Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps

Eric Rescorla <ekr@rtfm.com> Wed, 17 October 2018 21:49 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 438A1130E27 for <tls@ietfa.amsl.com>; Wed, 17 Oct 2018 14:49:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yCYQiXsBH9vM for <tls@ietfa.amsl.com>; Wed, 17 Oct 2018 14:49:18 -0700 (PDT)
Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF862130F20 for <tls@ietf.org>; Wed, 17 Oct 2018 14:49:17 -0700 (PDT)
Received: by mail-lj1-x22e.google.com with SMTP id v7-v6so25784660ljg.5 for <tls@ietf.org>; Wed, 17 Oct 2018 14:49:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/o+ZDruOtvxTkHSLVJdpxEVn1L5ZrgaSEHzvHtoR9n0=; b=bWIl94yENuZr+3EiSQ+VYnT/NpJXA8XHk3Rso6ab1Wg9JYfkKWPiJd16r9UX6cBVOp WOWSGvMbfOHFE5FtVQzmgvpIRswq+d/6oKIhgGXysGvlY7H9aSPlCkhoFIBjfd+GvZ52 sjRIJOi3/vhj26lULRvIzaw6i4ydEvBsobEd9L3Vgrg/6EVW82tyyTpAKy/Y3MTbuTOb YNrSmTurG74284F+5Du+GOMfJr3LLIJBFaDVFi9m9oC9o1UEOSnM7SLXAYUssFqgyoGM 0AybGpnII/XZhste5hZgxlhi1I/spqBAGX7UIGH7RbQGIVmWVPd8vzhaxrOzv+nukfBk QhTg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/o+ZDruOtvxTkHSLVJdpxEVn1L5ZrgaSEHzvHtoR9n0=; b=pr0JxNQb6Mz0KLkNpetYKdyTPV0bqStrTeiZdu8mu97ZVrPOFrUzQEDg2ws4mMEwg8 D7fOiih7AEbTfFRCC1BC9yAIpVdY4gKVYzR/uKbNKe6ezux0EW5qElA1Mmqiw/tHKvgF 5gfps4FJ4116vew5zLKc6zuoeAnt1IAmEproEjfYJIvwxKRQZ0q7GBQ66KQwOvLCSUo7 T22rlGbe1mM0KbmSZdIZzJ+8/Y05MDj1nUMmPQIYdrOrtYs5uJZihU/oetDaN4yRsQEW lVZ66FL3eKTeydeXwoNVcaz560XL2QdwdtjoRsjejZrdSbiiYwZUdPVuzFlAhsSaXrrY eVww==
X-Gm-Message-State: ABuFfog+Dg+vfwMrcX8dVk5IJrSbid2iDqYmw0yvqozKblUn2LcEqyQn I9+s5BcVVoGRWI0cv/cQWPQvvnJlNpIbwMnV/OZFVZrM
X-Google-Smtp-Source: ACcGV61NbcXQRr2hW65txOI9t4XWiQCRsCrN4QTBwFDt6Y6UVGXzzPL/Rsq03C7pHSBWEP/J3EVDA2f6+0AkP301S+I=
X-Received: by 2002:a2e:7017:: with SMTP id l23-v6mr13378220ljc.160.1539812955922; Wed, 17 Oct 2018 14:49:15 -0700 (PDT)
MIME-Version: 1.0
References: <CAO8oSXnv5Gpdw-0c9jXtx1rQqpgwmfrZyiFgHF=Kd5qWZSMPCA@mail.gmail.com> <875zy1czbd.fsf@fifthhorseman.net> <20181017011515.GL7773@akamai.com> <CABcZeBO6he-FvZH-O0Taqgp7AtDTpc4nhZZsFPKonxVZka7dhw@mail.gmail.com> <20181017144025.GN7773@akamai.com>
In-Reply-To: <20181017144025.GN7773@akamai.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 17 Oct 2018 14:48:47 -0700
Message-ID: <CABcZeBPm=fmE6XiG2wzJBDZKKYp4FJB4bRTPbCqBBtO0q2HAVQ@mail.gmail.com>
To: Benjamin Kaduk <bkaduk@akamai.com>
Cc: "<tls@ietf.org>" <tls@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000424087057873a493"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/raCUPr3IE2FA2uHRZlmnXk6Bn2o>
Subject: Re: [TLS] Interim notes and draft-ietf-tls-dnssec-chain-extension next steps
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Oct 2018 21:49:24 -0000

On Wed, Oct 17, 2018 at 7:40 AM Benjamin Kaduk <bkaduk@akamai.com> wrote:

> On Wed, Oct 17, 2018 at 06:18:27AM -0700, Eric Rescorla wrote:
> > I'm responding to Ben here, because I think it's worth adding some
> clarity.
> > However, I want to flag that I'm going to be rather short on time for the
> > next
> > few week and not able to spend a lot of time replying to traffic on this
> > topic. Even more than usual, non-response to some point does not
> > necessarily indicate agreement.
> >
> > On Tue, Oct 16, 2018 at 6:15 PM Benjamin Kaduk <bkaduk@akamai.com>
> wrote:
> >
> > > (1) provides a channel for DANE records that is reliable in the
> absence of
> > >     an attack
> > >
> >
> > I think this alone would be worthwhile -- and is the purpose I have
> always
> > had
> > in mind for the draft.
>
> It's interesting to hear that, as I seem to recall a lot of discussion
> about how a security mechanism that folds in the presence of an attack
> ... isn't really a security mechanism.
>
> So while I could concoct a few scenarios in which just (1) would be
> *useful*, the main one that comes to mind isn't really a security
> mechanism, but would rather be part of a reporting mechanism for seeing
> what kind of DANE penetration is possible.  Well, and I guess any case
> where the client has some other reason to expect to see this extension
> and choke if it's absent, such as a "greenfield" case or
> application-level pinning.  So I'm curious what kind of use case(s) you had
> in mind for just the transport aspect.
>

Given that you just described at least two use cases, I feel like you've
answered
your own question here.

-Ekr


> >
> >
> > > (2) reduces the ability of an attacker to cause the client to ignore
> the
> > >     server's authentication preference
> > >
> > > I think that just meeting the above two conditions could provide enough
> > > value to merit publishing, even without attempting to add something
> > > like:
> > >
> > > (3) allows the client to realistically hard-fail connections where
> DNSSEC
> > >     validation returns bogus or indeterminate.
> > >
> >
> > I'm not sure I see a meaningful difference between (2) and (3), given
> > that the mechanism for (2) is likely (3).
>
> Mostly I'm just claiming that the "realistically" in (3) is weasel-words
> that we don't need to get involved with at the protocol level.  Whether
> or not to hard-fail is an application decision that we don't need to
> mandate.
>
> >
> > > Getting (1) is probably trivial (though with middleboxes you never
> > > know), and it seems fairly clear that a pinning scheme can provide (2).
> > >
> >
> > Yes, the question is whether such a scheme is worth the other costs that
> > it imposes (in particular, hostile pinning, and in the version that
> people
> > have currently proposed, the ability to break yourself by inconsistent
> > deployments, though that's at least conceivable fixable). In case it's
> > not clear, I don't agree with Viktor's "no substantial issues have been
> > raised" claim.
>
> Seeing as you are busy the next few weeks, perhaps I can ask the chairs
> to go through the email history and summarize these substantial issues
> that have been raised -- I am not confident that I could reproduce them
> from memory, myself.
>
> -Ben
>