Conversation

Now that HPKP is removed, browsers should do what they should have done from the beginning by supporting DNSSEC and DANE as a pinning mechanism. No need to support using it as an alternate root of trust. For compatibility can limit it to when DoT or DoH are being used by default.
1
11
This Tweet was deleted by the Tweet author. Learn more
Replying to
Please don't let them impose inane policies on what sort of DANE records are acceptable for web. Anything should be accepted and completely override webpki if DANE semantics say it does (DANE-EE(3) or -TA(2) vs PKIX-*(0 or 1)).
3
Replying to and
No. DANE-TA and DANE-TE allow TLD operators (and thus anyone who can force them through shady court orders) to completely circumvent TLS without even leaving a trace. PKIX-TA and PKIX-EE would at least force them to leave a trace within the certificate transparency logs.
1
Replying to and
This threat is overstated to the point of being standard anti-DNSSEC FUD, but indeed we do need a DNSSEC analogue of CT. Unlike with webpki CT, it doesn't require trusting CAs to adhere to policy to create such a thing; it can be constructed from observation.
3
Replying to and
You'd still be able to circumvent that through split horizon DNS. IMO there needs to be a way to enforce that all DS records and proofs of non-existence of DS records at the TLD level be signed by and committed to trustworthy public append-only logs.
1
Replying to and
I don't follow what you're saying you'd be circumventing. The idea is that someone, somewhere sees the forged DS and submits it to an append-only log because doing so is well inventivized. And if you see one nobody else is submitting yet, it's likely forged.
1
Let's Encrypt issues an enormous number of certificates so it places a huge load on the logs they use. It needs to be very reliable, high availability infrastructure. More diversity of logs would be really nice. If it's harder to host, there isn't as much diversity of logs.