Re: [dns-privacy] wglc feedback draft-ietf-dprive-bcp-op

Sara Dickinson <sara@sinodun.com> Tue, 29 October 2019 10:47 UTC

Return-Path: <sara@sinodun.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED2D912010C for <dns-privacy@ietfa.amsl.com>; Tue, 29 Oct 2019 03:47:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level:
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sinodun.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id epFRwJHgc2Zw for <dns-privacy@ietfa.amsl.com>; Tue, 29 Oct 2019 03:47:37 -0700 (PDT)
Received: from balrog.mythic-beasts.com (balrog.mythic-beasts.com [IPv6:2a00:1098:0:82:1000:0:2:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE0EB120099 for <dns-privacy@ietf.org>; Tue, 29 Oct 2019 03:47:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sinodun.com ; s=mythic-beasts-k1; h=To:Date:Subject:From; bh=WF4opLgK8mmhm1/4Dprcsq5R2XS+RcnnTrhocOfPK8s=; b=Iy1I08X2T3bCeiG9hnkLCbYvpB uF9vake8MkGtJA6k5vmpE3ebkrKW0x6pXKZNyPcWKtBdLs0XI+MLC4nfRK9wASgvAfDQjfscoV/hH 2BOdeTVk53LAurOXWu+G8xRs8ga3qFsXywdAjLUzs37LZmQYAxp1iYZu6zm4lEeMWE7WKljq2paSv fcEQNicEQhxh1vaeUDexOpEthVk1TsjsRu0WiiHbaJjO8g9gRwPkLy1JxkqHPNNwLQ6JkobSuoJ/1 8aK81iw/NN9Hc8uHzlG3i1TSLZemxF6aufZrz+1Rrvx4x+L/Y1KpZhhCDFfC8wKfNz2pDWkvm9JB6 FzMmyLyQ==;
Received: from [2a02:8010:6126:0:cdab:a684:507f:1caf] (port=50274) by balrog.mythic-beasts.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from <sara@sinodun.com>) id 1iPP2A-00031l-GP; Tue, 29 Oct 2019 10:47:35 +0000
From: Sara Dickinson <sara@sinodun.com>
Message-Id: <CFB87BD9-952F-4F15-8472-162938E27A16@sinodun.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_F2A4FF3A-53F9-4005-BCC9-71B4621E15EC"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 29 Oct 2019 10:47:28 +0000
In-Reply-To: <CAOdDvNqd3TZeHm-NQAtFw2p-vdVXDyab74C7qhJ8aE1RH97jAA@mail.gmail.com>
Cc: DNS Privacy Working Group <dns-privacy@ietf.org>
To: Patrick McManus <mcmanus@ducksong.com>
References: <CAOdDvNq+d2nT2=ix73-Pq4DDG1gpGS7nPSEGrnORCb8xh1b3bw@mail.gmail.com> <D6F4FD45-522C-4480-845B-46A29F09E591@sinodun.com> <CAOdDvNqd3TZeHm-NQAtFw2p-vdVXDyab74C7qhJ8aE1RH97jAA@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-BlackCat-Spam-Score: 4
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/CI0C0iAQWp3Hhg0xAEdquHcTg7g>
Subject: Re: [dns-privacy] wglc feedback draft-ietf-dprive-bcp-op
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Oct 2019 10:47:40 -0000


