Re: [Add] Mozilla's DoH resolver policy

Mark Andrews <marka@isc.org> Fri, 12 April 2019 23:20 UTC

Return-Path: <marka@isc.org>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBEDD1203EB for <add@ietfa.amsl.com>; Fri, 12 Apr 2019 16:20:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xC-Cjbgxth4D for <add@ietfa.amsl.com>; Fri, 12 Apr 2019 16:20:15 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C94C2120341 for <add@ietf.org>; Fri, 12 Apr 2019 16:20:15 -0700 (PDT)
Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id A89B13AB03E; Fri, 12 Apr 2019 23:20:14 +0000 (UTC)
Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id 8CA6916006A; Fri, 12 Apr 2019 23:20:14 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id 62252160070; Fri, 12 Apr 2019 23:20:14 +0000 (UTC)
Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Yz3fBHOLhbbi; Fri, 12 Apr 2019 23:20:14 +0000 (UTC)
Received: from [172.30.42.67] (c27-253-115-14.carlnfd2.nsw.optusnet.com.au [27.253.115.14]) by zmx1.isc.org (Postfix) with ESMTPSA id 1A01116006A; Fri, 12 Apr 2019 23:20:12 +0000 (UTC)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Mark Andrews <marka@isc.org>
In-Reply-To: <4203E588-C6CE-44AD-AB26-FDD9AEED587F@huitema.net>
Date: Sat, 13 Apr 2019 09:20:10 +1000
Cc: Wes Hardaker <wjhns1@hardakers.net>, Ted Hardie <ted.ietf@gmail.com>, add@ietf.org, Peter Saint-Andre <stpeter@mozilla.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <6757A8CC-D3CE-482F-B191-B002EBCA2F84@isc.org>
References: <297C80CE-F017-4F4A-80E2-79941E8B9E02@icann.org> <b64761dc-dfab-e4e1-4bfb-82d607efa590@riseup.net> <alpine.LRH.2.21.1904101324530.9940@bofh.nohats.ca> <64aeff58-6d68-4c4f-b991-2b2f62d193a0@www.fastmail.com> <90A5C5C4-373C-4B39-80C2-C115CD23CB4D@fl1ger.de> <994839978.18707.1554973716877@appsuite.open-xchange.com> <af5f5c76-0095-65a0-39d1-d29d4bb0e906@mozilla.com> <ybl36mn8b54.fsf@w7.hardakers.net> <f9d0cd98-db0c-7f42-d351-d9a5002c4765@mozilla.com> <CA+9kkMAobw2giYO=8pbLVi4ms0Ru+nYwhV5DGxLCwaUdX6EQyQ@mail.gmail.com> <yblv9zj5591.fsf@w7.hardakers.net> <CA+9kkMBMehkz3NbytL+vfDh+SwhW9At_q7oBL8a7XSEiSSrNwA@mail.gmail.com> <yblr2a651zv.fsf@w7.hardakers.net> <4203E588-C6CE-44AD-AB26-FDD9AEED587F@huitema.net>
To: Christian Huitema <huitema@huitema.net>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/SDdP1NFdIybljuuRt_XIiA1Zgx8>
Subject: Re: [Add] Mozilla's DoH resolver policy
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Apr 2019 23:20:18 -0000


> On 13 Apr 2019, at 8:16 am, Christian Huitema <huitema@huitema.net> wrote:
> 
> 
> 
>> On Apr 12, 2019, at 2:48 PM, Wes Hardaker <wjhns1@hardakers.net> wrote:
>> 
>> But then you bring in the discussion of DNSSEC and authenticity, which
>> is the only current way to ensure end-to-end data integrity and combine
>> this with Martin's statement of
>> 
>>> We don't believe that DNSSEC is essential to our primary goals, which
>>> are improving privacy of browsing activity.
>> 
>> Which clearly shows that between the above three, they're willing to
>> sacrifice some level of authenticity to achieve better latency and
>> privacy.  Note, though, that this choice isn't wrong.  It's a choice.  I
>> may choose a different one, as may others.  And I'm more than sure my
>> list above is incomplete from an ideological stand point; it just
>> happens to be the three biggest I could think of.
> 
> On the other hand, DNSSEC does not guarantee authenticity either. It guarantees that the mappings of name to IP address is authentic, but that's not the same thing as guaranteeing that the connection actually terminates at the authentic end point. There could well be a NAT somewhere that translates the IP address and delivers the packets to a different server. See for example the many cases of rerouting 8.8.8.8 traffic to a different server.
> 
> On the web, authenticity is provided by the server identity verification built in TLS and used by HTTPS. Arguably, once you have HTTPS and authenticate the server, then DNSSEC does not provide any additional guarantee.
> 
> What DNSSEC provides is something else. If the name resolution points to the IP address of the wrong server, the TLS authentication will fail, and so will the connection. Falsified name resolution is thus a form of DOS attack, and DNSSEC protects against that. That's nice, but not essential.
> 
> Of course, DNSSEC is useful for other scenarios, such as retrieving keys. But these are not quite the main web scenarios.

And if Mozilla add DANE support then DNSSEC in the DoH server is essential.  DNSSEC requires that *all* servers in the DNS lookup path implement DNSSEC for correct operation (recover from different classes of attack).  DANE can protect against various attacks on the WPKI.

> -- Christian Huitema 
> -- 
> Add mailing list
> Add@ietf.org
> https://www.ietf.org/mailman/listinfo/add

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka@isc.org