Re: [dns-privacy] [Ext] Fwd: New Version Notification for draft-schwartz-dprive-name-signal-00.txt

Paul Hoffman <paul.hoffman@icann.org> Fri, 11 June 2021 01:48 UTC

Return-Path: <paul.hoffman@icann.org>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2F543A2316 for <dns-privacy@ietfa.amsl.com>; Thu, 10 Jun 2021 18:48:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GTpyqluVMwwb for <dns-privacy@ietfa.amsl.com>; Thu, 10 Jun 2021 18:48:40 -0700 (PDT)
Received: from ppa4.dc.icann.org (ppa4.dc.icann.org [192.0.46.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FEA33A2313 for <dprive@ietf.org>; Thu, 10 Jun 2021 18:48:40 -0700 (PDT)
Received: from MBX112-W2-CO-2.pexch112.icann.org (out.mail.icann.org [64.78.33.6]) by ppa4.dc.icann.org (8.16.0.43/8.16.0.43) with ESMTPS id 15B1mcLo019410 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 11 Jun 2021 01:48:39 GMT
Received: from MBX112-W2-CO-1.pexch112.icann.org (10.226.41.128) by MBX112-W2-CO-2.pexch112.icann.org (10.226.41.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.858.12; Thu, 10 Jun 2021 18:48:37 -0700
Received: from MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) by MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) with mapi id 15.02.0858.012; Thu, 10 Jun 2021 18:48:37 -0700
From: Paul Hoffman <paul.hoffman@icann.org>
To: Paul Wouters <paul@nohats.ca>
CC: "dprive@ietf.org" <dprive@ietf.org>
Thread-Topic: [dns-privacy] [Ext] Fwd: New Version Notification for draft-schwartz-dprive-name-signal-00.txt
Thread-Index: AQHXXi1YHkPARjyuyES4VurfDgNBBKsOgMiA
Date: Fri, 11 Jun 2021 01:48:37 +0000
Message-ID: <FCB9F7B7-EF02-4802-B184-C705E974541F@icann.org>
References: <e79ec68203cab16e1f199438208a124e5bbd2b24.camel@powerdns.com> <A3153F94-0D87-4FD1-B802-C87BC4EF6F43@nohats.ca> <F35486C2-02DA-4F7E-804F-CAFEA6EDB967@icann.org> <7690a489-eba7-f97f-5d55-5c124b6580b4@nohats.ca>
In-Reply-To: <7690a489-eba7-f97f-5d55-5c124b6580b4@nohats.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [192.0.47.234]
x-source-routing-agent: Processed
Content-Type: multipart/signed; boundary="Apple-Mail=_25800EBE-C8E0-415D-B139-DF7D33E9FC52"; protocol="application/pkcs7-signature"; micalg=sha-256
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-06-10_14:2021-06-10, 2021-06-10 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/7CntQqdwcJ2KFaEzS-WMe-Ti3R4>
Subject: Re: [dns-privacy] [Ext] Fwd: New Version Notification for draft-schwartz-dprive-name-signal-00.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jun 2021 01:48:45 -0000

On Jun 10, 2021, at 3:17 PM, Paul Wouters <paul@nohats.ca> wrote:
> 
> On Thu, 10 Jun 2021, Paul Hoffman wrote:
> 
>>> I understand the desire but I don’t agree as this signal is insecure, and foresee TLDs abusing this as potential nation state monitor / privacy leak.
>> 
>> Please say more. I don't see how this proposal leaks anything that could not be trivially determined by probing.
> 
> A nationstate could add unsigned NS glue to their zone for domains they
> are interested in and trigger people('s resolvers) to go to "their"
> secure transport IP and do logging.

This is a problem with unsigned NS, not unsigned labels in the name.

> If you use DS, they would at least have to sign for it _and_ you can
> verify the DS via CDS so now such a parent would have to do a lot more
> and leave cryptogrpahic evidence of their efforts.

Is your proposal "DS in parent and matching DNSKEY in the child"?

>>> I still prefer something with DS than can be signed, and validated by the child as their intend via CDS. With transparency monitoring.
>>> 
>>> If we are using overloading, might as well overload securely.
>> 
>> If you write up a draft, I'm happy to send responses to particular statements in the draft. I don't see how such a DS could be specified in a way that would get more than a trivial amount of deployment. I would be happy to be wrong, given that DS is signed in the parent.
> 
> We had several proposals written up. I don't think at this point we need
> more or updated draft text.

What you gave in your eariler is not sufficient for useful analysis, thus not for comparison. See my question above, for example.

--Paul Hoffman