Dear colleagues, 

The mail exchanges on this draft and conversations with Victor have brought up 
a new issue that we want to 
highlight. (this message uses vocabulary from the dane-vocabulary draft) 

Question: Are there more than one security models possible for 
applications/protocols that use DANE ? 

The original DANE/TLSA model in effect says "all records used for DANE must be 
DNSSEC protected, both 
actual records and DNS records used to get to those records." 
The protocol we designed for HTTPS, unlike many other protocols uses Address 
records as Service specification. 
Protocols that use a different record (like MX or SRV) as a service 
specification record now have 2 places to put 
Authentication (TLSA) records. 
SRV draft and SMTP drafts both say put Authentication records with Address 
records, as that is better for operators. 

The SRV and Vocabulary drafts both assume that both Service records and Address 
records are secured if the 
Authentication records are stored with Address records, (requiring DNSSEC for 
all sets).

The SMTP draft is proposing that it is ok to use TLSA records that are stored 
with Address records even if the
Service (MX) records are not signed. 

Attempts to answer the question as what kind of security models can we have 
with DANE? 
        Full: All records used to find service, address and authentication are 
DNSSEC protected 
        Server only: Address and Authentication records are DNSSEC protected 
        Service only: Service and Authentication records are protected but not 
Address records


Questions that need answers: 
- What are the security implications of each model? 
- What types of security does each model provide ? 
- What is not possible with each model?
- What threats does each model handle? 
- any others? 

Do we (as a WG) want to document these models formally and the implications of 
each model operationally ? 

        Olafur & Warren 


On May 6, 2014, at 1:33 AM, Viktor Dukhovni <[email protected]> wrote:

> On Mon, May 05, 2014 at 10:15:11PM -0700, [email protected] wrote:
> 
>>      Title           : SMTP security via opportunistic DANE TLS
>>      Authors         : Viktor Dukhovni
>>                        Wes Hardaker
>>      Filename        : draft-ietf-dane-smtp-with-dane-09.txt
>>      Pages           : 34
>>      Date            : 2014-05-05
> 
> Changes from -08:
> 
>    - Document organization feedback from Olafur.  Some long sections
>      broken up into smaller pieces, and some sub-sections promoted to
>      top-level sections.
> 
>    - SMTP clients MAY elect to make use of TLSA records after "insecure"
>      MX redirection, but MUST NOT misrepresent this as secure delivery.
> 
>    - Server logs SHOULD show the original (not CNAME expanded) MX hostname
>      when the MX RRset is "insecure".  Otherwise, redirection leading
>      to downgrades may not be "tamper-evident".
> 
>    - SMTP clients MAY elect to make use of "insecure" TLSA records (typically
>      resulting from "insecure" CNAME indirection from
>      _port._tcp.<servername>, as the zone containing <servername> is
>      always signed when TLSA records are requested).  Again, MUST NOT
>      misrepresent resulting security.
> 
>    - Routine corrections already discussed, based on Tom Ritter's feedback.
> 
> -- 
>       Viktor.
> 
> _______________________________________________
> dane mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/dane

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to