Re: TLS server keys in DNS: client policy proposal

2011-03-28 Thread Kyle Hamilton
On Sun, Feb 13, 2011 at 5:20 AM, Eddy Nigg wrote: I can see how DANE could be useful with CA issued certificates. The above is a non-starter (at least for me) and rather dangerous for any third party relying on it. But those are my opinions at least if and until this gets implemented anywhere

Re: TLS server keys in DNS: client policy proposal

2011-02-13 Thread Eddy Nigg
On 02/12/2011 05:57 PM, From Stephen Schultze: Not at all. I was inviting others to voice their support of your position as well, but so far it's just you. Don't take this as an indicator of such - I'm usually more vocal (than others) and others might be not willing to enter into discussion

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Steve Schultze
Zack, I think having some kind of statement from the Moz community could be helpful, and a good excuse for Moz folks to get up to speed on the spec. With respect to the Section 3 text, it may be best simply to voice your thoughts directly on the DANE list. I don't think the current text is

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Stephen Schultze
On 2/12/11 7:03 AM, Eddy Nigg wrote: If anybody else on this list would like to present a more compelling argument than you have as if your arguments are more convincing and the only ones that count :-) Not at all. I was inviting others to voice their support of your position as well, b

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Eddy Nigg
On 02/12/2011 05:44 AM, From Steve Schultze: Not that many phishing attacks rely on HTTPS. That report also details phishing attacks *on people seeking to purchase SSL certificates* in which the phishing happens over plaintext. If there's any community that would require an HTTPS connection i

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Steve Schultze
On 2/11/11 6:04 PM, Eddy Nigg wrote: Indeed, PAYPA1.COM, MICR0S0FT.COM, PAYPAL.DOM.COM, BANK0FAMERICA.COMall goes. Of course not, that's why we have this: http://www.antiphishing.org/reports/APWG_GlobalPhishingSurvey_2H2009.pdf Have you actually read that report? It details a rapid resp

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
Last reply, I promise... On 02/12/2011 12:50 AM, From Stephen Schultze: Today's DV CAs already rely on a self-assertion of domain control, and they in turn assert that they observed this. In plain english, a DV cert says, "The guy holding the corresponding private key asserted that he control

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
On 02/12/2011 12:32 AM, From Stephen Schultze: Who the subscriber is (not higher level validation, sanity check) I still can't decipher this. I didn't expected that you do :-) what the requested host name is There is no ambiguity in DANE. Indeed, PAYPA1.COM, MICR0S0FT.COM, PAYPAL.DOM.C

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Stephen Schultze
On 2/11/11 3:11 PM, Eddy Nigg wrote: improves reduces the spectrum of exploits... does this make any sense? Thanks typo cop. I'm sure it's clear what I meant. . It also places revocation power directly in the hands of the subscriber. That's the same as self-assertion. Most subscribers

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Stephen Schultze
On 2/11/11 5:57 AM, Eddy Nigg wrote: On 02/11/2011 07:08 AM, From Steve Schultze: Can you give an example? Who the subscriber is (not higher level validation, sanity check) I still can't decipher this. what the requested host name is There is no ambiguity in DANE. what's the purpose of

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
On 02/11/2011 05:56 PM, From Stephen Schultze: Thus, the CA DV model provides no clear comparative benefit with respect to revocation abilities. In fact, by removing the need to proactively revoke, DANE improves reduces the spectrum of exploits improves reduces the spectrum of exploits...

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Stephen Schultze
On 2/11/11 4:39 AM, Rob Stradling wrote: On Friday 11 Feb 2011 05:08:10 Steve Schultze wrote: - OCSP and CRLs are unnecessary with DANE Steve, may we presume that you only intended this statement to apply to the use of self-signed certs with DANE? When an EV (or OV) certificate issued by a t

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
On 02/11/2011 07:08 AM, From Steve Schultze: Can you give an example? Who the subscriber is (not higher level validation, sanity check), what the requested host name is, what's the purpose of a certificate, cryptographic weaknesses, to name a few. Would these checks be necessary under DAN

