Re: [dns-privacy] [Ext] Revised opportunistic encryption draft

Brian Dickson <brian.peter.dickson@gmail.com> Sun, 15 November 2020 20:41 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED7FB3A03AA for <dns-privacy@ietfa.amsl.com>; Sun, 15 Nov 2020 12:41:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 42znIQ0GddPt for <dns-privacy@ietfa.amsl.com>; Sun, 15 Nov 2020 12:41:03 -0800 (PST)
Received: from mail-vs1-xe2c.google.com (mail-vs1-xe2c.google.com [IPv6:2607:f8b0:4864:20::e2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DBD253A0420 for <dprive@ietf.org>; Sun, 15 Nov 2020 12:41:02 -0800 (PST)
Received: by mail-vs1-xe2c.google.com with SMTP id z123so8104096vsb.0 for <dprive@ietf.org>; Sun, 15 Nov 2020 12:41:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cscpLNGM9sdmbV9wJNEIX8NVzM/MTIofGDv+xOjiPfs=; b=pVyzy5WYsVEIDSmVqtQcjve0z6OJxtqFuec0cVdlSTaPGgsjTAhBwzsNqgZjk3K3IS xztEQuFPicx7J8G2bf4HAlbPZN5bBonBmziNXsnvOO3/9MOD8FwVD/m7OCdb7jcHijll ibip0G47cV28jFyMwYSI7WlobIsB3IWRpHRbxkYddkagpm2uS/suWwIa5Qr6ljLdRbBT T9N6RbkBIQDIkj8i/7+qnjMTXePAfu56Ys6vohnYgbqF4hsui7+IE5EomprZB9sS/buE 4kcYpPh0pSe5Dg0UhjB3xJS1EpSfFVV7uvarqRPGvLhSEMu1qDkN0DESJMqXUl3w6y2c 1f9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cscpLNGM9sdmbV9wJNEIX8NVzM/MTIofGDv+xOjiPfs=; b=arRwamei9bG74+x7u+3c0CjFGk713AXPr7WKXp4GlEQUgdsZS0COf0pFySV+RuCeHt 7rGRFh3QoUwXJuVZz5fywGd06zMM0QsTPl8o3TkR6fvcKNRCThqG1ClmIt39wg3Obzfv AQ0aPAJ1KntbXzHSbljKf5/XzxSJgYU39BzbYzUbdk9hXNFfxKGNQX8jCz/s595dPsfj agqzu49GVdlj44fi6f+ETkn5rP9rA31JvU5grnVKVaXII5IQl7ymh5BZQbvoait9Bp2R LyNPiaPjSWmgc67535XVL5dM0R+U6BcFmP2QdrEhV3roCyhYuHmc7p0X5AaG1TtSiGEh 2tUA==
X-Gm-Message-State: AOAM532UXgBuIqmgWmt7dT4SKn0GJ4rrNO93yu/15Lv0n8Vs8Ymrdtls 5RGVhIbJjf1GGkvlA1fVK5TvLn0f+1NcQTdTHDJI5485XD8=
X-Google-Smtp-Source: ABdhPJx8AZWlJQk72SeGrEDBomnxjbF71nKn3BPa4ifYrdzXCeBCn0kCNWC11VJIEEGcpJ+RUB/V+8W22VThXkAmq9s=
X-Received: by 2002:a67:8c5:: with SMTP id 188mr6529936vsi.1.1605472861727; Sun, 15 Nov 2020 12:41:01 -0800 (PST)
MIME-Version: 1.0
References: <C0CBEBC5-D28A-46C0-AE50-078710015466@icann.org> <alpine.LRH.2.23.451.2010301202350.2587497@bofh.nohats.ca> <2444B21B-9465-4A5B-97CC-AF809309300A@icann.org> <CABcZeBPZFY9aQ5Nb0q_4uTMFRbY3-S2rus4vaeLaUmvU+h_ftg@mail.gmail.com> <2D07CBD0-30CE-418E-AD05-02E0A5EDB79F@icann.org> <CABcZeBNdNnyjzk0mOtfix=OvVTEpPzegEw_V5QfKvYtkFV+zOw@mail.gmail.com> <CAH1iCirz27EoahrYE8z9AV=Cf=A-i=iPP1deOYPWO8_k1mL+XA@mail.gmail.com> <27ddd3bde1ea11c857a96346b6f4ba5aa8b1d92f.camel@powerdns.com>
In-Reply-To: <27ddd3bde1ea11c857a96346b6f4ba5aa8b1d92f.camel@powerdns.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
Date: Sun, 15 Nov 2020 12:40:50 -0800
Message-ID: <CAH1iCipYL6fujSLur6OsoPq3ACv-uOFGFOzks0oij-97gTfp6A@mail.gmail.com>
To: Peter van Dijk <peter.van.dijk@powerdns.com>
Cc: "dprive@ietf.org" <dprive@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000009eae3d05b42b47aa"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/4vIWkijJRpWxvzzT8cKkIDfaxc4>
Subject: Re: [dns-privacy] [Ext] Revised opportunistic encryption draft
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Nov 2020 20:41:09 -0000

