Re: [TLS] Adam Roach's Yes on draft-ietf-tls-dnssec-chain-extension-06: (with COMMENT)
Adam Roach <adam@nostrum.com> Wed, 07 February 2018 03:40 UTC
Return-Path: <adam@nostrum.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E7C21241F3; Tue, 6 Feb 2018 19:40:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iIgcz9H7zPVF; Tue, 6 Feb 2018 19:40:05 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47FD7120227; Tue, 6 Feb 2018 19:40:05 -0800 (PST)
Received: from Svantevit.local (99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w173e0Sm054652 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 6 Feb 2018 21:40:00 -0600 (CST) (envelope-from adam@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host 99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228] claimed to be Svantevit.local
To: Viktor Dukhovni <ietf-dane@dukhovni.org>
Cc: tls-chairs@ietf.org, draft-ietf-tls-dnssec-chain-extension@ietf.org, The IESG <iesg@ietf.org>, tls@ietf.org
References: <151797357502.25862.16667889525841537162.idtracker@ietfa.amsl.com> <23185062-60CA-4BA6-BAA5-5DDD6279558B@dukhovni.org>
From: Adam Roach <adam@nostrum.com>
Message-ID: <eff8a514-b704-a75b-c8f0-71b8f8d28e93@nostrum.com>
Date: Tue, 06 Feb 2018 21:39:55 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <23185062-60CA-4BA6-BAA5-5DDD6279558B@dukhovni.org>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Ph8ul5CjXoFohZPD8cD9TL2TQYk>
Subject: Re: [TLS] Adam Roach's Yes on draft-ietf-tls-dnssec-chain-extension-06: (with COMMENT)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2018 03:40:07 -0000
On 2/6/18 9:28 PM, Viktor Dukhovni wrote: > >> On Feb 6, 2018, at 10:19 PM, Adam Roach <adam@nostrum.com> wrote: >> >> Unless I missed something important, this scenario doesn't seem to make much >> sense: if the client provides name A and the server replies with name B, the >> client either (1) isn't performing server name validation (in which case it is >> nonsense for the client to ask for a dnssec_chain), or (2) is going to error >> out the connection. Do I have that right? If there's some situation in which >> the server acting as described above provides some benefit, I would love to >> see it described in here. If it's just a matter of having completely described >> behavior for corner cases, it may be worthwhile indicating that the client >> will reject the connection if the server decides to complete the handshake >> like this. > DANE clients sometimes accept more than one name for the server. This happens > when the server name is obtained indirectly from MX OR SRV records, or as the > result of (DNSSEC-validated) CNAME expansion. Ah, that's an interesting point. You may want to keep this in mind when responding to the question put forth by the GEN-ART reviewer. > So in principle, more than one name might be acceptable to the client. In > practice however, I don't yet see a mechanism where a client that can't do > DNSSEC validation on its own would be in a position to do this. My understanding is that this mechanism isn't just for clients that can't do their own DNSSEC validation; it's also intended to reduce latency for interactive applications (web browsers and real-time-communication clients in particular). > So the server may indeed be able to validate a certificate for some name > that the client did not expect, and it would then be up to some external > mechanism (prompt the user?) to accept that name or not. > > It is not entirely unreasonable to allow the client that freedom, but it > would likely not be a mainstream mode of operation. > > Perhaps I am not thinking creatively enough about other ways for the client > to be configured security to accept one of many names for the server, and > to "guess" the wrong one. I think we're in the same boat here. :) /a
- [TLS] Adam Roach's Yes on draft-ietf-tls-dnssec-c… Adam Roach
- Re: [TLS] Adam Roach's Yes on draft-ietf-tls-dnss… Viktor Dukhovni
- Re: [TLS] Adam Roach's Yes on draft-ietf-tls-dnss… Adam Roach
- Re: [TLS] Adam Roach's Yes on draft-ietf-tls-dnss… Shumon Huque
- Re: [TLS] Adam Roach's Yes on draft-ietf-tls-dnss… Shumon Huque