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Rob Stradling
On Friday 11 Feb 2011 05:08:10 Steve Schultze wrote: > - OCSP and CRLs are unnecessary with DANE Steve, may we presume that you only intended this statement to apply to the use of self-signed certs with DANE? When an EV (or OV) certificate issued by a third-party CA is used with DANE, I would

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Steve Schultze
On 2/10/11 8:09 PM, Eddy Nigg wrote: There are additional steps CAs can/should/do besides checking domain control - even in the DV settings. Ok, so the theory here is that some DV CAs do some stuff above and beyond baseline domain validation. We don't really know who is doing how much of thi

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
On 02/11/2011 01:33 AM, From Stephen Schultze: You cut off the end of the sentence, which made clear that I was referring to how the *trust* of the CA model relies on blind trust of the data in DNS. Any fundamental trust model shortcoming of DNS is likewise a shortcoming of CA DV. You've neve

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Stephen Schultze
On 2/10/11 5:36 PM, Eddy Nigg wrote: On 02/10/2011 10:40 PM, From Stephen Schultze: Until you actually explain why you think it's not correct that DV relies on DNS, I didn't say DV doesn't rely on DNS, almost everything on the [net] uses it. Of course, but the fact that apps use DNS irreleva

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
On 02/11/2011 12:36 AM, From Eddy Nigg: I didn't say DV doesn't rely on DNS, almost everything on the *NET* uses DNS. Corrected. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tec

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
On 02/10/2011 10:40 PM, From Stephen Schultze: Until you actually explain why you think it's not correct that DV relies on DNS, I didn't say DV doesn't rely on DNS, almost everything on the DNS uses it. or what beyond domain validation that you think DV actually does, there's really nothing t

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Stephen Schultze
On 2/10/11 3:33 PM, Eddy Nigg wrote: On 02/10/2011 08:51 PM, From Stephen Schultze: As I have said repeatedly (and you have never addressed) the CA DV model relies on DNS and thus imports any vulnerabilities that exist in a DNS-based model. CA DV blindly trusts DNS. That's exactly your mistak

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
On 02/10/2011 08:51 PM, From Stephen Schultze: As I have said repeatedly (and you have never addressed) the CA DV model relies on DNS and thus imports any vulnerabilities that exist in a DNS-based model. CA DV blindly trusts DNS. That's exactly your mistake, you are not correct. The only t

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Stephen Schultze
On 2/10/11 1:25 PM, Eddy Nigg wrote: On 02/10/2011 07:20 PM, From Steve Schultze: Zack, arguing with Eddy on this point is a losing proposition. DNSSEC+TLSA is has some demonstrably superior characteristics to CA DV, but Eddy is not willing to concede this or even give detailed reasoning. Well

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
On 02/10/2011 07:20 PM, From Steve Schultze: Zack, arguing with Eddy on this point is a losing proposition. DNSSEC+TLSA is has some demonstrably superior characteristics to CA DV, but Eddy is not willing to concede this or even give detailed reasoning. Well, we know about the advantages and s

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Steve Schultze
On 2/7/11 6:31 PM, Robert Relyea wrote: My primary worry of the this spec as is is that DNSSEC is trying to be the end-all-be-all authority. That's a recipe for disaster. Keeping all my server keys in sync with the DNSSEC record? And if I have OV/EV, I have to keep it in sync with the certificate

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Steve Schultze
On 2/6/11 1:01 PM, Eddy Nigg wrote: On 02/06/2011 07:11 PM, From Zack Weinberg: I'm going to ask you the same question I asked Nelson: In a hypothetical world where DNSSEC+TLSA completely supersedes DV (but people still use OV/EV for high-value sites) what do you see as having been lost? Or, tur

Re: TLS server keys in DNS: client policy proposal

2011-02-08 Thread Robert Relyea
On 02/08/2011 07:56 AM, Gervase Markham wrote: > On 05/02/11 21:13, Nelson B Bolyard wrote: >> 2) After 14 years of working on SSL/TLS for browsers, I can tell you >> that >> browsers will all ignore the paragraph that says "Clients SHOULD NOT >> allow >> users to force a connection ...". I suppos

