On 2011-02-01 07:57 PDT, Zack Weinberg wrote:

> I've been following the mailing list for the IETF's "keyassure"
> working group, which plans to standardize a mechanism for putting
> application-layer server keys (or their hashes) in DNS, certified by
> DNSSEC.  TLS/SSL is the first target, and of course also the most
> interesting for the Web.
> 
> While the current proposal seems sound technically, the WG has been
> avoiding client policy -- there is a bit of policy in the current
> draft, but it's worded vaguely enough to be (IMO) useless.  I've
> drafted a policy spec which I'd like to propose to the WG.  However,
> before doing so, I thought I would run it by y'all.  If you like it,
> perhaps we could present this as the Mozilla consensus position rather
> than just one guy's opinion; if you don't like it I am eager to hear
> why.
> 
> For reference, this is the current draft proposal:
> 
> http://tools.ietf.org/html/draft-ietf-dane-protocol-03

[snip]

Zack, thanks for bringing this to this list/group.  I think many of us
were caught by surprise by it, because it is a browser policy proposal
rather than a technical discussion of the protocols.  Some of us have
not been following the DANE work actively, and will need some time to
read up on it and appreciate all its implications.  Quite a few of us
are (or, have been) die hard PKI advocates and some have seen DANE as
an attempted threat to PKI.  I think some of us have hoped it would fail
and go away, but it seems to be becoming a juggernaut, and I think
those who ignore it do so at their own peril.  With regard to NSS, I think
that if NSS ignores it, and is found to not adequately facilitate the
implementation of DANE, it may become irrelevant.

That said, at this time, I have a few comments that apply directly to your
proposal.  I may have more later.

1) I suggest you eliminate the word "bogus", replacing it with a much more
precise description of records that MUST NOT be trusted in the
establishment of a connection.  Bogus is too open to interpretation, which
can only lead to future disagreement.

2) After 14 years of working on SSL/TLS for browsers, I can tell you that
browsers will all ignore the paragraph that says "Clients SHOULD NOT allow
users to force a connection ...".  I suppose that surprises no-one.

I hope others will join a discussion here.

-- 
/Nelson Bolyard
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to