The sample size of responses seems too small to reach a meaningful
consensus.

Perhaps posting something a bit more controversial will get the
silent majority to speak up. :-)  To wit:

    - Assign explanatory names only to usages 2 and 3:

        2 - TRUST-ANCHOR
        3 - END-ENTITY

    - Since usages 0/1 merely complicate DANE implementation without[*]
      enhancing security, they can remain anonymous, or be given names
      that clearly indicate that these are discouraged/deprecated.

        0 - SECURITY-THEATRE-0
        1 - SECURITY-THEATRE-1

This would remove all confusion about the DANE usages.  If someone
can justify the existence of 0 and 1 in a pair of pithy acronyms
then those are the names.  Otherwise, out they go!

[ I have begun design/implementation of general-purpose DANE support
  for OpenSSL.  Supporting all four usages is rather more complex
  than one might imagine, and is largely wasted effort, but the
  protocol requires 0/1 for now, so I have no choice.  I would be
  thrilled to bits were the above to be taken seriously, and usages
  0/1 dropped from DANE TLSA in a future revision of the protocol. ]

-- 
        Viktor.

*  If DNSSEC *is not* compromised, 2/3 are sufficient.

   If DNSSEC *is* compromised, the attacker will publish 2/3, thus
   a domain owner's use of 0/1 offers no protection against DNS attacks.

   There will be no measurable deployment of out-of-band mechanisms
   that harden 0/1 or application protocols that implement DANE, with
   just usages 0 and 1.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to