Re: TLS server keys in DNS: client policy proposal

2011-02-08 Thread Gervase Markham
On 05/02/11 21:13, Nelson B Bolyard wrote: 2) After 14 years of working on SSL/TLS for browsers, I can tell you that browsers will all ignore the paragraph that says "Clients SHOULD NOT allow users to force a connection ...". I suppose that surprises no-one. It's all about precedent. If all br

Re: TLS server keys in DNS: client policy proposal

2011-02-07 Thread Robert Relyea
On 02/06/2011 09:11 AM, Zack Weinberg wrote: > On 02/05/2011 02:55 PM, Eddy Nigg wrote: >> >> However probably the optimal approach will be CA issued certs in DNS >> that also make use of DNSSEC to validate the former (DV). Eventually I >> believe that this will emerge as the real improvement and m

Re: TLS server keys in DNS: client policy proposal

2011-02-06 Thread Eddy Nigg
On 02/06/2011 07:11 PM, From Zack Weinberg: I'm going to ask you the same question I asked Nelson: In a hypothetical world where DNSSEC+TLSA completely supersedes DV (but people still use OV/EV for high-value sites) what do you see as having been lost? Or, turning it around, what value do you

Re: TLS server keys in DNS: client policy proposal

2011-02-06 Thread Zack Weinberg
On 02/05/2011 02:55 PM, Eddy Nigg wrote: However probably the optimal approach will be CA issued certs in DNS that also make use of DNSSEC to validate the former (DV). Eventually I believe that this will emerge as the real improvement and most useful approach for software vendors and CAs alike -

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Marsh Ray
On 02/05/2011 03:28 PM, Zack Weinberg wrote: "bogus" in this case is a term-of-art defined by RFC 4033. You have made my day. :-) I am so tweeting that. - Marsh https://twitter.com/marshray/status/34121219292790784 -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lis

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Zack Weinberg
On 2011-02-05 2:02 PM, Nelson B Bolyard wrote: On 2011-02-05 13:28 PDT, Zack Weinberg wrote: >> ... There is a list/newsgroup focused specifically on the browser policy governing the admittance of CAs to mozilla's root CA list. That probably seems like the more obvious place, but it's where al

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Eddy Nigg
On 02/06/2011 12:02 AM, From Nelson B Bolyard: I think CAs still get most of their revenues from DV I'm not sure if that's correct (revenues != market share)... and so perceive DANE as a direct threat. and I believe that DV certs issued by CAs provides what the proposed keys in DNS can

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Nelson B Bolyard
On 2011-02-05 13:28 PDT, Zack Weinberg wrote: > On 2011-02-05 1:13 PM, Nelson B Bolyard wrote: >> Zack, thanks for bringing this to this list/group. I think many of >> us were caught by surprise by it, because it is a browser policy >> proposal rather than a technical discussion of the protocols.

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Zack Weinberg
On 2011-02-05 1:13 PM, Nelson B Bolyard wrote: Zack, thanks for bringing this to this list/group. I think many of us were caught by surprise by it, because it is a browser policy proposal rather than a technical discussion of the protocols. Personally, I was a little surprised to be asked to d

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Nelson B Bolyard
On 2011-02-01 07:57 PDT, Zack Weinberg wrote: > I've been following the mailing list for the IETF's "keyassure" > working group, which plans to standardize a mechanism for putting > application-layer server keys (or their hashes) in DNS, certified by > DNSSEC. TLS/SSL is the first target, and of

TLS server keys in DNS: client policy proposal

2011-02-01 Thread Zack Weinberg
[Some of you may have seen an earlier draft of this proposal before. I originally sent it to secur...@mozilla.org and was asked to bring it here.] I've been following the mailing list for the IETF's "keyassure" working group, which plans to standardize a mechanism for putting application-layer

TLS server keys in DNS: client policy proposal

2011-02-01 Thread Zack Weinberg
[Some of you may have seen an earlier draft of this proposal before. I originally sent it to secur...@mozilla.org and was asked to bring it here.] I've been following the mailing list for the IETF's "keyassure" working group, which plans to standardize a mechanism for putting application-layer