust models. Whatever the model, it should not have redundant trusted 3rd-parties publishing assertions that the principals can publish directly. -- Viktor.
- [saag] subordinate vs intermediate certification … Michael Richardson
- Re: [saag] subordinate vs intermediate certificat… Viktor Dukhovni
- Re: [saag] [lamps] subordinate vs intermediate ce… Brockhaus, Hendrik
- Re: [saag] subordinate vs intermediate certificat… Michael Richardson
- Re: [saag] subordinate vs intermediate certificat… Viktor Dukhovni
- Re: [saag] subordinate vs intermediate certificat… Dr. Pala
- Re: [saag] [lamps] subordinate vs intermediate ce… Michael Richardson
- Re: [saag] subordinate vs intermediate certificat… Michael Richardson
- Re: [saag] subordinate vs intermediate certificat… Michael Richardson
- Re: [saag] subordinate vs intermediate certificat… Viktor Dukhovni
- Re: [saag] subordinate vs intermediate certificat… Michael Richardson
- Re: [saag] [lamps] subordinate vs intermediate ce… Ryan Sleevi
- Re: [saag] [lamps] subordinate vs intermediate ce… Phillip Hallam-Baker
- Re: [saag] [lamps] subordinate vs intermediate ce… Viktor Dukhovni
- Re: [saag] [lamps] subordinate vs intermediate ce… Eliot Lear
- Re: [saag] [lamps] subordinate vs intermediate ce… Phillip Hallam-Baker
- Re: [saag] [lamps] subordinate vs intermediate ce… Phillip Hallam-Baker
- Re: [saag] [lamps] subordinate vs intermediate ce… Viktor Dukhovni
- Re: [saag] subordinate vs intermediate certificat… Michael Richardson