On Sun, Nov 15, 2020 at 6:08 AM Peter van Dijk <peter.van.dijk@powerdns.com>
wrote:

> On Sat, 2020-10-31 at 13:52 -0700, Brian Dickson wrote:
> > The most unambiguous signal possible, is the presence of a TLSA record
> on _853._tcp.<NS_name>.
>
> That's quite a far reaching statement, and I believe it likely to be
> wrong.
>
>
I think we can move this part of the discussion to the larger
thread/document started by Tony Finch.


> > Using NS names in a separate zone or zones (for each DNS operator) is
> scalable, and facilitates DNSSEC signing, at little to no incremental cost
> and little to no operational complexity
>
> The incremental cost for a resolver (doing a full resolution process
> for the TLSA records of one or more NS names) is not small, and neither
> are the latency costs. For 'popular' name servers, this cost can mostly
> be amortised, leaving the penalty with any domain hosted on a NSset
> that only has a few domains.
>

Okay, so my statement implied "to the operator of the name server(s)", not
the resolvers.

Resolver operators need to make their own decisions on whether to offer
privacy services, including whether there are any limits on which authority
servers they implement those privacy services towards.

I don't believe anyone has stated that there would not be any latency cost
or other cost (e.g. compute) for privacy services.

So, IMHO, any discussion on those costs needs to be done in relation to the
other attributes, such as "correctness" of the proposal.
Correctness would involve things like:

   - accommodating multiple server operators with different privacy
   settings (yes/no)
   - anycast dns server addresses where specific anycast instances may have
   different privacy settings (yes/no)
   - ability to differentiate privacy settings at a zone level via some
   mechanism
   - correct source of truth for privacy settings (i.e. must be the dns
   server operator, not the zone owner, to be the actual source of truth)
      - A clear example of the reason this source of truth is required, can
      be seen in the problem with NS records configured by the zone
owner rather
      than the DNS server operator: lame delegations.
   - cost to authoritative server operators (and scalability)

Again, this discussion should proceed in the other thread (Tony Finch's).


>
> > Using TLSA records at _853._tcp.<NS_NAME> in a signed zone provides an
> unambiguous signal to use optionally TLSA, in a downgrade-resistant manner.
>
> Not downgrade-resistant, until NS names in delegations become signed.
>

That's a moot point.
TLSA records MUST be signed, and the TLSA RFC makes this very clear: RFC
6698 section 4.1 (Determining whether a TLSA RRSet can be used MUST be
based on the

   DNSSEC validation state (as defined in [RFC4033
<https://tools.ietf.org/html/rfc4033>]).


So, downgrade-resistant, period. (Use of TLSA presupposes signed, in
other words.)



> (I proposed some solutions for that in other threads; Fujiwara has
> [independently, I think] now written a draft resembling one of those
> solutions
>
> https://datatracker.ietf.org/doc/draft-fujiwara-dnsop-delegation-information-signer/?include_text=1
> )
>
> Kind regards,
> --
> Peter van Dijk
> PowerDNS.COM BV - https://www.powerdns.com/
>
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy
>