It's not true that only organizations "like Google" monitor logs. Organizations big and small use Cert Spotter (both the open source and commercial version) or other tools to monitor CT. Meanwhile, there is no way to detect if a malicious registry signs unwanted TLSA records.
Conversation
Browsers switching to DANE would be a major step backwards in transparency, which has in fact led to bad CAs being distrusted (WoSign, Symantec, Certionomis, Camerfirma, ...). Yeah, MTA-STS sucks but this is way off-topic from the blog post.
1
Replying to
DANE isn't a step backwards for transparency. Enforcing TLSA records does not require dropping WebPKI + CT as requirements for certificates to be considered valid. DANE can be used for pinning rather than fully replacing WebPKI. It's not a choice between security or transparency.
1
1
I'm saying that Chrome should be enforcing DNSSEC + DANE when using DoT/DoH. I'm not saying that they replace the existing requirements with a different approach but that they should support pinning via DNSSEC + DANE to allow sites to stop trusting CAs for users with DoT/DoH.
1
1
Many DANE advocates do want it to be available as a full replacement for WebPKI. I'm not suggesting that Chrome should do that. It's usable as either a full replacement or a pinning mechanism. I know Chrome isn't going to drop CT and I'm not proposing that it should be doing it.
2
Replying to
Got it, glad you clarified that.
It doesn't seem as strong as HPKP though, because you're still reliant on trusted third parties with DANE. HPKP let you avoid TTPs entirely, or at least choose the ones you wanted to trust.
1
Replying to
HPKP doesn't work for the first connection or when the pins have expired. DNSSEC + DANE secures the first connection. It relies on DNS as a root of trust, just like WebPKI does for DV. You can choose which TLD operator you want to trust though, instead of trusting all of them.
2
Since TLSA records have a TTL, the browser can choose to store the TLSA record for the entire TTL itself to use it as a pin. This can provide the same kind of trust-on-first-use security as HPKP used to provide, if browsers choose to enforce keeping them around the same way.
1
Replying to
It would also provide all the same foot-gun potential that made people hate HPKP ;-)
1
Replying to
Sites can already brick themselves via DNS without Chrome enforcing TLSA.
TLSA works fine with TTL capped at 1 day, 4 hours, or just left to follow the rules used for other records.
IMO, it's far less of an issue because you can already brick your site via DNS without it.
1
If you set broken DNSSEC records, your site is already bricked via essentially every DoT / DoH provider. Some of them provide a way to flush the caches (such as https://1.1.1.1/purge-cache/ and developers.google.com/speed/public-d). Doing TLSA right is easier than doing DNSSEC right anyway.
For TLSA, people using Let's Encrypt can just use the hash of the Let's Encrypt roots.
If they want they want to avoid trusting Let's Encrypt at all they can use the leaf key hash and then for key rotation obtain the new certs with new key, add 2nd record, wait, then deploy it.
1
To simply pin based on the root, it's literally just 1 record. If you want you can add their legacy root, current root, their future ECDSA root and new ones they announce. You don't depend on backups much if you just set TTL to a typical value like 1 hour but you can add them.
1
Show replies

