Re: [Add] [Ext] Draft Posting: CNAME Discovery of Local DoH Resolvers

Eric Rescorla <ekr@rtfm.com> Tue, 30 June 2020 03:08 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FF463A00B0 for <add@ietfa.amsl.com>; Mon, 29 Jun 2020 20:08:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s1VNA-XFV_Jp for <add@ietfa.amsl.com>; Mon, 29 Jun 2020 20:08:41 -0700 (PDT)
Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D089F3A0064 for <add@ietf.org>; Mon, 29 Jun 2020 20:08:40 -0700 (PDT)
Received: by mail-lj1-x22e.google.com with SMTP id n23so20749644ljh.7 for <add@ietf.org>; Mon, 29 Jun 2020 20:08:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=H6kd3bDj89/hWh+7wCgu/qudXUHaQRm4/5YhMrai7w0=; b=G5iLgap8hKnPkIZZaWs7aFBSPtgz0h1+SADSD7E3ufhvU8Jlby531Q+E3+P3/PZDJq 4mjtLwqZc429XGujPrf6jwuHf5ItIFLsUST57O8WBXrLPVuhwvvWZ2bvMDNiCwstoOwq ZI3mKEOOnVP+gsmcN0OA5T2Qs/FZATJeRasJf/wmBCKAZQPSuPkgyqt0ocqaak3SAL3/ 5lgeoWHzNaKzBmzB6OGVDX/4Zm7xJRpmuFbgfKTL1cVgklRWUEdpQnRdGpRCCmhPnDTl qaTiaRE0/Nc2OcIpfHgIkMlI5arnPbqMmLhVolLsz1J6IX90a/NrvWAAYWsYwT5mW4hA zBGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=H6kd3bDj89/hWh+7wCgu/qudXUHaQRm4/5YhMrai7w0=; b=ldLxk3Fy7NeoCmRVEjP8OLVfjNdLdWKSxeq9T6YoXyLd24kQRzufWqpbKZLmSDeAVw mQcAKoVs+dSijY9wf/bRorQqKz/f1KqnL2gfsencTtZsaHA4gVSt2hgIDV+gjIaojzx4 IdGpk72Dh/TkekhadqcorGEMTx3llCOE0m2tpu2OHSAj87GrBqtm51jORPyFBOA1aLvW Nhf//dwdjPw49gHCiZV3erzNsjhLhAukM/F8CoX1KoOHYGMJs+63OrJsOQOrmk0fmfqo KHh8MEEaUaFTDQfAo1HYfI0rQ2dBGagXnEpuYrbb6mTpeBPSaFwChUwHGdKGWeCqkIzO jDcg==
X-Gm-Message-State: AOAM532E9h4pnOUdITz8ZaDFoxlf+LbSZ45c6VucSQakD63d5XVGuC5r robUDkwZKRq75mc4mZb4OPBLVgqbaoRNPQFN76yYww==
X-Google-Smtp-Source: ABdhPJwNzYuSVnITMggNlKwOKczOEQavUe+K6awpyHT7oIUUPtBllaPoKIrs8u6ykJbMQWywphE+IJ6HgaFUQl3IfGk=
X-Received: by 2002:a05:651c:1044:: with SMTP id x4mr8975214ljm.409.1593486519084; Mon, 29 Jun 2020 20:08:39 -0700 (PDT)
MIME-Version: 1.0
References: <CABcZeBPTkWeB40wpTowKvEJ-gXA3AL2e-BE+C_FC7Js7-D0DZQ@mail.gmail.com> <14119.1593367594@localhost> <alpine.OSX.2.22.407.2006281428200.79151@ary.qy> <3615321.ADK9YsXCiF@linux-9daj> <CADZyTkm82y=H48e7TL+wBMN67jrCG2T96kHOdovX0Ds3m_nguw@mail.gmail.com> <CABcZeBMRYRoMVLr937=9T4dyVGzGHYapcrTRZ7nYghdAqzhqOQ@mail.gmail.com> <CADZyTknZTcYXb1JbYANh4uk5xgAedNGnM93y9QORJ2vYR5eJxw@mail.gmail.com> <CABcZeBOqZLpJ1_2-wFae3bM2RvrnA1z++swxfq7xc8E7Ny5ZfQ@mail.gmail.com> <CADZyTkmD1MYuP0+JB5KS3cLQGe_koo=bu2s2CucHXS098xYAoQ@mail.gmail.com>
In-Reply-To: <CADZyTkmD1MYuP0+JB5KS3cLQGe_koo=bu2s2CucHXS098xYAoQ@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 29 Jun 2020 20:08:02 -0700
Message-ID: <CABcZeBM7dZTm-_mi6+pPE2_OW=EH3pN4siHe1TXy6JfXW6H-jA@mail.gmail.com>
To: Daniel Migault <mglt.ietf@gmail.com>
Cc: Paul Vixie <paul@redbarn.org>, Michael Richardson <mcr+ietf@sandelman.ca>, ADD Mailing list <add@ietf.org>, John R Levine <johnl@taugh.com>
Content-Type: multipart/alternative; boundary="000000000000ecb73405a9447dcd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/sufOeVrFG32mkaDaGR1NdR04Aew>
Subject: Re: [Add] [Ext] Draft Posting: CNAME Discovery of Local DoH Resolvers
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jun 2020 03:08:44 -0000

On Mon, Jun 29, 2020 at 8:05 PM Daniel Migault <mglt.ietf@gmail.com> wrote:

> If the lookup takes as input the IP addresses or something provided by the
> ISP (like the local resolver IP address), the resulting chain is likely to
> be from the ISP. DNSSEC is needed to assert it.
>

Why do you assume that the IP is delivered securely?


Another way would be to be able to display example.com. The user should be
> able to see how the domain is associated to the ISP it has subscribed to or
> if it is being redirected to a cloud provider.  DNSSEC would make sur
> the corresponding IP address - as well as other information - are bound to
> the displayed domain.
>

At this point, why would I need DNSSEC? I could just use the WebPKI.

-Ekr


>> I could of course be wrong about this. If you believe I am, I would
>> encourage you to describe the entire discovery chain and where you believe
>> DNSSEC acts to prevent attack.
>>
>> -Ekr
>>
>>
>
> --
> Daniel Migault
> Ericsson
>