Re: [dns-privacy] [dprive] Specification of DNS over Dedicated QUIC Connections (draft-ietf-dprive-dnsoquic-04) - feedback

"Quick, Matthew" <mquick@verisign.com> Thu, 07 October 2021 18:58 UTC

Return-Path: <mquick@verisign.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B83CE3A00AD for <dns-privacy@ietfa.amsl.com>; Thu, 7 Oct 2021 11:58:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=verisign.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lDn-17Gzp3-u for <dns-privacy@ietfa.amsl.com>; Thu, 7 Oct 2021 11:58:23 -0700 (PDT)
Received: from mail4.verisign.com (mail4.verisign.com [69.58.187.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B22883A0DC0 for <dns-privacy@ietf.org>; Thu, 7 Oct 2021 11:58:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verisign.com; l=10654; q=dns/txt; s=VRSN; t=1633633102; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=kHAnkLTLFTjVzI9AFexsjNQNRnCsroLhwb4APeLpLM0=; b=dtEFWjK2ahjIYsC5wmrv176bFNjQLSSETRyMD98gDMA7MEHxzZvKe6mN 2zNOhB+RiqDmEOEwdNzGDjYFk7GGqbeuGrDQ1idEJRo8GGirC+nxVyPbY ABmoPCKq1E/WkZ/6DLSZ/wAEUeTtL5nfgwHLtu8ls0Vs3t7GaOUbjILyO R+kzHZImZkwYuTNxxAhTryFmDUjUMsCjk0GLBPqi+rQsA/sn3VxhjWGkG hFM1fejestQQZXWWeXb4FZDRUKvZMJRAM/2XLKHz9IpL7SbT8f6igOfsE 2Nn5jsZtIyBdbNg51dq1KZQ910tMHItRUhZqrr/IRzdWNp50VFp54CTbV A==;
IronPort-SDR: 4fLgwkhiBNGWN9t1h5HqISKEzbb8+KH9QRbOqIVwCK4bmrY3ULo0h0La3GIA1zjgxtYu2mtf6e ZQZ14J/1obpgs25/vN5uXN9qV9hzF7c6Iq1zFmcYn6wZ1yo+gKXdMsDCa/bg7QA8ki+EXXHReZ DiybUeN0Mr6oldMw4xWh9DJzesS23P07JfBm16excVWsftO+PBFVPrdtbz31YiXjHCYArEd+Nv JKdIj+In6+KJMI+JxeYgmNKqplaMzmsQQvqaTfCjcmZXiZEx7tNxDzDaY/6CMtgboVRoeGCMn/ wSk=
IronPort-Data: A9a23:cESomqoJSlzs/nWDfWUFzxij/ZJeBmKpZxIvgKrLsJaIsI4StFCzt garIBmBbv+PYWqhLdBzPIS/oBsGvcSGndJiGlc5qn9jEnxH8pacVYWSI3mrMnLJJKUvbq7HA +byyzXkBJppJpMJjk71atANlZT/vE2xbuKU5NTsY0idfic5Dnd84f5fs7Rh2Ncx2YDmW1jlV e7a+KUzBnf0g1aYDUpJs8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vIwKPb 72rIIdVXo/u10xF5tuNyt4Xe2VUGuKCZVDmZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx umhurSbRygtF4/9p90bDUZjFy0hZfBKyeX+dC3XXcy7lyUqclPG+dM3M2cbDdVCvPh8BntWs /UUbi4XdRbFjOWzqF65YrA0wJ18d4+yYdhZ5iAIITLxVJ7KRbjGWrjL7txwwjoqh9tPEvCYb M0cAdZqRE2YP0MXYgtIYH44tLjrplageRpWlEmUnbIMyWn19VxP/be4ZbI5ffTPH625hH2wv Wvc9kziAxcdOMGZjzGC9xqEiunU2DvhWZwbH6yQ9/N2jhuU3GN7NfENfVGhp6CmjEOuA4gaM FIOvC8vtu048wqhVN+kGQOiu3jCtRkZMzZNL9AHBMi24vK8y26k6qIsF1attPROWBcKeAEX
IronPort-HdrOrdr: A9a23:0UI2mqiDS79gD6muZctXJYxpA3BQXgcji2hC6mlwRA09TyX+rb HKoB17726XtN9/YhEdcLy7VpVoIkmyyXcd2+B4AV7IZniEhILHFuBfxLqn7THmFzb36+JRkY xxGpITNPTASXx3l9zz7gX9MdoxqePszImYwcPT1W1kQw0vUbxn9AsRMGumO1d7XxZLHqA0E5 eg5s5KzgDKRUgq
X-IronPort-AV: E=Sophos;i="5.85,355,1624334400"; d="p7s'?scan'208";a="10460047"
Received: from BRN1WNEX01.vcorp.ad.vrsn.com (10.173.153.48) by BRN1WNEX02.vcorp.ad.vrsn.com (10.173.153.49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.8; Thu, 7 Oct 2021 14:58:20 -0400
Received: from BRN1WNEX01.vcorp.ad.vrsn.com ([fe80::a89b:32d6:b967:337d]) by BRN1WNEX01.vcorp.ad.vrsn.com ([fe80::a89b:32d6:b967:337d%4]) with mapi id 15.01.2308.008; Thu, 7 Oct 2021 14:58:20 -0400
From: "Quick, Matthew" <mquick@verisign.com>
To: "sara@sinodun.com" <sara@sinodun.com>
CC: "dns-privacy@ietf.org" <dns-privacy@ietf.org>
Thread-Topic: [dns-privacy] [dprive] Specification of DNS over Dedicated QUIC Connections (draft-ietf-dprive-dnsoquic-04) - feedback
Thread-Index: AQHXu61LZM8yRJtiiE2eCRJkJYbjCA==
Date: Thu, 07 Oct 2021 18:58:20 +0000
Message-ID: <04E4C339-727C-470C-B138-86CA8EA0D0E7@verisign.com>
References: <7B4E24A0-76DA-411E-BA19-7556031DC9E4@contoso.com> <C766BA3F-4046-4F4C-84EC-50E5332A9A23@sinodun.com>
In-Reply-To: <C766BA3F-4046-4F4C-84EC-50E5332A9A23@sinodun.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.170.148.18]
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="B_3716463500_1661203362"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/CdY4_9JvEYfN7XCIn1gSRuLDNFA>
Subject: Re: [dns-privacy] [dprive] Specification of DNS over Dedicated QUIC Connections (draft-ietf-dprive-dnsoquic-04) - feedback
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Addition of privacy to the DNS protocol <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Oct 2021 18:58:29 -0000

