Re: [Add] What to do in this potential working group

David Conrad <drc@virtualized.org> Wed, 21 August 2019 17:59 UTC

Return-Path: <drc@virtualized.org>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3C6112011F for <add@ietfa.amsl.com>; Wed, 21 Aug 2019 10:59:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=virtualized-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XBlfzz1M-bfY for <add@ietfa.amsl.com>; Wed, 21 Aug 2019 10:59:37 -0700 (PDT)
Received: from mail-pf1-x42b.google.com (mail-pf1-x42b.google.com [IPv6:2607:f8b0:4864:20::42b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97A2512008C for <add@ietf.org>; Wed, 21 Aug 2019 10:59:37 -0700 (PDT)
Received: by mail-pf1-x42b.google.com with SMTP id q139so1900524pfc.13 for <add@ietf.org>; Wed, 21 Aug 2019 10:59:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=virtualized-org.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=XOllIL6fBhd7S0ySrxBIK/qf4XuA+Z6K/4RzCWYwh9A=; b=JCvByoBIy2NwxskzUGjNAaGRMY5ZpgJyKPVqUIGFPsaftD9ZY4YtvcqIH9I/j6FyIK MJkmMV/jVqZJekOnF5A2AqI07h6cRtt2YYsefl8+hpV1ExU4ls+sfQ39laqwUxLlUc0n hA2ifqGv2IBuSOkik7qBYm+dCPZheGSKbg36a8RucDqHnqCAFY0EulmNqvvl2r8nAzAp hmdeXE/VqLVaOqo2DA4/jaqr0TqRrCPg3RClRqKrx5RdyNdvgnq7bmddWi6Xa6bMa0fc lOlKLBtAVmy+bXGKuEx6ZkvRl4BqzYWRhCdq21LpsblY3nHBa+M3xtr68B+PIhQ20qqq 89lg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=XOllIL6fBhd7S0ySrxBIK/qf4XuA+Z6K/4RzCWYwh9A=; b=uk7tzzafXoaZzWWM/1Hndq8QUEZHUtoiIGcaK/xDu4EVE7PX5rzr77eZeaedrVAXKv djeGi0bgeD8Dm5sqGHHwkYlEe58X/hF9Ji/2ihZbsMMabArTcZQNzCUnnoy69znk32b4 59hL3xmRAhB8SBjFKW3X6jCTUgHb2J+Yw+tke+miVEUR7cdFH1N+XKKy1ED/NMjzzEy/ jd8TFITALk5Tv99NhpRZoRbi2qVj7QWzfkUkdewjTv7aYpZr65Fwku4PEEX7jVXtLDGT olFtUPJbW8jCOusFT0trgZGYMtR681kdQiS53rGLQyg03DhjQhQKyrJiMWONViC7sSmT A+yA==
X-Gm-Message-State: APjAAAUw69Gx9uyJ0EacTVhk9AfGR9gIQgZd6EMF1udSLUa6ns9BRWUS 3CHpFlecv3ISEwKEk7GMv7NHBg==
X-Google-Smtp-Source: APXvYqx1CvPsPV0rSqHJhmg1/rFRKWCir2AWKmYAEJw9GWOyBelK+RccaAVR0pPiY6cUgoR0MZaUfQ==
X-Received: by 2002:a17:90a:342d:: with SMTP id o42mr1225880pjb.27.1566410376619; Wed, 21 Aug 2019 10:59:36 -0700 (PDT)
Received: from ?IPv6:2620::2d0:110:a001:9cbc:6eb4:c2df? ([2620:0:2d0:110:a001:9cbc:6eb4:c2df]) by smtp.gmail.com with ESMTPSA id f27sm21399583pgm.60.2019.08.21.10.59.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Aug 2019 10:59:35 -0700 (PDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_B0C81A3F-58D0-4598-95E7-38F6704A2A1B"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: David Conrad <drc@virtualized.org>
In-Reply-To: <CA+9kkMAfuOwJu8_qJTuhAY4mUwR+tVUxr+k3QFHBk3byV672Ow@mail.gmail.com>
Date: Wed, 21 Aug 2019 10:59:34 -0700
Cc: ADD Mailing list <add@ietf.org>
X-Mailbutler-Message-Id: A169F2F5-EB78-4F2B-A272-306C2013190B
Message-Id: <A7EA862E-8E80-40E3-834D-E628988C0A24@virtualized.org>
References: <A1128702-1E19-4657-9740-E84AE09992F2@piuha.net> <CABcZeBMfOTjq-8hDDoKMtJvfHUA5nC8o60zuk-2Xe-ZhfwriJQ@mail.gmail.com> <766112E1-F532-4C6B-8CA8-A096671E02EE@piuha.net> <CA+9kkMAfuOwJu8_qJTuhAY4mUwR+tVUxr+k3QFHBk3byV672Ow@mail.gmail.com>
To: Ted Hardie <ted.ietf@gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/csJ3RpPJCtcfO_uMO8EynWbkJuc>
Subject: Re: [Add] What to do in this potential working group
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Aug 2019 17:59:40 -0000

Ted,

Not Jari, but wanted to point out one thing:

On Aug 21, 2019, at 10:36 AM, Ted Hardie <ted.ietf@gmail.com> wrote:
> The second threat model is that a resolver may provide an untrustworthy answer (e.g. captive portal). The use of DoT and DoH can help with this if the client device, application, or user selects a trustworthy resolver** and uses the TLS certificate to verify they have reached that service.


You probably need to define “trustworthy answer” here.  Traditionally, a “trustworthy answer” was the data originally supplied by the zone owner of the domain being looked up. DNSSEC was created to ensure this. However, network operators (e.g., CDNs) playing “stupid DNS tricks”, resolver operators providing filtering, etc. may have changed what is a “trustworthy answer” over the years.

With that said, and assuming you’re using the traditional interpretation of “trustworthy answer”, then DoT/DoH do not ensure a “trustworthy answer.” DoT/DoH provide transport protection. The only way to truly ensure a trustworthy answer is to protect the actual answer. Which is what DNSSEC does.

Regards,
-drc
(Speaking only for myself)