[dns-privacy] Fwd: Opportunistic encryption between recursive and authoritative servers

James <james.ietf@gmail.com> Sat, 12 September 2020 13:19 UTC

Return-Path: <james.ietf@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB1B73A0A7D for <dns-privacy@ietfa.amsl.com>; Sat, 12 Sep 2020 06:19:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xlw8yRhDeqP5 for <dns-privacy@ietfa.amsl.com>; Sat, 12 Sep 2020 06:19:38 -0700 (PDT)
Received: from mail-io1-xd31.google.com (mail-io1-xd31.google.com [IPv6:2607:f8b0:4864:20::d31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35AD33A0A7B for <dns-privacy@ietf.org>; Sat, 12 Sep 2020 06:19:38 -0700 (PDT)
Received: by mail-io1-xd31.google.com with SMTP id r9so14009528ioa.2 for <dns-privacy@ietf.org>; Sat, 12 Sep 2020 06:19:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=bVZTndlOeARc6GN23OL8soSqZSj3rEn4LFtCLcTZpUo=; b=bb7vFG9+f++IY4bLQJiiy+FJWFDqMdT7iqxXAYZqRxDpVfjYqA+EvryeTqfxAo/DLE v3zKxO5xKxj0pUBqIAl8qikYjEGViyQJakat/BRHlBqJFiqtpFFc30HyQ9IxXZG0c7VN Bc2L7YPUQ/p9rNZPfvtLWu/MW5oLpZ5sAKhZaUviPMwq58FdFvGmpuRJAmfFnO5R0uLi Mo5Rf00yTeesAJfZ5RXj2tF4pYhevgVkjuwUckqwK01PVVScTaItNhNuz725R6ssmwb9 uXzQqcxc5/0MLq15buxipW+B+1Gnj4gVr3n1qccnD1lh6y2+Pt5kjfwELuve12GCIbkL Gm0g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=bVZTndlOeARc6GN23OL8soSqZSj3rEn4LFtCLcTZpUo=; b=rkkCBztM1Od0x72QlwFQQuYvzTBigp/iyIFHesqnn9hmULbYghRRaMUojc5GZ27xlx SxsY+ehArDFeGIHOArTLB/iIG91ZQ2n+1Ep+g1cUuhVrR8XtOY6IpydhZ68vPMPDs8Nq GztvvDEl6JoKg/XCB2KISJb+3vtdfZqtRmvI/Rcob5qmueWIPEqpFfN+WGgDDdxO01yU 3mQ3zuOoEWPpQ0qUysJHE/hjKtOopOPm2X4vIB16db4F/Fayxz1LB4M6NdHYcmdd4lhm iHdCCFeROW8ztqHD8UcP11I++A7Sk3+jOkfzY0mERBRBvtJJ8h9fyj5sQw79oCN62qRH 0mGg==
X-Gm-Message-State: AOAM532mcfE5zckzJvQWc2pYftVwGqydkPIGsqWRqsrd4003cTlwY4H6 nGFrkenVV7BOuDjZVY8jZWTqJj9xmNUzrnc18edgvar0sQQ=
X-Google-Smtp-Source: ABdhPJygfrhsygWS0oY6wHzM5IyZCrcSkLQxCpkizWBunFtM2QPZHWaEhAVDzaEmOK6G03A/RCPSxhqTud1xc8gIr/Y=
X-Received: by 2002:a05:6602:2b13:: with SMTP id p19mr5524017iov.30.1599916777213; Sat, 12 Sep 2020 06:19:37 -0700 (PDT)
MIME-Version: 1.0
References: <BBA7E731-34C9-47C8-B584-7781DD7F4A59@icann.org> <CAO+dDx=Ey=EXU3TWOF6Xydh7y-7okjSGpciWRgHUjdyYauGz0A@mail.gmail.com>
In-Reply-To: <CAO+dDx=Ey=EXU3TWOF6Xydh7y-7okjSGpciWRgHUjdyYauGz0A@mail.gmail.com>
From: James <james.ietf@gmail.com>
Date: Sat, 12 Sep 2020 15:19:26 +0200
Message-ID: <CAO+dDxktjyT6_R-vBkR4rPD6Yb=Tg0ci3wTur0gz7n9FovfHKQ@mail.gmail.com>
To: dns-privacy@ietf.org
Content-Type: multipart/alternative; boundary="0000000000002d158a05af1da797"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/5oyl6dCoYv06kOIKpEeyaxVwFas>
Subject: [dns-privacy] Fwd: Opportunistic encryption between recursive and authoritative servers
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Sep 2020 13:19:40 -0000

(resending this to the list, apologies Paul)

Thank you for writing this draft. Just two observations:

1. The absence of protocol agility bothers me - whilst I do not think the
use case described in this document lends to DoH in particular being
suitable, DoQUIC and not-yet-existent protocols could also be applicable.
Is there any reason besides simplicity you didn't consider using the ALPN
as identifier?

2. I disagree on the points around authentication and section 2 could be
updated to better encourage adopters to implement matching TLSA records for
the certificate they present during the TLS handshake - with a clear
statement that recursives are not required to query this record type before
TLS negotiation, nor explicitly fail if it mismatches.

- J

On Fri, 11 Sep 2020 at 22:39, Paul Hoffman <paul.hoffman@icann.org> wrote:

> Greetings. The discussion of encrypting the recursive to authoritative
> traffic keeps getting bogged down due to lack of use cases. Puneet and I
> would like to propose a specific use case (the desire to encrypt much more
> traffic, even if there could be an active attacker in the middle). With
> that in mind, we wrote up <
> https://tools.ietf.org/html/draft-pp-recursive-authoritative-opportunistic>.
> The abstract says:
>   This document describes a method for a DNS recursive resolver to use
>   opportunistic encryption when communicating with authoritative
>   servers.  The method here is optional for both the recursive resolver
>   and the authoritative server.  A motivating use case for this method
>   is that more encryption on the Internet is better, and opportunistic
>   encryption is better than no encryption at all.  Nothing in this
>   method prevents use cases that require better encryption.
>
> We would like DPRIVE to adopt this, and we are open to suggestions on how
> to improve the protocol.
>
> --Paul Hoffman_______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy
>