On Thu, Feb 06, 2014 at 04:31:38AM +0000, Viktor Dukhovni wrote:
> I must plead ignorance of the obstacle, what do you have in mind?

I am repeatedly informed by my man pages, RFC 3493, and every web
browser implementer I've ever spoken to that getting the TTL on an RR
coming to you from the system resolver is hard.  I'd be more delighted
than I can express to be misinformed, so if you know otherwise please
say so.

There is a new API (more a meta-api) that Paul Hoffman worked on
(http://www.vpnc.org/getdns-api/) that I think we should all embrace
partly for the above reason, but we're not even at 0-day with that yet
AFAICT.  

> If learning DNS TTLs along with the RRset data is problematic,
> application caches should have reasonably short maximum lifetimes.

I recognise the basic impulse in what you're saying, but it gives me
pause.  Timing attacks involving DNS and the browser "pinning" policy
have always struck me as plausible (and ISTR a demonstration, but I'm
darned if I can come up with it now).  But using this sort of trick
for actual certificate stuff appears to make the target of any
pinning-timing attack more valuable.  Is that a problem?  (That's not
a rhetorical question.  I'm an idiot.)

[I get your other argument about lifetimes.  Not trying to ignore,
just accepting.]

A

-- 
Andrew Sullivan
a...@anvilwalrusden.com
_______________________________________________
dane mailing list
dane@ietf.org
https://www.ietf.org/mailman/listinfo/dane

Reply via email to