Hi Sara,

Thank you for your kind response. Agree that your reference to [RFC8932] covers the scope of my suggestions!

Best,
Matt
 
Matthew Quick
Senior Engineer
Industry Standards & Technical Engagement
 
mquick@verisign.com
571.732.6173

12061 Bluemont Way, Reston, VA 20190

On 10/5/21, 6:23 AM, "Sara Dickinson" <sara@sinodun.com> wrote:

    Hi Matthew, 

    Sorry for a slow response - thanks for picking up the reference issues! One comment below.

    > On 22 Sep 2021, at 16:14, Quick, Matthew <mquick=40verisign.com@dmarc.ietf.org> wrote:
    > 
    > Dear Christian et al,
    >  
    > Hello - I hope this finds you well. Please find an additional section suggestion and comments for “draft-ietf-dprive-dnsoquic-04”, below. Your feedback is greatly appreciated. 
    >  
    > Best,
    > Matthew Quick, Verisign
    >  
    > ____________________________
    > 9.  Privacy Considerations
    >  
    > Justification:
    > The reference to [I-D.ietf-dprive-rfc7626-bis] is obsoleted when it became [RFC9076] in July 2021.
    >  
    > Existing Text:
    > The general considerations of encrypted transports provided in "DNS Privacy Considerations" [I-D.ietf-dprive-rfc7626-bis] apply to DoQ.
    >  
    > Suggested Text:
    > The general considerations of encrypted transports provided in "DNS Privacy Considerations" [RFC9076] apply to DoQ.
    >  
    > ____________________________
    > 9.1  Privacy Considerations
    >  
    > Justification:
    > The reference to [RFC7626] is obsoleted when it became [RFC9076] in July 2021.
    >  
    > Existing Text:
    > This risk is in fact a subset of the general problem of observing the behavior of the recursive resolver discussed in "DNS Privacy Considerations" [RFC7626].
    >  
    > Suggested Text:
    > This risk is in fact a subset of the general problem of observing the behavior of the recursive resolver discussed in "DNS Privacy Considerations" [RFC9076].
    >  
    > ____________________________
    > 9.  Privacy Considerations
    >  
    > Justification: 
    > The new text only applies to interactions with authoritative name servers, not stub to recursive, so it fits well as an additional part of Section 9 – Privacy Considerations.  Also, RFC 9076 only mentions QNAME minimization, so it’s helpful to have a separate place to expand the explanation of data privacy.
    >  
    > New Section Suggested Text:
    >  
    > 9.5.  Relationship with Minimization Techniques 
    > QNAME minimization [RFC7816] reduces the sensitive information exchanged to only what’s necessary to perform a requested function. This reduces the risk of disclosure to both outside and inside parties, with no operational impact on the receiver. Additional minimization methods include NXDOMAIN cut processing [RFC8020], and aggressive DNSSEC caching [RFC8198].

    It is a good point that we haven’t covered this kind of consideration. I’d like to suggest adding the following text at the end of the first paragraph of section 9 as a more general improvement since RFC8932 covers privacy stub-to-recursive, recursive-to-auth and data at rest. Section 5.3.1 of RFC8932 covers exactly the references you cite above.

    “”Similarly, "Recommendations for DNS Privacy Service Operators" [RFC8932] (which covers operational, policy, and security considerations for DNS privacy services) is also applicable to DoQ services.”

    Best regards

    Sara.