> On 18 Oct 2019, at 23:50, Patrick McManus <mcmanus@ducksong.com> wrote:
> 
> Hi Sara,
> 
> My comments about TLSA and Tor are specifically through the lens of BCP - these mechanisms make a lot of sense in a non BCP document. But. imo, BCP should give the reader almost a checklist of things that are known to be widely implemented and successfully deployed(i.e best practices) and generally at Internet scale (or at least described at the appropriate scope). While both TLSA and Tor are pretty neat, neither are really a current best practice as far as I know (but I ask that question in a genuinely open minded way and would love to see the data) - what I do see is a couple endpoints that have offerings/support for them but that's not really the same thing. In other words, I think merely implemented in one or more services is really too low of a bar for a BCP. The WG should have confidence that it really works well at scale and can be recommended with unambiguous guidance.
> 
> By way of analogy I have some favorite mechanisms in the HTTP space that are I think are really valuable but aren't used widely. Alternative Services is a good example. They are used in a number of places quite successfully, but compared to the scale and scope of HTTP they don't register. Work continues apace with them as a mechanism (including the forthcoming QUIC specifications) which I think will make them grow in importance over time, but right now Alt-Svc would not be a BCP - there just isn't enough real world experience to say that.
> 
> Particularly with Tor there is reason to believe the Tor network - necessary for the accessing of a .onion endpoint - could not handle the same kind of traffic load with anywhere near the same kind of performance that a pure IP based endpoint like many of the popular public resolvers could.. and this is more of a factor of the limited capacity and inherently inefficient routing of the overlay than it is of anything the endpoint provisions. So is the BCP advice that a resolver should operate a .onion endpoint but hope people don't use it except when they really need it? Or they should only do it if they are really small? Or they should only do it if their customers are ok with coming back tomorrow if it doesn't work today? To be honest imo those _are_ the implict BCPs of Tor services today but I don't think they are the best current practices of privacy aware internet resolvers addressed by this document. I say this because in practice the two worlds don't operate reliably and efficiently at the same scales. Tor is a world of its own and before IETF BCPs start recommending its operational use right along traditional IP we ought to be more certain about the outcomes of people following that advice.
> 
> I look at the TLSA suggestions in a similar frame - though I know less about usage of them (and have less reason to be proactively concerned). Are those offerings being used by clients at rates approaching the web-pki ones? Have they been robust? Have there been expiration related failures? Basically, is it really an operational BCP? Any maybe the answer is yes - I'm just asking because that would be new info to me if true. How confident are we that this is really a documented best practice, instead of advocating for a good idea? Minimally the TLSA reference should be restricted to DoT as that's quite a leap for DoH.

Thanks for the comments here, seems reasonable.

> 
> On Fri, Oct 18, 2019 at 5:06 AM Sara Dickinson <sara@sinodun.com <mailto:sara@sinodun.com>> wrote:
> 
> 
> The best reference I could find for setting up an onion endpoint is https://riseup.net/en/security/network-security/tor/onionservices-best-practices <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>.  Would this work or do you have another reference to recommend?
> 
> 
> I would prefer to drop the .onion text entirely. The fact that the Tor protocol is not an open standard is a further complication but not at the crux of the issue.

OK - I’ll remove it.

>  
> 
> ‘Servers should have no requirement that, to obtain service, clients are required to use any form of session resumption mechanism, such TLS session resumption [RFC5077] with TLS 1.2 or section 2.2 of RFC8446.”?
> 
> 
> This is much better - but the "Servers should have no requirement" bit still makes no sense to me. How could a server have such a requirement, technically speaking? That's not how it works - there's always the possibility that the client does not have resumption material and you need to process the handshake that way. Its probably best to leave this up to the client.. if the client binds resumption material to IP addresses the risk is constant - resuming with the same address is fine (no new info), resuming with a different address would be a good place to not resume to avoid linkability.

I think one of the concerns here was to ensure equity of service for clients that choose not to use these mechanism even if they impose a performance hit on the server. In principle a server could give lower priority to (or timeout) queries arriving on sessions that that didn’t use those mechanisms which might degrade service enough to cause an issue….. 

Would updating this to ’Servers should not degrade in any way the query service level provided to clients that do not use any form….’ work?

>  
> 
> * Automate the generation, publication and renewal of certificates. For example, ACME [RFC8555] provides a mechanism to actively manage certificates through automation and has been implemented by a number of certificate authorities.
> 
> 
> nice! thanks. 
>> 
>> 4] I am also concerned that it is unreasonable to suggest TLSA in a BCP document. What are the examples of existing DNS Privacy Services doing so and what are the examples of the matching clients using it? At what scale? Do we have comparable evidence about robust management of that vs the more traditional TLS PKI and ACME and tools built for that? any experience of tlsa with doh at scale before mentioning it as a BCP?
> 
> It is currently mentioned as an optimisation - I had thought that after a previous comment on this we had downgraded it to just an ‘additional option’ which I think would be reasonable. There are a DoT few test servers that publish TLSA records: https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers <https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers> (I’m not aware of any DoH servers doing this).
> 
> Would changing it to an ‘Additional option’ be acceptable or do you feel strongly that it should be removed completely?

I’ll remove this too for this version until there is more data.

Sara.

> 
> Sara. 
>