Re: [Add] data integrity and DNSSEC or DoH/DoT

Alec Muffett <alec.muffett@gmail.com> Fri, 06 September 2019 15:50 UTC

Return-Path: <alec.muffett@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49AE6120861 for <add@ietfa.amsl.com>; Fri, 6 Sep 2019 08:50:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5UMnorbB2_IL for <add@ietfa.amsl.com>; Fri, 6 Sep 2019 08:50:42 -0700 (PDT)
Received: from mail-yw1-xc31.google.com (mail-yw1-xc31.google.com [IPv6:2607:f8b0:4864:20::c31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 885D2120D76 for <add@ietf.org>; Fri, 6 Sep 2019 08:50:42 -0700 (PDT)
Received: by mail-yw1-xc31.google.com with SMTP id f187so2351104ywa.5 for <add@ietf.org>; Fri, 06 Sep 2019 08:50:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WOzzs8cV929a5abOysdEPoOYNPImj8VHGI/tXShOZuE=; b=p5I+/E/xDz4/092EAv1h20SQ/dAKxQo9VHjERUQ9zGAC8DKgqq+v/Q3LB4bJVJh7As vZhvEytd/dpSQlXsMqjacl9GeS5OMs8NIfi7X6WYzeTvzKokAnIe713LIHaocleEmHCT S/y+w4ydaAbfb7b6TsNt9YG43wHiwCsjfh2Z9DXV3ZYTXHo+Gglp9neHDJ9mk6YhIZxl 7Yk0ptXkVW+I4v+LsOs0VA46p1T/WDWHU23jU/rf/MmwTGrVsdetvNEPDh5DrEd36CUU gnYpp51SgKtrg7Q6Yq2ZGpc5K62D/ufz8XryPBtpdWDwQbLg3bipfhBnlHt7lloLVmqE LhLg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WOzzs8cV929a5abOysdEPoOYNPImj8VHGI/tXShOZuE=; b=tQSnsSSIIs7qRaqWRLILg77ghMx61avjHW8L6wvYcSR1PdXtECCoOOxOIoAy4dQ8Dm /gPyx6a+kEGidthVsgrbB4KhHSIvnEc8I+VdUY8ga1dm9AkFiezDqcJdHFqbdYuvTL7q ealFTFlIDx5hd1h7qNj9NMwLhyiGKZ4sjJs+6+ThaBKQitL90yQySho9RaxvlKZqTjbC KOUss88aAgxWjWDDC3Oc/dg0y7ciuFwKBdkRXDUS4Q/ifbZvZ+wPJ/WmgJTRyJz2VxPg lFAEXmICReqagoNPlCvbF1lqH+1HNZlQ7sx0ibOqWNiiJrfwYTd6tpSGFVyZtErtQr5m X4aQ==
X-Gm-Message-State: APjAAAXoGkd/ZwkkuHdWsXoKA5UnYkT5R/QSEOUrmu1b8Sd9OH60zThi mWJ6o/dA4Pz6OY/nEDKOSfCic6Q6WIF0Sy05PmQHWg==
X-Google-Smtp-Source: APXvYqwJOAD7dE8u4Q4lYmMqdwHcC2YDhBPHJNOy3zIrmZMADOzTiX/d5QfvqpGDj1WdBAA/l6hmbRfdvalFvktAoUs=
X-Received: by 2002:a81:31cd:: with SMTP id x196mr7173089ywx.350.1567785041536; Fri, 06 Sep 2019 08:50:41 -0700 (PDT)
MIME-Version: 1.0
References: <A1128702-1E19-4657-9740-E84AE09992F2@piuha.net> <CA+9kkMAfuOwJu8_qJTuhAY4mUwR+tVUxr+k3QFHBk3byV672Ow@mail.gmail.com> <A7EA862E-8E80-40E3-834D-E628988C0A24@virtualized.org> <CAFWeb9KT=2JL0oHUgJ2WMcduR3na+hP2QncvRR4YurmqsAWxTA@mail.gmail.com> <59E0EC53-0E30-431C-8376-52C7BFC121A8@virtualized.org> <CAFWeb9+Z7RmXEr46qx5PaUcxh2R3+HXhrZeW-8QEMX4HLt7a-w@mail.gmail.com> <589DAFCB-1BDC-4156-A2CA-179C4559A6B2@virtualized.org> <cf2152d7-8618-7ad2-b8f9-7a259ab5df19@cs.tcd.ie> <683A176C-3CE6-4866-A736-F2A7465FA5B5@rfc1035.com> <CABcZeBPmWYBKcKhjTUBLw62xJT=OXbp3v6MZ+8Gtr=gFmQ-g6A@mail.gmail.com> <E40CC478-BBA1-4DA9-8F6A-FE1782E0F27E@rfc1035.com> <CABcZeBMnG_HJHYrGpQD1LWWNi8zuhAm=0Uy2HNRRmhYS9PsCtg@mail.gmail.com> <06613304-C325-4BA4-AB6F-32D79DFCECA0@open-xchange.com> <CABcZeBMr6WtzbyPPA6W1Da0A9bUoowMVucbBf5K0BQgqZrNdwg@mail.gmail.com> <CAH1iCioWFzHN_hTW4G=0kNHX+2onC64xTSEG-U4miQ1YUH8bSQ@mail.gmail.com> <125944910.3423.1567677431631@appsuite-gw1.open-xchange.com> <alpine.LRH.2.21.1909052317500.4174@bofh.nohats.ca> <795043082.753.1567780338538@appsuite-gw2.open-xchange.com>
In-Reply-To: <795043082.753.1567780338538@appsuite-gw2.open-xchange.com>
From: Alec Muffett <alec.muffett@gmail.com>
Date: Fri, 06 Sep 2019 16:50:32 +0100
Message-ID: <CAFWeb9+7qqL7JgR_h3pH=jRKhyKdOyBjt0-5fsqtQ3i7FyBrpg@mail.gmail.com>
To: Vittorio Bertola <vittorio.bertola@open-xchange.com>
Cc: Paul Wouters <paul@nohats.ca>, ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007c2bc60591e466fe"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/-4a40H2naUSCYNH-DbRe8j_2hQc>
X-Mailman-Approved-At: Sat, 07 Sep 2019 09:34:29 -0700
Subject: Re: [Add] data integrity and DNSSEC or DoH/DoT
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Sep 2019 15:50:50 -0000

