Report information
The Basics
Id:
46403
Status:
open
Priority:
Low/Low
Queue:

People
Owner:
Nobody in particular
Cc:
AdminCc:

BugTracker
Version Fixed:
(no value)
Version Found:
(no value)
Versions Affected:
(no value)
Versions Planned:
(no value)
Priority:
(no value)
Severity:
(no value)
CVSS Score:
(no value)
CVE ID:
(no value)
Component:
(no value)
Area:
(no value)

Attachments
draft-pala-odin-01.html draft-pala-odin-01.txt heloenlpbdaambjl.png smime.p7s Show all

Dates
Created:Wed, 25 Oct 2017 13:00:59 -0400
Updated:Fri, 27 Oct 2017 16:38:29 -0400
Closed:Fri, 27 Oct 2017 09:16:56 -0400



This bug tracker is no longer active.

Please go to our Gitlab to submit issues (both feature requests and bug reports) for active projects maintained by Internet Systems Consortium (ISC).

Due to security and confidentiality requirements, full access is limited to the primary maintainers.

Subject: Distribution of PKIX revocation Information via DNS
To: bind-suggest@isc.org
Date: Wed, 25 Oct 2017 11:00:36 -0600
CC: "Dr. Pala" <m.pala@cablelabs.com>
From: "Dr. Pala" <director@openca.org>

Hi all,

I am Massimiliano Pala, currently working @ CableLabs and long-time open-source activist :D I am currently working on defining how to provide revocation information for digital certificates via DNS. The current proposal we are bringing forward is attached to this e-mail... It is just initial work, but I think this could potentially be implemented easily and can provide benefits for different environments (not justĀ  browsers/web-servers). [*]

I am reaching out to you guys to possibly gather your attention to this project and get some feedback from the DNS implementation gurus... :D Any help, feedback, and collaboration on this front would be really appreciated.

Looking forward to hearing from you,

Cheers,
Max

P.S.: This initial work is focused on providing DNS as a transport protocol for OCSP (Online Certificate Status Protocol) responses. We plan to extend this work to provide different validity/revocation tokens that might be more suitable (smaller sizes, etc.) for the DNS system in general, but we would like to tackle the lower hanging fruit before proposing a completely new format for revocation status tokens.. :D

--
Best Regards,
Massimiliano Pala, Ph.D.
OpenCA Labs Director
OpenCA Logo

Image displayed inline above

Message body is not shown because sender requested not to inline it.

Message body is not shown because sender requested not to inline it.

Message body not shown because it is not plain text.

Dear Massimiliano, thank you for the heads up, I would recommend simply submitting your proposal as I-D and send the announcement message to DNSOP and TLS WG @ IETF. That way this will get much more attention than from just us. Or I would rather recommend going to CAB Forum first - because it would be useless to spend time working on a standard nobody would implement. From myself, I would add just initial thoughts on the DNS side: a) I would strongly recommend making this DNSSEC only and tackling the error modes when DNSSEC Validation fails (e.g. similar to situation when OCSP retrieval via HTTP(S) fails). Without DNSSEC, you are prone to OCSPRR striping, with DNSSEC, you are tackling the same problem as DANE (TLSA RR) has - the resistance to implement DNSSEC-validating resolver in the browser. b) drop the TXT fallback, getting a new RR is simple (compared to getting this to be approved as a model of operation in PKIX WG Good luck, Ondrej
From: "Dr. Pala" <director@openca.org>
To: bind9-public@isc.org
Date: Fri, 27 Oct 2017 14:38:12 -0600
Subject: Re: [ISC-Bugs #46403] Distribution of PKIX revocation Information via DNS

Hi Ondrej,

thanks for the feedback. I will definitely cross-post the proposal to DNSOP, TLS WG, and maybe the CAB Forum. I totally agree with you about the need of having implementations.. that is why I contacted you in the first place :D

On this topic, we also gathered some interest around the idea and we already have people interested in an implementation. On our side, this is going to be implemented in the OpenCA software. On top of that, Rich from OpenSSL provided initial commitment for an implementation. We are working mostly outside the TLS-only Browsers/Servers environment(s) and tackling this for use also in IoT environments (e.g., OCF, OpenADR, WinnForum, etc.), but there are obvious advantages for the CAB environment too... it just seems that if you are not from Mozilla or Google, it is quite difficult to get anything moving in (especially) browsers' environment... :D

(a) For your point about the DNSSEC support. I think that eliminating support for DNS would be equivalent to require HTTPS (instead of HTTP) as a transport protocol for OCSP responses or for CRL download. As far as I know, the vast majority of deployment use the HTTP transport protocol, which is open to the same security consideration as DNS vs. DNSSEC. I do think that requiring DNSSEC would definitely kill the idea and I fear it would not be easily adopted because of that.

(b) For the TXT fallback, I still am on the fence. I totally agree with you that the use of a specific record type is to be preferred, but I would also provide the possibility for existing infrastructures to start leveraging the DNS infrastructures even before a new RR is defined and supported by deployed software... my plan was to deprecate the support for TXT records once we have the document on its way to standardization. If the document never makes it and becomes just informational, I think that keeping the TXT support might facilitate testing and experimentation... :D

Thanks again for your suggestions and for taking the time to read the document :D And, please, let me know what you think of the responses above :D

Cheers,
Max


On 10/27/17 7:16 AM, Ondrej Sury via RT wrote:
Dear Massimiliano,

thank you for the heads up, I would recommend simply submitting your proposal as I-D and send the announcement message to DNSOP and TLS WG @ IETF. That way this will get much more attention than from just us. Or I would rather recommend going to CAB Forum first - because it would be useless to spend time working on a standard nobody would implement.

From myself, I would add just initial thoughts on the DNS side:

a) I would strongly recommend making this DNSSEC only and tackling the error modes when DNSSEC Validation fails (e.g. similar to situation when OCSP retrieval via HTTP(S) fails). Without DNSSEC, you are prone to OCSPRR striping, with DNSSEC, you are tackling the same problem as DANE (TLSA RR) has - the resistance to implement DNSSEC-validating resolver in the browser.

b) drop the TXT fallback, getting a new RR is simple (compared to getting this to be approved as a model of operation in PKIX WG

Good luck,
Ondrej

--
Best Regards,
Massimiliano Pala, Ph.D.
OpenCA Labs Director
OpenCA Logo

Image displayed inline above

Message body not shown because it is not plain text.