On Wed, 27 May 2020, Peter van Dijk wrote:

      DoT authoritatives would need to keep both the old and new certificates 
on hand during the transition

keys, not certificates

I would not rule out that people want to run this using a CA chain.
Limiting the signaling to EE-certs or pubkeys is not needed. Especially
if you use TLSA, it makes no sense to take away that flexibility that
some people want, so they can replace their TLS certs and only pin it
to one (their own?) CA.

      , and DoT recursives would need some way to signal in the ClientHello 
which one they are expecting.

I don't follow - if the DS set has both the old and new keys, the DoT recursive 
will accept either. I ki

Only signal the name and mandate TLSA via tls-dnssec-chain, and this is
not a problem. Regular TLSA processing applies.

        This is pretty far from how TLS normally works.

Hmm, is TLSA 3 1 x far from how TLS normally works? I feel like I'm missing 
something.

It's a very liited subset of how TLS works :)

I considered putting names in DS records; I also considered chain-extension; 
but I failed to consider them together! With NS names
'verified' by DS, that looks like something that would also be secure. I agree 
with the problems Petr spotted - I'm aware of roughly
zero implementations of dnssec-chain in clients or servers.

stubby

For me, with 10 domains on two name servers, not having the complexity of 
chain-extension is preferable. For others, with a million
domains, obviously our draft does not scale. I've been assuming we'd end up 
with two or three separate signals, each fit for purpose
for a certain scale. Your proposal seems like a viable candidate to be one of 
those to me.

Not having SBKI in CDS/CDNSKEY's would be much cleaner from a protocol

Paul

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to