Re: [dns-privacy] [Ext] Authentication in draft-ietf-dprive-opportunistic-adotq

Paul Hoffman <paul.hoffman@icann.org> Wed, 17 February 2021 03:51 UTC

Return-Path: <paul.hoffman@icann.org>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C110D3A0D9A for <dns-privacy@ietfa.amsl.com>; Tue, 16 Feb 2021 19:51:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MHzuuNwD1orc for <dns-privacy@ietfa.amsl.com>; Tue, 16 Feb 2021 19:51:04 -0800 (PST)
Received: from ppa4.dc.icann.org (ppa4.dc.icann.org [192.0.46.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAB213A0C49 for <dprive@ietf.org>; Tue, 16 Feb 2021 19:51:04 -0800 (PST)
Received: from MBX112-W2-CO-2.pexch112.icann.org (out.mail.icann.org [64.78.33.6]) by ppa4.dc.icann.org (8.16.0.42/8.16.0.42) with ESMTPS id 11H3p1xF000897 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 17 Feb 2021 03:51:02 GMT
Received: from MBX112-W2-CO-1.pexch112.icann.org (10.226.41.128) by MBX112-W2-CO-2.pexch112.icann.org (10.226.41.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.721.2; Tue, 16 Feb 2021 19:51:00 -0800
Received: from MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) by MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) with mapi id 15.02.0721.006; Tue, 16 Feb 2021 19:51:00 -0800
From: Paul Hoffman <paul.hoffman@icann.org>
To: Paul Wouters <paul@nohats.ca>
CC: "dprive@ietf.org" <dprive@ietf.org>
Thread-Topic: [Ext] [dns-privacy] Authentication in draft-ietf-dprive-opportunistic-adotq
Thread-Index: AQHXBOAbA+YWWUfMcUex+7/ZTIalsA==
Date: Wed, 17 Feb 2021 03:51:00 +0000
Message-ID: <40106B79-50F1-4D42-B2FE-1AD456DB4FC5@icann.org>
References: <230F580F-BA87-4921-B45B-2909ACE385B1@icann.org> <CABcZeBPcBT0UY-ghaMm_nN+qZ+B0ozmCfK30XX-R05z+PLtqmQ@mail.gmail.com> <137b74ff-887f-056a-74e3-7a80358b5156@cs.tcd.ie> <CABcZeBMyULUznkCVzxb6ufCx1XaT1zKx0jLLwxXhL7hRwMkv+A@mail.gmail.com> <fd132f9d-630e-112d-d777-0e6a7a767e84@cs.tcd.ie> <ff1e6d9-6e66-dadf-2847-3e071b34618@nohats.ca> <664338a9-68d8-5412-9cda-cca569352e13@nohats.ca>
In-Reply-To: <664338a9-68d8-5412-9cda-cca569352e13@nohats.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [192.0.32.234]
x-source-routing-agent: Processed
Content-Type: multipart/signed; boundary="Apple-Mail=_D0796917-1BBF-44CC-965D-23D220C4EFBC"; protocol="application/pkcs7-signature"; micalg="sha-256"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-02-17_01:2021-02-16, 2021-02-17 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/8wx_RVhTRQ47coGGQn5REFrfMRY>
Subject: Re: [dns-privacy] [Ext] Authentication in draft-ietf-dprive-opportunistic-adotq
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Feb 2021 03:51:07 -0000

On Feb 16, 2021, at 6:41 PM, Paul Wouters <paul@nohats.ca> wrote:
> 
> On Mon, 15 Feb 2021, Paul Wouters wrote:
> 
>> Here is a different sentinel:
>> 
>> _53._dns.ns0.example.com. IN TLSA x y z <base64ofCert>
>> 
>> Then do (D)TLS
>> 
>> Now you can choose:
>> 
>> 1) Use DNS(SEC) for validation
>> 2) Use WebPKI[*] for validation
>> 3) TOFU
>> 4) Take at face value
> 
> as PaulH pointed out, the TLSA RFC does not allow one to accept a TLSA
> RRset without DNSSEC signature protection. To allow for deployment
> without DNSSEC, you could instead use the CERT RRtype that has no such
> requirement.

Well, not exactly. (Yes, I said that to PaulW when we were talking, but I was not being precise.)

RFC 6698 both defines the TLSA RRtype and a protocol to use it. The protocol defined in RFC 6698 indeed requires the TLSA record to be validated with DNSSSEC. However, a new protocol, such as one here, could use the TLSA record type in a different protocol, such as the one PaulW has above. The document that defines that protocol would have to be completely clear about what it was doing and why.

--PaulH