Re: [websec] DNS publication of HSTS and PKP header data using CAA
"Ryan Sleevi" <ryan-ietfhasmat@sleevi.com> Thu, 09 April 2015 01:52 UTC
Return-Path: <ryan-ietfhasmat@sleevi.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 6D1661ACDE8
for <websec@ietfa.amsl.com>; Wed, 8 Apr 2015 18:52:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.233
X-Spam-Level:
X-Spam-Status: No, score=0.233 tagged_above=-999 required=5
tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_NONE=-0.0001]
autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id PXlB-bxKxRSV for <websec@ietfa.amsl.com>;
Wed, 8 Apr 2015 18:52:06 -0700 (PDT)
Received: from homiemail-a97.g.dreamhost.com (sub4.mail.dreamhost.com
[69.163.253.135])
by ietfa.amsl.com (Postfix) with ESMTP id 9F6D61ACDE6
for <websec@ietf.org>; Wed, 8 Apr 2015 18:52:06 -0700 (PDT)
Received: from homiemail-a97.g.dreamhost.com (localhost [127.0.0.1])
by homiemail-a97.g.dreamhost.com (Postfix) with ESMTP id 64B6C286058;
Wed, 8 Apr 2015 18:52:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sleevi.com; h=message-id
:in-reply-to:references:date:subject:from:to:cc:reply-to
:mime-version:content-type:content-transfer-encoding; s=
sleevi.com; bh=YEYwHI/Zgq13VCvQQNm2++LBLaE=; b=rSORxBCGosknDfu7d
m6slgNhQwgohf6DRvJI7pmmRTHgFecfSms+mKgCM4pz6tiYP5ogx3raZukpKi9cs
CcQKfN3c2cWGYJc6Eo+Pq9i37WpqyjwX5hW03jtW841wdM6AKGRgbFh8/Y/NAIxN
vokWM477Ip6tcly21UbM3K+1sg=
Received: from webmail.dreamhost.com (caiajhbihbdd.dreamhost.com
[208.97.187.133]) (Authenticated sender: ryan@sleevi.com)
by homiemail-a97.g.dreamhost.com (Postfix) with ESMTPA id 35494286074;
Wed, 8 Apr 2015 18:52:06 -0700 (PDT)
Received: from 216.239.45.71 (SquirrelMail authenticated user ryan@sleevi.com)
by webmail.dreamhost.com with HTTP; Wed, 8 Apr 2015 18:52:04 -0700
Message-ID: <3c6e1d6242b4bbc31d5020cf24770cb4.squirrel@webmail.dreamhost.com>
In-Reply-To: <CAMm+LwjQE-t=DQRWc95gXYuo-1oKotbKuHzadc5Od+WG+M9_nw@mail.gmail.com>
References: <CAMm+Lwjc_7CWPLgTSy=pX81+NXUguOLZmv0t2YgxTbXotQqZsg@mail.gmail.com>
<8b60de39fde39644fcc43150c41ba978.squirrel@webmail.dreamhost.com>
<CAMm+Lwhz1bmE61sinm-faHN7L6NdPA9nH=H4fCdkMtZGPR7m5A@mail.gmail.com>
<3debce5114a44d5027f437c4c481addb.squirrel@webmail.dreamhost.com>
<CAMm+LwjQE-t=DQRWc95gXYuo-1oKotbKuHzadc5Od+WG+M9_nw@mail.gmail.com>
Date: Wed, 8 Apr 2015 18:52:04 -0700
From: "Ryan Sleevi" <ryan-ietfhasmat@sleevi.com>
To: "Phillip Hallam-Baker" <phill@hallambaker.com>
User-Agent: SquirrelMail/1.4.21
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/websec/jtB9M_dJBxPgmrPMpScgpC__t2g>
X-Mailman-Approved-At: Wed, 08 Apr 2015 19:03:54 -0700
Cc: websec <websec@ietf.org>
Subject: Re: [websec] DNS publication of HSTS and PKP header data using CAA
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: ryan-ietfhasmat@sleevi.com
List-Id: Web Application Security Minus Authentication and Transport
<websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>,
<mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec/>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>,
<mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2015 01:52:07 -0000
On Wed, April 8, 2015 6:27 pm, Phillip Hallam-Baker wrote: > The security considerations of security policy mechanisms are all > about not shooting yourself in the foot. No, they aren't. They're also about mitigating the worst that an "attacker" could do. > That is why I propose to not consider the record valid for any longer than its DNS time to live. And now your TTL and the client caching policy of that TTL becomes part of your security considerations. > I am not delivering a perfectly secure solution but neither is DANE. > All I am looking to do is to improve on the status quo with as little > extra work as possible. All I see are negatives here compared with "the status quo". > > If DNSSEC is ever deployed AND it becomes visible to clients then it > could be relevant to this spec. But right now DNSSEC is not a viable > mechanism for authenticating DNS RRs at the client. Agreed. And so how are you going to bootstrap security over an insecure connection, without dealing with all of the threat scenarios explicitly and implicitly addressed by the documents you're trying to supplant/augment? I would encourage you to consider the exercise of "What is the worst that an attacker could do with this policy", as well as "What's the strongest level of security I could achieve", and hopefully in both cases you'll see that the flaws are somewhat fundamental if delivered over an insecure transport. And if you had a secure transport (which you don't, but we'll assume the IETF will fix all this in good time), then you *could* use DANE, and the only issue becomes one of syntax. Which is not an intrinsicly good argument - and in fact, generally a bad one (syntax can be hidden by tools, but specs - and bad specs - live forever)
- Re: [websec] DNS publication of HSTS and PKP head… Jeffrey Walton
- [websec] DNS publication of HSTS and PKP header d… Phillip Hallam-Baker
- Re: [websec] DNS publication of HSTS and PKP head… Phillip Hallam-Baker
- Re: [websec] DNS publication of HSTS and PKP head… Ryan Sleevi
- Re: [websec] DNS publication of HSTS and PKP head… Ryan Sleevi
- Re: [websec] DNS publication of HSTS and PKP head… Martin J. Dürst
- Re: [websec] DNS publication of HSTS and PKP head… Phillip Hallam-Baker
- Re: [websec] DNS publication of HSTS and PKP head… Joseph Bonneau
- Re: [websec] DNS publication of HSTS and PKP head… Jeffrey Walton
- Re: [websec] DNS publication of HSTS and PKP head… Ryan Sleevi
- Re: [websec] DNS publication of HSTS and PKP head… Ryan Sleevi
- Re: [websec] DNS publication of HSTS and PKP head… Phillip Hallam-Baker
- Re: [websec] DNS publication of HSTS and PKP head… Ryan Sleevi
- Re: [websec] DNS publication of HSTS and PKP head… Phillip Hallam-Baker
- Re: [websec] DNS publication of HSTS and PKP head… ngnoulaye
- Re: [websec] DNS publication of HSTS and PKP head… Jeffrey Walton