On Wed, Jun 04, 2014 at 03:48:36AM -0400, James Cloos wrote:

> I just occurred to me that, given that oob is negotiated bewteen the
> client and the server, that the oob concept is !pkix, and any
> verification of the spki is conceptually identical, a tlsa 11x is just
> as usable by an oob client as a 31x is.

This is a slippery slope.  In my original SMTP draft I had language
suggesting aumatic mapping PKIX-TA(0)->DANE-TA(2) and
PKIX-EE(1)->DANE-EE(3).  This was abandoned in favour of 0/1
undefined (likely "unusable") for SMTP and only 2/3 supported.

If the server operator wants PKIX checks, client-side overrides
should probably not be an RFC-defined behaviour.

Now it turns out that Postfix treats "0" as "unusable", but indeed
automatically maps "1" to "3", because as you observe "why not?".
However, I think such liberties should not be officially endorsed.

> It does not matter than a typical full cert client would do a pkix
> verification on top of the tlsa verification when the tlsa is 11x.
> The oob client *and server* have agreed not to bother with pkix,
> so any ee-spki association is sufficient to verify the offerred spki.

It would be better for such servers to publish "311" and be done.

> In other words, by agreeing to oob, the server gives the client consent
> to ignore any pki details about the verification.

> Only tlsa 0 and 2, which do not dirrectly reference the ee, are really
> unusable in the oob case.

> So the proper language probably is something like:
> 
>   End-Entity SPKI association
> 
> via dane, ldap, firmare or any other pre-agreed method.

If the WG collectively agree that non-PKIX clients are free to map
PKIX-EE(1) to DANE-EE(3) and that server operators can expect this
behaviour, then we still have time to ammend the SMTP draft, to
say that PKIX-EE(1) may be published but SHALL be treated as though
it were DANE-EE(3) by SMTP clients.

My view at this juncture is that such mappings should not be
expected, and are a matter of client implementation discretion.
If a client views PKIX-EE(1)/SPKI(1) as though it were DANE-EE(3)/SPKI(1)
then, that client obviously won't see any "oob" obstacles from any
associated RRs (of course PKIX-EE(1)/Cert(0) is still a potential
problem, barring new constraints the records servers should publish).

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to