Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt

Hosnieh Rafiee <hosnieh.rafiee@huawei.com> Wed, 20 August 2014 15:39 UTC

Return-Path: <hosnieh.rafiee@huawei.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2F631A0AD7 for <dns-privacy@ietfa.amsl.com>; Wed, 20 Aug 2014 08:39:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.869
X-Spam-Level:
X-Spam-Status: No, score=-4.869 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.668, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bp-6uEJ2yWVx for <dns-privacy@ietfa.amsl.com>; Wed, 20 Aug 2014 08:39:11 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29F501A0718 for <dns-privacy@ietf.org>; Wed, 20 Aug 2014 08:38:51 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BIL39119; Wed, 20 Aug 2014 15:38:46 +0000 (GMT)
Received: from LHREML513-MBB.china.huawei.com ([fe80::b810:863:a57e:3ff]) by lhreml403-hub.china.huawei.com ([::1]) with mapi id 14.03.0158.001; Wed, 20 Aug 2014 16:38:41 +0100
From: Hosnieh Rafiee <hosnieh.rafiee@huawei.com>
To: Andrew Sullivan <ajs@anvilwalrusden.com>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>
Thread-Topic: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt
Thread-Index: Ac+75MgogK9rLesYRS6TfLkL0S8e/gAEyMDwACDmrYAAAikkgP///FwA///ua1A=
Date: Wed, 20 Aug 2014 15:38:41 +0000
Message-ID: <814D0BFB77D95844A01CA29B44CBF8A7A285FA@lhreml513-mbb.china.huawei.com>
References: <00ba01cfbbf9$d561f010$8025d030$@rozanak.com> <20140820143453.GD1065@mx1.yitter.info> <814D0BFB77D95844A01CA29B44CBF8A7A28554@lhreml513-mbb.china.huawei.com> <20140820152343.GH1065@mx1.yitter.info>
In-Reply-To: <20140820152343.GH1065@mx1.yitter.info>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.221.82.100]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/dns-privacy/42EBIUcI1OA7-twbbdMCWzelTOQ
Subject: Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 15:39:16 -0000

> 
> > I provided several reason that the observer doesn't exist.
> 
> No, you provided several reasons why you think this decision is an
> unreasonable one.  Prior to the evidence from a couple years ago that
> national governments were doing wide-spread vacuuming up of everything
> they could by perfoming passive attack through the means of tapping
> lines and so on, the position you are taking was entirely reasonable.
> But in the face of that evidence, some people have decided that, even
> if they can't protect themselves reliably all the time, they get enough
> marginal benefit from privacy to do it whenever they can, even if it's
> not perfect and not terribly hard to subvert.
> 
> In other words, you are basically arguing that the benefit that will
> accrue from this technique is not enough given the costs.  Others
> disagree with you.  Your argument only works if we accept your premise
> that the benefit is not worth the cost; if we evaluate the benefit
> differently, then the cost might be acceptable.

True. Because the people who you are scaring from to eavesdrop the communication already know how you want to process this...

To be clear... IF this approach wasn't public and not known, then you might benefit from it but when something is public and known, what you would do as an attacker? Do you still wait in a hope of receiving plain text information or easily change your role to a resolver and receive information you want as it is not hard to detect.

So in long term there is no benefit to use encryption without authentication in resolver scenario.  


> > What I tried to explain here is that an observer role doesn't make
> sense in resolver scenario.
> 
> Except that we have an existence proof that it does.

It really doesn't... at least in this scenario. Why? Because this approach would be standard and well known... So, if anyone (or the whom you're talking about) before played the observer role now they would change their role because they are still interested to receive your data and your node is unable to detect this interceptions since whatever resolver you use is valid by your node either a fake resolver or a real resolver.


> > DNSSEC just came to this game when some folks say that DNSSEC can
> protect this and they only need encryption.
> 
> If you had strong authentication of the resolver, then this would be
> true.  Since TSIG (which I expect you remember) or SIG(0) can solve the
> authentication part, then in fact the only thing you would need _is_
> encryption, and then you could rely on the DNSSEC piece as well.
> 

We already know the problem with those approaches and as you said brining DNSSEC to this discussion doesn't make sense..

Best,
Hosnieh