Re: [Add] Proposed charter and BoF request for IETF 106

Eric Rescorla <ekr@rtfm.com> Wed, 09 October 2019 19:00 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54F69120BE1 for <add@ietfa.amsl.com>; Wed, 9 Oct 2019 12:00:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q98quU-wQqWd for <add@ietfa.amsl.com>; Wed, 9 Oct 2019 12:00:34 -0700 (PDT)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 145EF120BDE for <add@ietf.org>; Wed, 9 Oct 2019 12:00:34 -0700 (PDT)
Received: by mail-lf1-x136.google.com with SMTP id r2so2457990lfn.8 for <add@ietf.org>; Wed, 09 Oct 2019 12:00:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AIbjh4z2UZ1kY8Y9upGh4vzzzkvW2gwXJK5sP5h1ktg=; b=cOtxZxDbpzcO4y3PYhqt9597EAR5PngCBGMf2uKTINqJ20FDKluvXCMxLnn8ijdV1U 2uQ5X8AUaxz8OsJiPT5Mkj/11AUVqspjoxvlIKvOY5rjMtXQU7AQ865PE4njcHfh+97D KJpLYEooK1sJ6K47gKlVKMCzYMsQaX3VMECJin9ULG72R9UhjLj/19LuBbGbTOUhI23E 8vzdPyCWWnAukQqFhwgkLBk0tRxVfsQpenEjV/O6WsjT8wnVXCrM30a10JvSDqx6DyzY OUlNTPNPoEWShqy7uqb0dUcEg4IAKdqan30rDOv4jGgtUa5jk3Tf/zWK2cuirs7zundt RjoQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AIbjh4z2UZ1kY8Y9upGh4vzzzkvW2gwXJK5sP5h1ktg=; b=lCpOg8NwXnp3onnxkXDV6VMN0tnF2qeFPbZyuT3yHyA0XanPudOxRhofK5GAisniMG ENSn2Z3GY+VLDXxQSIS4/V2E84hPHgbmoc4wZWwNABVMfhZua2DajF7rL7YDg4fVcaFm 1WiDbXjlXwVnKAcpMIgh0PZsqv9OuBcxjfOm6ZqWdK+7gUM3agEWG+dDZXWt9KqhTIpJ 0RUQPRXDnCCsr/TNGdG8Q60INrgTCRkfF9V8gFbJfrK/KW8uZNyhfGxGZXdgMAcSGGVx ionspHvBu7xnk4MJ0zSFRzX3VYkr2j3H1U07kOE/zgv61W/o1F5hIPeqdulwIZohi9H6 zf3A==
X-Gm-Message-State: APjAAAWpNQ4WZLKKjE+6O9W7xJit80pdkeKXgjhfLWLzf0jW5+yCv0db 2HyMxtiV+FoNFouGofhsHXFuK3j/w0lQ21cQMBOuGw==
X-Google-Smtp-Source: APXvYqx+5siEbutIU/bz/0n2slMXuZHg2b0MojJzMW8ewRdurw0fMd75gDWWZlYP4xCxAVUFRn4REOMysnf2QnNmtMY=
X-Received: by 2002:a19:84c:: with SMTP id 73mr3046998lfi.180.1570647632142; Wed, 09 Oct 2019 12:00:32 -0700 (PDT)
MIME-Version: 1.0
References: <CALaySJLxXVuHQNfTnaeKZ_R9xtBYWfbta+A1bWcE-ZQZwd3VZg@mail.gmail.com> <CABcZeBMkAFZW9mWjw92v+OR0Fa8ed+P80yc78eY07hCpsCNY6Q@mail.gmail.com> <1556423899.28427.1570640191209@appsuite-gw2.open-xchange.com> <CABcZeBNyRDqnVL68aXny=Ht69NjahmS4zRsnYizO53M--rhM5g@mail.gmail.com> <alpine.LRH.2.21.1910091313590.2297@bofh.nohats.ca> <CAFpG3gch-mgJJMO1rEg61PhYNKeKYiJwz4NTQ3QDbEb=WNkyQw@mail.gmail.com> <CABcZeBM68EWDO3rTOCnWfmieAGzxwR9YUj4pyvDtECFEDoFiNw@mail.gmail.com> <CAL02cgQOUDfk20COShfYbQHOhb-aVTBh0g0ahjWdWZAFWuzN6w@mail.gmail.com>
In-Reply-To: <CAL02cgQOUDfk20COShfYbQHOhb-aVTBh0g0ahjWdWZAFWuzN6w@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 09 Oct 2019 11:59:54 -0700
Message-ID: <CABcZeBMu59PThm-6NDcMZWnLzeQaRFag8yUxSuz=78Dqt_bifA@mail.gmail.com>
To: Richard Barnes <rlb@ipv.sx>
Cc: tirumal reddy <kondtir@gmail.com>, Paul Wouters <paul@nohats.ca>, ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002e75fe05947ee6b7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/dKpp1Qh7IpWUbMf7-RTqrcEEgfU>
Subject: Re: [Add] Proposed charter and BoF request for IETF 106
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Oct 2019 19:00:45 -0000

On Wed, Oct 9, 2019 at 11:46 AM Richard Barnes <rlb@ipv.sx> wrote:

>
>
> On Wed, Oct 9, 2019 at 2:32 PM Eric Rescorla <ekr@rtfm.com> wrote:
>
>>
>>
>> On Wed, Oct 9, 2019 at 11:04 AM tirumal reddy <kondtir@gmail.com> wrote:
>>
>>> On Wed, 9 Oct 2019 at 18:15, Paul Wouters <paul@nohats.ca> wrote:
>>>
>>>> On Wed, 9 Oct 2019, Eric Rescorla wrote:
>>>>
>>>> > You're misunderstanding me. I'm not saying that we should not enable
>>>> network operators to shift to encrypted transport.
>>>> > As I said in the section of my message that you cut, I'm more than
>>>> happy to have the IETF standardize a mechanism for
>>>> > the network to tell endpoints that it supports encrypted transport.
>>>> I'm merely observing that this does not address the
>>>> > issue that Mozilla is trying to address with our DoH/TRR deployment.
>>>>
>>>> And it seems doing this at the DHCP / Captive Portal level is enough. I
>>>> don't see the need for a WG to be spun up for this.
>>>>
>>>
>>> DHCP is not a secure way to discover the local DoT/DoH server.
>>>
>>
>> It would probably useful to start by defining what "secure" means in this
>> context. For instance, I am in an airport and I see the name of the WiFi AP
>> printed on the wall an join a network with that SSID. How would you define
>> securely learning the DoH server?
>>
>
> I would probably be happy with the property that some random other host on
> the LAN couldn't feed you bad information.
>

Yeah, I'm not actually sure how to do that without making some assumptions
about the LAN structure and (in the case of wireless, what kind of crypto
was in place).


> Not that this has much to do with DoH.  The impact of rogue DHCP servers
> is just as catastrophic for Do53.
>

Well, perhaps less, because the Do53 security properties are already so
terrible :)

-Ekr