On Fri, 6 Sep 2019, 16:26 Vittorio Bertola, <vittorio.bertola=
40open-xchange.com@dmarc.ietf.org> wrote:

> > Il 6 settembre 2019 05:27 Paul Wouters <paul@nohats.ca> ha scritto:
> >
> > Trusting unsigned data from the internet from random parties is not done
> > for any other protocol, why allow it for DNS?
>
> I see your point, but one could reply: is the *content* of any web page
> you load signed or independently verified for integrity in any way? No, you
> just authenticate the source and secure the channel, and then trust any
> content you receive that way.



One could also say that what you outline as the trust model for web pages
is precisely what one would expect from a typical HTTPS URL: because a URL
literally represents "go to <source> and retreive <content> and that is
defacto what you wanted."

A URL is a Uniform Resource Locator; there's that word, "location".

Others have layered signatures and the like atop of this mechanism, but if
you are talking about content-based-addressing (which you essentially are)
then you want non-HTTP URIs, for instance "Magnet" URIs.

Whereas: DNS is a distributed database, and the goal of that is more like a
service discovery protocol (who here remembers Jini?) - where you ask the
aether "What is the address X which corresponds to site Y?" - and there is
(currently, regrettable) little/no chain of trust, nor source-integrity nor
content-integrity, in the response.

So why should it be different when the content (via DoH) is a DNS response?


Because HTTPS has a security-model of "the URL is the Key, and a chain of
trust should permit an authoritative response of the content - which need
not be fixed! - whereas DNS is essentially a search query amongst untrusted
search engines, some of which are lying for their own reasons/benefit.

That's why.

- alec





>