[dns-privacy] Fwd: Opportunistic encryption between recursive and authoritative servers
James <james.ietf@gmail.com> Sat, 12 September 2020 13:19 UTC
Return-Path: <james.ietf@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB1B73A0A7D for <dns-privacy@ietfa.amsl.com>; Sat, 12 Sep 2020 06:19:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xlw8yRhDeqP5 for <dns-privacy@ietfa.amsl.com>; Sat, 12 Sep 2020 06:19:38 -0700 (PDT)
Received: from mail-io1-xd31.google.com (mail-io1-xd31.google.com [IPv6:2607:f8b0:4864:20::d31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35AD33A0A7B for <dns-privacy@ietf.org>; Sat, 12 Sep 2020 06:19:38 -0700 (PDT)
Received: by mail-io1-xd31.google.com with SMTP id r9so14009528ioa.2 for <dns-privacy@ietf.org>; Sat, 12 Sep 2020 06:19:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=bVZTndlOeARc6GN23OL8soSqZSj3rEn4LFtCLcTZpUo=; b=bb7vFG9+f++IY4bLQJiiy+FJWFDqMdT7iqxXAYZqRxDpVfjYqA+EvryeTqfxAo/DLE v3zKxO5xKxj0pUBqIAl8qikYjEGViyQJakat/BRHlBqJFiqtpFFc30HyQ9IxXZG0c7VN Bc2L7YPUQ/p9rNZPfvtLWu/MW5oLpZ5sAKhZaUviPMwq58FdFvGmpuRJAmfFnO5R0uLi Mo5Rf00yTeesAJfZ5RXj2tF4pYhevgVkjuwUckqwK01PVVScTaItNhNuz725R6ssmwb9 uXzQqcxc5/0MLq15buxipW+B+1Gnj4gVr3n1qccnD1lh6y2+Pt5kjfwELuve12GCIbkL Gm0g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=bVZTndlOeARc6GN23OL8soSqZSj3rEn4LFtCLcTZpUo=; b=rkkCBztM1Od0x72QlwFQQuYvzTBigp/iyIFHesqnn9hmULbYghRRaMUojc5GZ27xlx SxsY+ehArDFeGIHOArTLB/iIG91ZQ2n+1Ep+g1cUuhVrR8XtOY6IpydhZ68vPMPDs8Nq GztvvDEl6JoKg/XCB2KISJb+3vtdfZqtRmvI/Rcob5qmueWIPEqpFfN+WGgDDdxO01yU 3mQ3zuOoEWPpQ0qUysJHE/hjKtOopOPm2X4vIB16db4F/Fayxz1LB4M6NdHYcmdd4lhm iHdCCFeROW8ztqHD8UcP11I++A7Sk3+jOkfzY0mERBRBvtJJ8h9fyj5sQw79oCN62qRH 0mGg==
X-Gm-Message-State: AOAM532mcfE5zckzJvQWc2pYftVwGqydkPIGsqWRqsrd4003cTlwY4H6 nGFrkenVV7BOuDjZVY8jZWTqJj9xmNUzrnc18edgvar0sQQ=
X-Google-Smtp-Source: ABdhPJygfrhsygWS0oY6wHzM5IyZCrcSkLQxCpkizWBunFtM2QPZHWaEhAVDzaEmOK6G03A/RCPSxhqTud1xc8gIr/Y=
X-Received: by 2002:a05:6602:2b13:: with SMTP id p19mr5524017iov.30.1599916777213; Sat, 12 Sep 2020 06:19:37 -0700 (PDT)
MIME-Version: 1.0
References: <BBA7E731-34C9-47C8-B584-7781DD7F4A59@icann.org> <CAO+dDx=Ey=EXU3TWOF6Xydh7y-7okjSGpciWRgHUjdyYauGz0A@mail.gmail.com>
In-Reply-To: <CAO+dDx=Ey=EXU3TWOF6Xydh7y-7okjSGpciWRgHUjdyYauGz0A@mail.gmail.com>
From: James <james.ietf@gmail.com>
Date: Sat, 12 Sep 2020 15:19:26 +0200
Message-ID: <CAO+dDxktjyT6_R-vBkR4rPD6Yb=Tg0ci3wTur0gz7n9FovfHKQ@mail.gmail.com>
To: dns-privacy@ietf.org
Content-Type: multipart/alternative; boundary="0000000000002d158a05af1da797"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/5oyl6dCoYv06kOIKpEeyaxVwFas>
Subject: [dns-privacy] Fwd: Opportunistic encryption between recursive and authoritative servers
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Sep 2020 13:19:40 -0000
(resending this to the list, apologies Paul) Thank you for writing this draft. Just two observations: 1. The absence of protocol agility bothers me - whilst I do not think the use case described in this document lends to DoH in particular being suitable, DoQUIC and not-yet-existent protocols could also be applicable. Is there any reason besides simplicity you didn't consider using the ALPN as identifier? 2. I disagree on the points around authentication and section 2 could be updated to better encourage adopters to implement matching TLSA records for the certificate they present during the TLS handshake - with a clear statement that recursives are not required to query this record type before TLS negotiation, nor explicitly fail if it mismatches. - J On Fri, 11 Sep 2020 at 22:39, Paul Hoffman <paul.hoffman@icann.org> wrote: > Greetings. The discussion of encrypting the recursive to authoritative > traffic keeps getting bogged down due to lack of use cases. Puneet and I > would like to propose a specific use case (the desire to encrypt much more > traffic, even if there could be an active attacker in the middle). With > that in mind, we wrote up < > https://tools.ietf.org/html/draft-pp-recursive-authoritative-opportunistic>. > The abstract says: > This document describes a method for a DNS recursive resolver to use > opportunistic encryption when communicating with authoritative > servers. The method here is optional for both the recursive resolver > and the authoritative server. A motivating use case for this method > is that more encryption on the Internet is better, and opportunistic > encryption is better than no encryption at all. Nothing in this > method prevents use cases that require better encryption. > > We would like DPRIVE to adopt this, and we are open to suggestions on how > to improve the protocol. > > --Paul Hoffman_______________________________________________ > dns-privacy mailing list > dns-privacy@ietf.org > https://www.ietf.org/mailman/listinfo/dns-privacy >
- [dns-privacy] Opportunistic encryption between re… Paul Hoffman
- Re: [dns-privacy] Opportunistic encryption betwee… Paul Wouters
- Re: [dns-privacy] [Ext] Opportunistic encryption … Paul Hoffman
- Re: [dns-privacy] [Ext] Opportunistic encryption … Paul Wouters
- [dns-privacy] Fwd: Opportunistic encryption betwe… James
- Re: [dns-privacy] [Ext] Fwd: Opportunistic encryp… Paul Hoffman
- Re: [dns-privacy] [Ext] Opportunistic encryption … Geoff Huston
- Re: [dns-privacy] [Ext] Fwd: Opportunistic encryp… Eric Rescorla
- Re: [dns-privacy] [Ext] Opportunistic encryption … Brian Hartvigsen (bhartvig)