[dns-operations] DNSSEC deployment incentives
Mark Andrews
marka at isc.org
Wed Jun 19 23:21:29 UTC 2019
> On 20 Jun 2019, at 4:59 am, Viktor Dukhovni <ietf-dane at dukhovni.org> wrote:
>
> On Wed, Jun 19, 2019 at 08:27:34PM +0200, Tom Ivar Helbekkmo via dns-operations wrote:
>
>> Paul Vixie <paul at redbarn.org> writes:
>>
>>>> On Tue, Jun 18, 2019 at 9:33 PM Viktor Dukhovni <ietf-dane at dukhovni.org>
>>> ...
>>>>> But Let's Encrypt de-monetized certificate issuance, so now that
>>>>> obstacle is moot.
>>>>
>>>> It has also eliminated the incentive to deploy DANE for free certs.
>>>
>>> not for me, but i think you may be right in general.
>>
>> OK, I'll bite. My impression has been that DANE is unwanted by the
>> large makers of browsers because their owners also earn money from the
>> CA business, and widespread use and acceptance of DANE would teach their
>> customers that they don't necessarily have to pay for certificates to
>> achieve what they want.
>>
>> So why would the presence of Let's Encrypt lead to *less* use of DANE?
>
> I don't see any evidence that DANE users were doing it to save
> money, even before Let's Encrypt came online. I would expect DANE
> adoption to be driven by an interest in securing the underlying
> service. A large fraction of DANE-enabled MTAs (like yours) have
> Let's Encrypt issued certificates, this is even true for one.com
> whose DANE-enabled MTAs serve ~700k customer domains, and use
> Let's Encrypt certs (ACME simplifies cert rollover) with "3 1 1"
> records.
>
> The frequent certificate rollover with Let's Encrypt does create
> some issues for the sloppier SOHO DANE implementers, because some
> forget to implement a robust process for keeping the TLSA records
> in sync with the frequently updated certificate chain.
>
> One thing I'd like to see is the ability for a server to use its
> current private key and certs (that match its existing TLSA RRset)
> to use DNS "update" to publish a revised TLSA RRset (perhaps via
> SIG(0) with the TLSA records used as the ACL in the nameserver).
> If any of the implementors of BIND, NSD, PowerDNS, ... are interested,
> please reach out…
What do you want to do the update-policy doesn’t already support?
See grant self and self-sub. They are designed to allow a machine to
update records associated with itself be the A, AAAA, SRV, TLSA, KEY,
SSHFP with control down to the record type.
Mark
> Better tooling would help, I believe EFF have a work-in-progress
> to make certbot play nice with TLSA records.
>
> https://mail.sys4.de/pipermail/dane-users/2018-February/000440.html
> https://github.com/danefail/list/issues/47#issuecomment-456623996
> https://community.letsencrypt.org/t/please-avoid-3-0-1-and-3-0-2-dane-tlsa-records-with-le-certificates/7022
>
> plus various presentations listed at:
>
> https://github.com/baknu/DANE-for-SMTP/wiki/2.-Implementation-resources
>
> --
> Viktor.
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
More information about the dns-operations
mailing list