Re: [core] DNS-SD service types for CoRE-RD (Re: AD review of draft-ietf-core-resource-directory-23)

Christian Amsüss <christian@amsuess.com> Mon, 02 March 2020 14:57 UTC

Return-Path: <christian@amsuess.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 329ED3A0837 for <core@ietfa.amsl.com>; Mon, 2 Mar 2020 06:57:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mjh71ljPKVcN for <core@ietfa.amsl.com>; Mon, 2 Mar 2020 06:57:04 -0800 (PST)
Received: from prometheus.amsuess.com (prometheus.amsuess.com [5.9.147.112]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0ECD3A0830 for <core@ietf.org>; Mon, 2 Mar 2020 06:57:04 -0800 (PST)
Received: from poseidon-mailhub.amsuess.com (unknown [IPv6:2a02:b18:c13b:8010:a800:ff:fede:b1bd]) by prometheus.amsuess.com (Postfix) with ESMTPS id F35AF4011B; Mon, 2 Mar 2020 15:57:01 +0100 (CET)
Received: from poseidon-mailbox.amsuess.com (unknown [IPv6:2a02:b18:c13b:8010:a800:ff:fede:b1bf]) by poseidon-mailhub.amsuess.com (Postfix) with ESMTP id AE05CDB; Mon, 2 Mar 2020 15:57:00 +0100 (CET)
Received: from hephaistos.amsuess.com (unknown [IPv6:2a02:b18:c13b:8010:3c16:5e58:e95c:9d90]) by poseidon-mailbox.amsuess.com (Postfix) with ESMTPSA id 4291C37; Mon, 2 Mar 2020 15:57:00 +0100 (CET)
Received: (nullmailer pid 586226 invoked by uid 1000); Mon, 02 Mar 2020 14:55:39 -0000
Date: Mon, 02 Mar 2020 15:55:39 +0100
From: Christian Amsüss <christian@amsuess.com>
To: "core@ietf.org" <core@ietf.org>
Message-ID: <20200302145539.GA568382@hephaistos.amsuess.com>
References: <481f9820-bcea-af6a-d5c4-d713be24d43d@isode.com> <20191119125733.GA8007@hephaistos.amsuess.com> <c29e70d4-7d81-4c89-ad81-62a6132fb3df@www.fastmail.com> <4C059F03-BB42-498D-9B75-A08BEA274416@tzi.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="gBBFr7Ir9EOA20Yy"
Content-Disposition: inline
In-Reply-To: <4C059F03-BB42-498D-9B75-A08BEA274416@tzi.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/qorPuvIiYgvKi8mXR4tHq72pARI>
Subject: Re: [core] DNS-SD service types for CoRE-RD (Re: AD review of draft-ietf-core-resource-directory-23)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Mar 2020 14:57:06 -0000

Hello group,
hello Carsten,

On Mon, Dec 09, 2019 at 09:34:29PM +0100, Carsten Bormann wrote:
> In the meeting, I gave the three examples _core-rd._udp,
> _core-rd-tls._udp, and _core-rd._tcp — noting that while core-rd is a
> proper RD service type, core-rd-tls isn’t.  To cover the six
> transports we have for CoAP today (coap, coaps, coap+tcp, coaps+tcp,
> coap+ws, coaps+ws), we would need four service types on top of _tcp
> and could use two of them over _udp?

Do we have a meaningful way to deal with (D)TLS in DNS-SD at all? I'm
only superficially familiar with the verification steps done on the host
name, but as I understand, TLS typically authenticates the host name.

If the client is configured to register at any RD in the current domain,
it'd receive a

_core-rd-dtls._udp.example.com IN SRV 1 1 5683 rd1.example.com

When it connects, the server would present a certificate for
rd1.example.com without any indication that it's a legitimate
_core-rd-dtls._udp.example.com.

Is there a document that bridges that gap in a usable manner that we can
point to for security considerations? Otherwise I'd rather leave the
TLSs out of here. (Alternatively, we could describe them as opportunistic
encryption.)

Kind regards
Christian

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom