Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

Paul Wouters <paul@nohats.ca> Fri, 29 May 2020 20:36 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 284A83A0B0B for <dns-privacy@ietfa.amsl.com>; Fri, 29 May 2020 13:36:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kVaIB4bl2d4u for <dns-privacy@ietfa.amsl.com>; Fri, 29 May 2020 13:35:58 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 485873A053F for <dns-privacy@ietf.org>; Fri, 29 May 2020 13:35:58 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 49Ybtg487rzFPj; Fri, 29 May 2020 22:35:55 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1590784555; bh=TRaXmVE2tO4oMjnQ1EvCKykQTuBz8LPUJVcoQLSDi98=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=H+wiZPXd9qRVjc0B/m0hc7gkkpj9aE+WB2GiL5b2bfd1kH9wvuZq3YXmuXIk9uJkr Zgzsi+4n9wbSrB6513QHEUtso/53WDOnAocVsOwTX6qRgYwHew6/WyGDj5lh5tvqiU dRSyEMG5fcS8KFWpnxO8xl4VPQyX5VFl1dGxInGM=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id kDVlwpDPLTf3; Fri, 29 May 2020 22:35:53 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Fri, 29 May 2020 22:35:53 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 69AFB6020EE7; Fri, 29 May 2020 16:35:52 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 65A2466B7C; Fri, 29 May 2020 16:35:52 -0400 (EDT)
Date: Fri, 29 May 2020 16:35:52 -0400
From: Paul Wouters <paul@nohats.ca>
To: Peter van Dijk <peter.van.dijk@powerdns.com>
cc: dns-privacy@ietf.org
In-Reply-To: <198f5c9519bb7d406e4a667747d71214a0c8062d.camel@powerdns.com>
Message-ID: <alpine.LRH.2.22.394.2005291628270.28776@bofh.nohats.ca>
References: <158987990316.29446.4343920282978207647@ietfa.amsl.com> <a15e2d1df86820f2483516662d3712d8a60161cd.camel@powerdns.com> <alpine.LRH.2.21.2005191134560.13722@bofh.nohats.ca> <ec6bc9248179a9ab56ea490f82b14c7e90ffe819.camel@powerdns.com> <alpine.LRH.2.21.2005241222410.4172@bofh.nohats.ca> <77f7a9c38c6bd0a059679a7ab3027b4da9005512.camel@powerdns.com> <alpine.LRH.2.21.2005241710490.10453@bofh.nohats.ca> <5653e4dd2ab6daa648387808a3ac04e088bbc89b.camel@powerdns.com> <CAHbrMsDKQqfnoty+cRa5bJ=zVkONYTbFf-=8hzAj0E7pWeFXug@mail.gmail.com> <a8f44365b9b3a079753f8286cc19fbb241996bf5.camel@powerdns.com> <CAHbrMsAhKB9=nPfnmYzT-tu8-XMYNwyyuYM3T9106iWNzPpDAQ@mail.gmail.com> <alpine.LRH.2.21.2005272118320.18445@bofh.nohats.ca> <CAHbrMsDNC+e0MUT=P4jLHB0vqoBon1PfCZRN_ce=VNsYiWqsTw@mail.gmail.com> <198f5c9519bb7d406e4a667747d71214a0c8062d.camel@powerdns.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/ABse1ae2ZHF70lNvlTLw2qZyTXc>
Subject: Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 May 2020 20:36:00 -0000

On Fri, 29 May 2020, Peter van Dijk wrote:

> On Wed, 2020-05-27 at 21:47 -0400, Ben Schwartz wrote:
>       On Wed, May 27, 2020 at 9:27 PM Paul Wouters <paul@nohats.ca> wrote:
>       Personally, I think it would be cleanest if we use the DS to signal
>       the DoT nameserver only by FQDN.
> 
> 
> I agree.  This is the design that I was attempting to describe.
> 
> I see now that the chain extension doesn't have to be mandatory.  A recursive that wants to use the extension can offer
> it.  If it doesn't get a chain extension in the reply, it sends a TLSA query over the
> 
> 
> emphasis on:
>
>       (as-yet-unauthenticated) TLS connection
> 
> 
> This means the TLSA query is subject to leakage by MITM. How bad that is depends on a bunch of things, but it is a wart.

The TLSA query is for the nameserver name, not the target domain name.

Presumbly, by connecting to the IP of that nameserver, you have
already revealed the information you are connecting to that nameserver,
even if none of the traffic to that IP would provide any clue about
the content. The privacy comes from many domain names being hosted by
that nameserver, and not knowing which target domain you are going to
query about.

And ofcourse, thay only works if the A/AAAA records you get back go
to another IP address used by many other domain names (and no SNI
leakage). In the end, the protection from recursive to auth is not
gaining us that much privacy, especially compared to stub to recursive.

I think what does help us is if we break the one to one relationship
between packets from stub to resolvers and from resolvers to auth
servers. But that should probably be written up in another draft document,
by someone with a PhD in statistics :)

Paul