Re: [TLS] Proposed text for dnsssec chain extension draft
Eric Rescorla <ekr@rtfm.com> Thu, 26 April 2018 14:50 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84F7812DA15 for <tls@ietfa.amsl.com>; Thu, 26 Apr 2018 07:50:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 46PhrZJpJIH9 for <tls@ietfa.amsl.com>; Thu, 26 Apr 2018 07:50:50 -0700 (PDT)
Received: from mail-oi0-x22e.google.com (mail-oi0-x22e.google.com [IPv6:2607:f8b0:4003:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D52AC126BF7 for <tls@ietf.org>; Thu, 26 Apr 2018 07:50:49 -0700 (PDT)
Received: by mail-oi0-x22e.google.com with SMTP id f63-v6so24386626oic.4 for <tls@ietf.org>; Thu, 26 Apr 2018 07:50:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=75AbODfrpiB3PcmOzpsKU7RWAyNG8uFhq3E7IO/tewo=; b=KA650/0DkmDboFSwMLBce43C7v2xGuEpOlrURNamL9wf/ZsItdTqOiDZnQ2F7zM1ji unEteDkNkutqe++/ZE0irJeX33pXjZFgnRlboiHuRZLKnfHsnMPNCnL6GYD0BSPt8UTq rNjMvaZMTNP9e5VdyJRdKsm8dg7bBl/ueANPBg5ZA1hdXphGbIYn+HL+UZ3F4yv0qcWU F77H+Vpv5LfqgY2+msPgQrNae75yt1y6UROeuViOufxLmJzX6WcxGCbZMWnVPRruZa+M 0q4hv1SjWDHWgjhaXWyZxiddRcyaqpcDSgkd0SmI3frGAZiTVunFH7Z9UxqJwq+05pLD lCkA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=75AbODfrpiB3PcmOzpsKU7RWAyNG8uFhq3E7IO/tewo=; b=YYkoN0adi5VPZIl6r8+NVE56RG5wqR9MlNVNaTI4v5JGNZoa07xLduisfvtR+BL6P6 FQz9k414nOhnOVoEZ81W0m8Y+nMTB6NB5Goc1m3ZJdBdW7cdEVj+JO1K6iA9oXMTC8pc Sz79hhE410431YBft1bLFLgX8bskXVu0zXOGH9hIqSrNaYG5eSN4BcCRv2dFvhBBmpsQ mijrNdh1RYXye7S09E1ua02tzelQSDD1zUf7ta6MDmHeXG1w1IOOhwHmBbiUQ3JkN21H Q+HX9TtSleIOirmFAy9ORCONbgkNvZquTngajmcNHpoJmxz9yYxeNHgE2gxTCwP4QqiN 3g6A==
X-Gm-Message-State: ALQs6tBTG89I2KKXpSsgxYsdhKi1orPOWEa4v85cMJRo7l500JCiKsoH dLIv4i5qsJ51chUsEqYxF+re0mM8xhbpszIx2f2Zv1PC
X-Google-Smtp-Source: AIpwx4+vpBhRCYfpldPmP3SrEsXVRymlhm/Rdv7IzKQ6UVEhhqVGiFQO8t/zw+av6IcAjJnvuHOZV4hM7vWWMkX2br8=
X-Received: by 2002:aca:c754:: with SMTP id x81-v6mr14151957oif.43.1524754248880; Thu, 26 Apr 2018 07:50:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.201.118.130 with HTTP; Thu, 26 Apr 2018 07:50:08 -0700 (PDT)
In-Reply-To: <1EA85624-3A19-4EA3-9A2E-D1DE19414F8C@dukhovni.org>
References: <1D2EB7F1-B796-4459-93C2-443A7104F33A@dukhovni.org> <CABcZeBPNwBKqVLmNR=KqrxhwbxJZPs_-oK26XbK8oq1yRaS8eg@mail.gmail.com> <1EA85624-3A19-4EA3-9A2E-D1DE19414F8C@dukhovni.org>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 26 Apr 2018 07:50:08 -0700
Message-ID: <CABcZeBOauDUGqTz6TCHemonWKEx91NtQmTw8cOfyU1D51+RODQ@mail.gmail.com>
To: TLS WG <tls@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005fe903056ac1837f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Oq9qAXO4O4nHTLe_iuvMwGzDZLA>
Subject: Re: [TLS] Proposed text for dnsssec chain extension draft
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Apr 2018 14:50:51 -0000
On Thu, Apr 26, 2018 at 6:51 AM, Viktor Dukhovni <ietf-dane@dukhovni.org> wrote: > > > > On Apr 26, 2018, at 2:30 AM, Eric Rescorla <ekr@rtfm.com> wrote: > > > > If you look at HPKP and Expect-CT, you will note that there are a number > of > > other fields besides just lifetime (report-uri, include subdomains). I > recognize > > that opinions vary about whether these are good, but the advantage of > having > > a whole new extension is that we need not resolve those now in order to > move > > this document forward. > > Let's ignore HPKP, as discussed previously it is a poor analogy > here, (and, not entirely surprisingly an impractical design). > A somewhat better comparison is Expect-CT or MTA-STS. > > Both of these have a max-age. Neither of them is "forever". We > can safely assume that *any* mechanism to negotiate downgrade > protection for this extension between server and client will > have a finite duration. > > Neither of the comparison specs are TLS extensions intended to cover > a broad range of applications. They are single application policy > mechanisms communicated via HTTP headers. > > Here, our scope is *all* end-user applications that choose to use > the DNSSEC chain extension to access the server's DANE TLSA > records. > If we look at Expect-CT and MTA-STS + companion SMTP-TLSRPT we > find: > > * a lifetime field > * enforce vs. test > * a report URI > > This specification is always "enforce" (though my pull request > changes a MUST use DANE to a SHOULD with some necessary added > conditions) and since the report URI is in good measure to > support non-enforce mode, we're back to just max-age. > But this reinforces my point. I think we ought to have an enforce vs test flag and a report URI (and I I don't find your arguments above about why we shouldn't do this persuasive.) Standardizing this functionality would require resolving these issues. -Ekr
- [TLS] Proposed text for dnsssec chain extension d… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Melinda Shore
- Re: [TLS] Proposed text for dnsssec chain extensi… Willem Toorop
- Re: [TLS] Proposed text for dnsssec chain extensi… Willem Toorop
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Joseph Salowey
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Joseph Salowey
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Eric Rescorla
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Eric Rescorla
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Eric Rescorla
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Richard Barnes
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Paul Wouters
- Re: [TLS] Proposed text for dnsssec chain extensi… Richard Barnes
- Re: [TLS] Proposed text for dnsssec chain extensi… Eric Rescorla
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Nico Williams
- Re: [TLS] Proposed text for dnsssec chain extensi… Viktor Dukhovni