Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

Paul Wouters <paul@nohats.ca> Tue, 26 May 2020 13:41 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1A113A0F62 for <dns-privacy@ietfa.amsl.com>; Tue, 26 May 2020 06:41:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iBuUOHpeHoPt for <dns-privacy@ietfa.amsl.com>; Tue, 26 May 2020 06:41:22 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F03DB3A1083 for <dns-privacy@ietf.org>; Tue, 26 May 2020 06:40:41 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 49WZpv1P52zLf6; Tue, 26 May 2020 15:40:39 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1590500439; bh=K9glpAAW2dU7QaC1di4UgC+bE9MR9NPb0ywrFV8LPd0=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=XiLEs1CITejhPtVAgdXJaTVPUZMDZ78+JIuhZgBZg60+P096kiu+vhPbGyiAi4kPd 3A6ywq1ST6cX0QZ6TBr8tn6x+H8aavZxEX+UPQD2j52k31Q938xc0xGKZ6vvb6CbzQ EpieTSxBE2NgR490Qxtg577mjseZzU+1oHSF+bzI=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id GHRjuXeKHN43; Tue, 26 May 2020 15:40:37 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 26 May 2020 15:40:37 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 008456029B99; Tue, 26 May 2020 09:40:36 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id F0E1F66B7C; Tue, 26 May 2020 09:40:36 -0400 (EDT)
Date: Tue, 26 May 2020 09:40:36 -0400
From: Paul Wouters <paul@nohats.ca>
To: Peter van Dijk <peter.van.dijk@powerdns.com>
cc: dns-privacy@ietf.org
In-Reply-To: <aa745f51e4b7fd0955ae9e444416772b32c75dbf.camel@powerdns.com>
Message-ID: <alpine.LRH.2.21.2005260933520.27601@bofh.nohats.ca>
References: <158987990316.29446.4343920282978207647@ietfa.amsl.com> <a15e2d1df86820f2483516662d3712d8a60161cd.camel@powerdns.com> <alpine.LRH.2.21.2005191134560.13722@bofh.nohats.ca> <ec6bc9248179a9ab56ea490f82b14c7e90ffe819.camel@powerdns.com> <alpine.LRH.2.21.2005241222410.4172@bofh.nohats.ca> <36E4371F-BCBE-43F7-9D4B-8439B3FF1D2A@isc.org> <aa745f51e4b7fd0955ae9e444416772b32c75dbf.camel@powerdns.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/6j2oLvO_8TC64nTxpXRclw1QpaE>
Subject: Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 13:41:28 -0000

On Tue, 26 May 2020, Peter van Dijk wrote:

>> So, while my first though was same as Paul’s - this is abuse…  I came to
>> conclusion, it actually isn’t.
>> 
>> That said - I think this needs some modifications:
>> 
>> 1. Bit 7 of the Flags fields needs to be 0.
>
> Definitely - it is not explicit but the examples in draft -00, and the
> PoC code, all use 0 for the flags.

> earlier that whatever flags we might need, it's definitely *not* ZONE
> and SEP.

Now I am all confused again.

I thought my initial reading this was stored inside a DNSKEY was wrong
and things are actually stored in a DS digest. And DS records do not
have flags of the DNSKEY, so why are we talking again about DNSKEY
flags?

                      1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |           key tag             |  algorithm    |  Digest type  |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                digest  (length depends on type)               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                (SHA-1 digest is 20 bytes)                     |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


We just have the algorithm which would be set to some special value
of "this is not really a hash(DNSKEY)". I dont know what you will use for
keytag. The digest type would also be some strange number meaning
"not really a DNSKEY digest".

So why talk about DNSKEY flags? Where do these appear in the proposal?

If you want the child to confirm the special record in its parent,
then _really_ you should use only CDS, mirroring the exact binary
blob of the parent, and not CDNSKEY/DNSKEY. Why make life harder
by needing to stuff square things into round boxes twice instead of
once?

Paul