Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

Ondřej Surý <ondrej@isc.org> Tue, 26 May 2020 07:11 UTC

Return-Path: <ondrej@isc.org>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D8923A0C3E for <dns-privacy@ietfa.amsl.com>; Tue, 26 May 2020 00:11:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j3eOZvKbXtxj for <dns-privacy@ietfa.amsl.com>; Tue, 26 May 2020 00:10:57 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50D473A0C03 for <dns-privacy@ietf.org>; Tue, 26 May 2020 00:10:57 -0700 (PDT)
Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id 15CBE3AB002; Tue, 26 May 2020 07:10:57 +0000 (UTC)
Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id 076A8160050; Tue, 26 May 2020 07:10:57 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id ECCA5160048; Tue, 26 May 2020 07:10:56 +0000 (UTC)
Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id wTVe4T8ZkbCn; Tue, 26 May 2020 07:10:56 +0000 (UTC)
Received: from [10.10.11.185] (adria.kvarteto.net [82.113.55.18]) by zmx1.isc.org (Postfix) with ESMTPSA id 24986160044; Tue, 26 May 2020 07:10:55 +0000 (UTC)
From: Ondřej Surý <ondrej@isc.org>
Message-Id: <36E4371F-BCBE-43F7-9D4B-8439B3FF1D2A@isc.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_F37AADD5-6E31-4B39-97E1-6A2940D23705"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Date: Tue, 26 May 2020 09:10:52 +0200
In-Reply-To: <alpine.LRH.2.21.2005241222410.4172@bofh.nohats.ca>
Cc: Peter van Dijk <peter.van.dijk@powerdns.com>, dns-privacy@ietf.org
To: Paul Wouters <paul@nohats.ca>
References: <158987990316.29446.4343920282978207647@ietfa.amsl.com> <a15e2d1df86820f2483516662d3712d8a60161cd.camel@powerdns.com> <alpine.LRH.2.21.2005191134560.13722@bofh.nohats.ca> <ec6bc9248179a9ab56ea490f82b14c7e90ffe819.camel@powerdns.com> <alpine.LRH.2.21.2005241222410.4172@bofh.nohats.ca>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/4vA6YkQaZiAab2-X6f2_itJeHeA>
Subject: Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 07:11:02 -0000

Hi Peter and Paul,

> On 24 May 2020, at 19:43, Paul Wouters <paul@nohats.ca> wrote:
> 
> But I don't think your current solution is satisfactory either. It is
> basically the same thing we told djb about dnscurve - you cannot abuse
> an RRtype for something else. Whether you put a pubkey in the NS record
> LHS, or a TLS key inside a DNSKEY - you are abusing the RRtype system.
> 
> But I also don't see the gains of abusing DNSKEY, because you already
> need to query the DNSKEY of the domain to get the pesudeo-DNSKEY key,
> and then you already lost your privacy.

So, the RFC4034 has to say something about DNSKEY:

>    Bit 7 of the Flags field is the Zone Key flag.  If bit 7 has value 1,
>    then the DNSKEY record holds a DNS zone key, and the DNSKEY RR's
>    owner name MUST be the name of a zone.  If bit 7 has value 0, then
>    the DNSKEY record holds some other type of DNS public key and MUST
>    NOT be used to verify RRSIGs that cover RRsets.

and also:

>    The DNSKEY RR is not intended as a record for storing arbitrary
>    public keys and MUST NOT be used to store certificates or public keys
>    that do not directly relate to the DNS infrastructure.

So, while my first though was same as Paul’s - this is abuse…  I came to
conclusion, it actually isn’t.

That said - I think this needs some modifications:

1. Bit 7 of the Flags fields needs to be 0.

2. This needs a new Protocol number

3. And since we now have non-„DNS zone key“ with a different protocol we might get a separate IANA registry for the algorithms (if needed).

I think only then it won’t feel like an abuse of the protocol.

Cheers,
Ondrej
--
Ondřej Surý
ondrej@isc.org