Re: [Add] data integrity and DNSSEC or DoH/DoT

Vittorio Bertola <vittorio.bertola@open-xchange.com> Fri, 06 September 2019 14:32 UTC

Return-Path: <vittorio.bertola@open-xchange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 679B41200A3 for <add@ietfa.amsl.com>; Fri, 6 Sep 2019 07:32:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level:
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=open-xchange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L_lPAGk8yOmz for <add@ietfa.amsl.com>; Fri, 6 Sep 2019 07:32:22 -0700 (PDT)
Received: from mx4.open-xchange.com (alcatraz.open-xchange.com [87.191.39.187]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC6C5120073 for <add@ietf.org>; Fri, 6 Sep 2019 07:32:21 -0700 (PDT)
Received: from open-xchange.com (imap.open-xchange.com [10.20.30.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx4.open-xchange.com (Postfix) with ESMTPS id A84926A257; Fri, 6 Sep 2019 16:32:18 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=open-xchange.com; s=201705; t=1567780338; bh=d8PHCW2InPi9XdoTlunkCb40cxigI8oyO3Zi3/A+Qus=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:From; b=c51QV3I5pw6Rvgs9Y9NSStqIZduVptwlzQfQlEN35/r6IR9Im4DG4dvA2gzsAXhpu AKSqXcOwmWWrn/1DoybYZQ2L9SaRrx+MYMT2zUuk91vS9cXtqdm+fTeVMvanHZFjot rAt70JBxaYueoKfTI8tE+Tmu0/adb5XzXseDNNP1BPYu9xAdnlYCruTecXyvuMnBdJ X7wmgs4kVXoCEG9IBZUpeZ4olrhK7AP6kCcNvBSY0JN153dCWWB6O4yp31EyOjTCfJ SQYN9h7MwdEfR1H54gMrDlE0OOzAKNbd7Q9+3K77lnAe92zuP7mvtok6mQiKjZyt+p 4hbChBfoTNC9g==
Received: from appsuite-gw2.open-xchange.com (appsuite-gw2.open-xchange.com [10.20.28.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by open-xchange.com (Postfix) with ESMTPSA id 9B9FA3C02E2; Fri, 6 Sep 2019 16:32:18 +0200 (CEST)
Date: Fri, 06 Sep 2019 16:32:18 +0200
From: Vittorio Bertola <vittorio.bertola@open-xchange.com>
Reply-To: Vittorio Bertola <vittorio.bertola@open-xchange.com>
To: Paul Wouters <paul@nohats.ca>
Cc: ADD Mailing list <add@ietf.org>
Message-ID: <795043082.753.1567780338538@appsuite-gw2.open-xchange.com>
In-Reply-To: <alpine.LRH.2.21.1909052317500.4174@bofh.nohats.ca>
References: <A1128702-1E19-4657-9740-E84AE09992F2@piuha.net> <CA+9kkMAfuOwJu8_qJTuhAY4mUwR+tVUxr+k3QFHBk3byV672Ow@mail.gmail.com> <A7EA862E-8E80-40E3-834D-E628988C0A24@virtualized.org> <CAFWeb9KT=2JL0oHUgJ2WMcduR3na+hP2QncvRR4YurmqsAWxTA@mail.gmail.com> <59E0EC53-0E30-431C-8376-52C7BFC121A8@virtualized.org> <CAFWeb9+Z7RmXEr46qx5PaUcxh2R3+HXhrZeW-8QEMX4HLt7a-w@mail.gmail.com> <589DAFCB-1BDC-4156-A2CA-179C4559A6B2@virtualized.org> <cf2152d7-8618-7ad2-b8f9-7a259ab5df19@cs.tcd.ie> <683A176C-3CE6-4866-A736-F2A7465FA5B5@rfc1035.com> <CABcZeBPmWYBKcKhjTUBLw62xJT=OXbp3v6MZ+8Gtr=gFmQ-g6A@mail.gmail.com> <E40CC478-BBA1-4DA9-8F6A-FE1782E0F27E@rfc1035.com> <CABcZeBMnG_HJHYrGpQD1LWWNi8zuhAm=0Uy2HNRRmhYS9PsCtg@mail.gmail.com> <06613304-C325-4BA4-AB6F-32D79DFCECA0@open-xchange.com> <CABcZeBMr6WtzbyPPA6W1Da0A9bUoowMVucbBf5K0BQgqZrNdwg@mail.gmail.com> <CAH1iCioWFzHN_hTW4G=0kNHX+2onC64xTSEG-U4miQ1YUH8bSQ@mail.gmail.com> <125944910.3423.1567677431631@appsuite-gw1.open-xchange.com> <alpine.LRH.2.21.1909052317500.4174@bofh.nohats.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Priority: 3
Importance: Normal
X-Mailer: Open-Xchange Mailer v7.10.2-Rev12
X-Originating-Client: open-xchange-appsuite
Autocrypt: addr=vittorio.bertola@open-xchange.com; prefer-encrypt=mutual; keydata= mQENBFhFR+UBCACfoywFKBRfzasiiR9/6dwY36eLePXcdScumDMR8qoXvRS55QYDjp5bs+yMq41qWV9 xp/cqryY9jnvHbeF3TsE5yEazpD1dleRbkpElUBpPwXqkrSP8uXO9KkS9KoX6gdml6M4L+F82WpqYC1 uTzOE6HPmhmQ4cGSgoia2jolxAhRpzoYN99/BwpvoZeTSLP5K6yPlMPYkMev/uZlAkMMhelli9IN6yA yxcC0AeHSnOAcNKUr13yXyMlTyi1cdMJ4sk88zIbefxwg3PAtYjkz3wgvP96cNVwAgSt4+j/ZuVaENP pgVuM512m051j9SlspWDHtzrci5pBKKFsibnTelrABEBAAG0NUJlcnRvbGEsIFZpdHRvcmlvIDx2aXR 0b3Jpby5iZXJ0b2xhQG9wZW4teGNoYW5nZS5jb20+iQFABBMBAgAqBAsJCAcGFQoJCAsCBRYCAwEAAp 4BAhsDBYkSzAMABQMAAAAABYJYRUflAAoJEIU2cHmzj8qNaG0H/ROY+suCP86hoN+9RIV66Ej8b3sb8 UgwFJOJMupZfeb9yTIJwE4VQT5lTt146CcJJ5jvxD6FZn1Htw9y4/45pPAF7xLE066jg3OqRvzeWRZ3 IDUfJJIiM5YGk1xWxDqppSwhnKcMOuI72iioWxX0nGQrWxpnWJsjt08IEEwuYucDkul1PHsrLJbTd58 fiMKLVwag+IE1SPHOwkPF6arZQZIfB5ThtOZV+36Jn8Hok9XfeXWBVyPkiWCQYVX39QsIbr0JNR9kQy 4g2ZFexOcTe8Jo12jPRL7V8OqStdDes3cje9lWFLnX05nrfLuE0l0JKWEg8akN+McFXc+oV68h7nu5A Q0EWEVH5QEIAIDKanNBe1uRfk8AjLirflZO291VNkOAeUu+dIhecGnZeQW6htlDinlYOnXhtsY1mK9W PUu+xshDq7lXn2G0LxldYwyJYZaJtDgIKqVqwxfA34Lj27oqPuXwcvGhdCgt0SW/YcalRdAi0/AzUCu 5GSaj2kaGUSnBYYUP4szGJXjaK2psP5toQSCtx2pfSXQ6MaqPK9Zzy+D5xc6VWQRp/iRImodAcPf8fg JJvRyJ8Jla3lKWyvBBzJDg6MOf6Fts78bJSt23X0uPp93g7GgbYkuRMnFI4RGoTVkxjD/HBEJ0CNg22 hoHJondhmKnZVrHEluFuSnW0wBEIYomcPSPB+cAEQEAAYkBMQQYAQIAGwUCWEVH5QIbDAQLCQgHBhUK CQgLAgUJEswDAAAKCRCFNnB5s4/KjdO8B/wNpvWtOpLdotR/Xh4fu08Fd63nnNfbIGIETWsVi0Sbr8i E5duuGaaWIcMmUvgKe/BM0Fpj9X01Zjm90uoPrlVVuQWrf+vFlbalUYVZr51gl5UyUFHk+iAZCAA0WB rsmACKvuV1P7GuiX3UV9b59T9taYJxN3dNFuftrEuvsqHimFtlekUjUwoCekTJdncFusBhwz2OrKhHr WWrEsXkfh0+pURWYAlKlTxvXuI7gAfHEQM+6OnrWvXYtlhd0M1sBPnCjbyG63Qws7Rek9bEWKtH6dA6 dmT2FQT+g1S9Mdf0WkPTQNX0x24dm8IoHuD3KYwX7Svx43Xa17aZnXqUjtj1
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/C2VI-roxx_Xc3M7D8raqKMkpnhU>
X-Mailman-Approved-At: Fri, 06 Sep 2019 08:26:52 -0700
Subject: Re: [Add] data integrity and DNSSEC or DoH/DoT
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Sep 2019 14:32:25 -0000

> Il 6 settembre 2019 05:27 Paul Wouters <paul@nohats.ca> ha scritto:
> 
> Trusting unsigned data from the internet from random parties is not done
> for any other protocol, why allow it for DNS?

I see your point, but one could reply: is the *content* of any web page you load signed or independently verified for integrity in any way? No, you just authenticate the source and secure the channel, and then trust any content you receive that way. So why should it be different when the content (via DoH) is a DNS response? I'm not saying that this argument is 100% right, but it's how lots of things work now.

[on-device recursor]
> > I think that this would have more drawbacks than advantages.
> 
> Can you elaborate on why you think that is?

Every time the idea comes up, the operations people complain that performance would be bad due to reduced caching, and the privacy people complain that it would become much easier to associate DNS queries to a specific individual/household. Moreover, having billions of active resolvers, rather than hundreds of thousands, would possibly make things like the root key rollover much harder, and exacerbate the problem of obsolete recursors.

However, these are not impossible problems, so it still makes sense to have the discussion.

> >  So the only alternative is to facilitate the establishment of trust
> > in at least one resolver.
> 
> No because transport security provided by a resolver is not data origin
> security offered by DNSSEC.

This is a problem only if you trust ICANN and the zone owner more than you trust your resolver. If it's the opposite, you might just conclude that the resolver must have altered the response for a good reason, and trust the resolver anyway.

> > In the end, I think that a general "resolver accreditation service" on a global scale - which Mozilla has the ambition to create with
> > their TRR list - will never work due to scaling problems, unless you centralize resolution into a handful of global platforms, which
> > IMHO would be a much bigger problem for the Internet. What could instead work is a way for the user to express and change an assertion
> > of trust in one or more resolvers, devolving the problem to the edges of the network and letting each user define implicitly their own
> > requirements for trust.
> 
> Sounds very similar to the browsers having a store of root CA's. It
> didn't really work from a trust point of view, and it was patched up
> with first CRLs, then OCSP and then CT. Why make the same mistake
> with DNs resolvers?

Mozilla's TRR model is similar to a chain of trust with them at the root. However, the user can bless a resolver (i.e., tell the device "I trust a.b.c.d as a resolver") locally, without having to involve any central authority. (And yes, the current CA system is awful.)

> Some believe TRR's are better than random ISP DNS resolvers they happen
> to be (forced to) using, such as hotel or coffee shops. For example,
> I've stayed at hotels whose wifi blocked Priceline and Booking.com
> using DNS. So I don't see why TRR's should not be deployed until
> some mysterious future time.

At the current state of the technology, browsers cannot start a blanket adoption of the TRR model without breaking substantial parts of the Internet, so they shouldn't. They could do it in specific cases where they have determined that this won't create technical, service, policy and legal issues, which AFAIK is what Mozilla is trying to do. The above could be one of those cases, as long as they don't bypass local laws together with the local resolver, and don't clash with the captive portal mechanism. Still, if you care about that problem, I'd advise you to get a proper VPN now, rather than wait for TRRs in the browser.

-- 
 
Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bertola@open-xchange.com 
Office @ Via Treviso 12, 10144 Torino, Italy