Doesn't DANE produce the server's certificate in the same connection that DNS 
produces the servers IP address?  If not, that's an optimization that's needed.
 
 
Karl
 

________________________________
 From: Warren Kumari <[email protected]>
To: Karl Malbrain <[email protected]> 
Cc: Randy Bush <[email protected]>; Leif Johansson <[email protected]>; 
"[email protected]" <[email protected]>; Warren Kumari <[email protected]> 
Sent: Friday, September 13, 2013 3:03 PM
Subject: Re: [perpass] proposed enhancement to TLS strong authentication        
protocol
  


On Sep 13, 2013, at 4:40 PM, Karl Malbrain <[email protected]> wrote:

> I'm not familiar with DANE.  Is it operational?  

Yes, it is just not widely (enough) deployed. There are some browser extensions 
and a browser (Bloodhound) that has support built in. There are good tools to 
generate the DANE (TLSA) records, and e.g registro.br has a simple one click 
"generate and publish a TLSA record" record for hosted DNS customers.

It is gaining traction in mail / SMTP, with support in Postfix.

At the moment one of the main deployment hurdles is browser support (and more 
DNSSEC deployment!).
Browsers (understandably) don't want to be waiting on TLSA records -- latency 
is really important for browsers, and waiting for more DNS lookups takes time.

A few solutions have been discussed / suggested, such as only doing DANE for 
self-signed certs, doing the TLSA lookup in parallel with the regular lookup 
and making the normal connection, then aborting it (and replacing the page with 
a notice) if DANE shows evidence of shennanigans and / or caching TLSA records.

W

> Does it include changes to TLS to accept/compare the server's certificate 
> obtained from DANE?  If so, then that part of the proposal can be mooted in 
> favor of DANE.
>  
> Yes, it would be simpler to offload the certificate sourcing management to 
> DNS.  However, I'm proposing changes to be implemented entirely within TLS, 
> that are transparent on the client side.  Only the server side would require 
> an additional interface to accept/reject client connections.
>  
> Karl
> 
> From: Randy Bush <[email protected]>
> To: Karl Malbrain <[email protected]> 
> Cc: Leif Johansson <[email protected]> 
> Sent: Friday, September 13, 2013 1:24 PM
> Subject: Re: [perpass] proposed enhancement to TLS strong authentication 
> protocol
> 
> [ off lst ]
> 
> > I've dropped the idea of including both client and server public
> > certificates in the directory in favor of a server certificate only
> > repository with an additional TLS interface to authorize access by
> > clients.
> 
> so why is this a win over dane?
> 
> randy
> 
> 
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass

--
Hope is not a strategy.
      --  Ben Treynor, Google


_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to