Conversation

Remember when Chrome developers claimed they'd remove static pinning for their own domains after dropping HPKP support? The only real change was disallowing others from using static pinning. They've also continued to sabotage DNSSEC+DANE despite WebPKI depending on DNS security.
1
36
Google clearly doesn't believe an entirely reactive mechanism (Certificate Transparency) makes pinning unnecessary. They aren't eating their own dog food despite promising to do it. There are a clearly a lot of people at Google who do think DNSSEC is important but not at Chrome.
1
15
They could easily add TLSA records for those and have proper authenticated encryption instead of the weak security offered by MTA-STS. MTA-STS is WebPKI sans CT with insecure connections by default and no equivalent to HSTS preloading. Not even easier than DANE. It's harder...
1
15
Replying to
Choice is not between trusting DNS or WebPKI but rather whether you trust both DNS and WebPKI or just DNS via DANE. DANE can be introduced alongside the existing system and CT can still be required. When DoT or DoH are in use, middlebox compatibility with DNSSEC is irrelevant.
16