Conversation

Replying to and
Many DANE advocates do want it to be available as a full replacement for WebPKI. I'm not suggesting that Chrome should do that. It's usable as either a full replacement or a pinning mechanism. I know Chrome isn't going to drop CT and I'm not proposing that it should be doing it.
2
Replying to
Got it, glad you clarified that. It doesn't seem as strong as HPKP though, because you're still reliant on trusted third parties with DANE. HPKP let you avoid TTPs entirely, or at least choose the ones you wanted to trust.
1
Replying to
HPKP doesn't work for the first connection or when the pins have expired. DNSSEC + DANE secures the first connection. It relies on DNS as a root of trust, just like WebPKI does for DV. You can choose which TLD operator you want to trust though, instead of trusting all of them.
2
Replying to and
Since TLSA records have a TTL, the browser can choose to store the TLSA record for the entire TTL itself to use it as a pin. This can provide the same kind of trust-on-first-use security as HPKP used to provide, if browsers choose to enforce keeping them around the same way.
1
Replying to
Sites can already brick themselves via DNS without Chrome enforcing TLSA. TLSA works fine with TTL capped at 1 day, 4 hours, or just left to follow the rules used for other records. IMO, it's far less of an issue because you can already brick your site via DNS without it.
1
Replying to and
For TLSA, people using Let's Encrypt can just use the hash of the Let's Encrypt roots. If they want they want to avoid trusting Let's Encrypt at all they can use the leaf key hash and then for key rotation obtain the new certs with new key, add 2nd record, wait, then deploy it.
1
Replying to and
To simply pin based on the root, it's literally just 1 record. If you want you can add their legacy root, current root, their future ECDSA root and new ones they announce. You don't depend on backups much if you just set TTL to a typical value like 1 hour but you can add them.
1
Replying to and
We have key pins for every single one of our services: github.com/GrapheneOS/ns1 SSHFP for SSH and TLSA for TLS services (SMTP, SMTPS, IMAPS, HTTPS) Fully aware almost no web clients enforce it, but many mail servers do, and regardless the maintenance is totally trivial for it.
1
Replying to and
It would be nice if browsers started using what we're already publishing via DNS records. We used to use HPKP but we only pinned roots and a couple backup leaf pins. 1 hour TTL TLSA record mistakes would be similar to screwing up an A/AAAA record, etc. so it's not scary.
1
1