Re: [dns-privacy] wglc feedback draft-ietf-dprive-bcp-op

Patrick McManus <mcmanus@ducksong.com> Fri, 18 October 2019 22:50 UTC

Return-Path: <mcmanus@ducksong.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE607120111 for <dns-privacy@ietfa.amsl.com>; Fri, 18 Oct 2019 15:50:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ducksong.com header.b=ZTEKz6U1; dkim=pass (2048-bit key) header.d=outbound.mailhop.org header.b=H+X4dnly
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zY2GvBgNgd8f for <dns-privacy@ietfa.amsl.com>; Fri, 18 Oct 2019 15:50:30 -0700 (PDT)
Received: from outbound2r.ore.mailhop.org (outbound2r.ore.mailhop.org [54.200.129.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CF80120046 for <dns-privacy@ietf.org>; Fri, 18 Oct 2019 15:50:30 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1571439029; cv=none; d=outbound.mailhop.org; s=arc-outbound20181012; b=Vw5vIjMsxPnWNKGhCjVNnRmG+wVhF8fQMx3H8tHxkQ10HGiyfXx/e/+fMCVDaVk34zy8KLI4cdTQC CsQaiHChyAEVF3sKhJm0ce3SIe+SPxFZRpVQEsC+E2BGRjebZ7lzpGwEm3CthtFqbGlx4yBU9y4Kak 0cRCrGByQMzKfhD51H717mGVPwE9zq8UHtrn2u1eR5RjEIxOGnO97jzq55U6lGEBeW7TzUIfbA9eGb 4Mb59hzx1EKIHXX2CDagcvv4oAVCYaL8aIK2tKia+DhEtX079HIpARTltjSr83Z7gqzZ5kBtg2yt0E fkdUMOqQxHAmrftkhFPEBq2r0AXVQ1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=arc-outbound20181012; h=content-type:cc:to:subject:message-id:date:from:in-reply-to:references: mime-version:dkim-signature:dkim-signature:from; bh=JxVOj8BWDsC4J8/DEIxRlKR7/UvTqZRGuZ5zEochJB0=; b=U1RHtzIq87FcLtOCduI6OCEYjogEekDB6EfT/evhwcfTQ9+1ojaPUfMWZ3sK22WE0j9SZOGJSzQEP EDsjkjz5V7qwSIrRP43fEP9KRTcFFR6yOZSaSFlgK//lzjuE2yLtrz9wvRSB0W0f715ncd+N2GD39G C3jA+KrgjaYp4Gzaj5+QTFnyGHEJ5RCxYSwuZHYNShY8tALOMutbDpa7wfMVPxFSsHDrcWwbIsis1Z xoROSLs7hAjmwmbZ4lF0BmymvildQrUruwEtF6bPV1aRBKnwSMNvKGHQ7LCu1x8Brf6BOuPFepzYTf WSTu7O3rzjQARdJ/+0LXcuS5anJRVlA==
ARC-Authentication-Results: i=1; outbound4.ore.mailhop.org; spf=pass smtp.mailfrom=ducksong.com smtp.remote-ip=209.85.167.176; dmarc=none header.from=ducksong.com; arc=none header.oldest-pass=0;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ducksong.com; s=duo-1537391512170-ea99bbb3; h=content-type:cc:to:subject:message-id:date:from:in-reply-to:references: mime-version:from; bh=JxVOj8BWDsC4J8/DEIxRlKR7/UvTqZRGuZ5zEochJB0=; b=ZTEKz6U1J67A8aQk5CdVJy9PoGA3dFvVLVzVM47VcI5bjqthdxE82sjHhI1dKOZTmw4hMSDRZ/oqv A1Fh9BdsmsSV4TbRocRVquCSp9O+SIZ5C/15tXGeGSHv7YOmxG+hqpsYoubOafs++Kt6MsWPq8dPCy u5B80yIA1qG8K46s=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=dkim-high; h=content-type:cc:to:subject:message-id:date:from:in-reply-to:references: mime-version:from; bh=JxVOj8BWDsC4J8/DEIxRlKR7/UvTqZRGuZ5zEochJB0=; b=H+X4dnlyktpqYbdyH1fDmwdVRyUgBSUJ5e2Jcb1rFP+Dn4Mb61WFvmE0v9TUoXL0KiYZ6tww22xER jfARnuE7sffMxVg8/yErlGZy4s+ieaQDKH6LX7Y4nba4lui3Urf6fMt0cD2tN+fTMwPNnND08AS0tQ NQO3QNnS0YpqCdnDg7+thAwwFsl6EjRYfj18+4g4lDj/TkV1Pb5FmHz42+8r19aVVqNvxgnVFTCdln IcbEBLtvPRak4OtNvsDzxuBIpJ4mauUyDLwRF2f+t5mO2ryn21FwFgtSpuozN61jzRfoBVPjjuHMUy +oNiLFfsLZcs4OnD+UFFwC0kTkHfIVA==
X-MHO-RoutePath: bWNtYW51cw==
X-MHO-User: ad91c6a0-f1f9-11e9-85ed-13b9aae3a1d2
X-Report-Abuse-To: https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information
X-Originating-IP: 209.85.167.176
X-Mail-Handler: DuoCircle Outbound SMTP
Received: from mail-oi1-f176.google.com (unknown [209.85.167.176]) by outbound4.ore.mailhop.org (Halon) with ESMTPSA id ad91c6a0-f1f9-11e9-85ed-13b9aae3a1d2; Fri, 18 Oct 2019 22:50:28 +0000 (UTC)
Received: by mail-oi1-f176.google.com with SMTP id 83so6591966oii.1 for <dns-privacy@ietf.org>; Fri, 18 Oct 2019 15:50:27 -0700 (PDT)
X-Gm-Message-State: APjAAAU25ysDw/UGOe8QEvhnnAsJEl+SCpe22/5LzYF4Q1kKjBKft/Xs B7jcNqfNTrkiq2scTN0nsEgNkS3oC3URNle2+GQ=
X-Google-Smtp-Source: APXvYqwZrIPWXQJU5dCe5cQ8ZEDNWo4/F+3mk0Yv6IvrJTbdAbpUOJLE4qbQkasoV4e8KypaNh1O2QIDnWf35XRjp5o=
X-Received: by 2002:a05:6808:689:: with SMTP id k9mr10087876oig.58.1571439026944; Fri, 18 Oct 2019 15:50:26 -0700 (PDT)
MIME-Version: 1.0
References: <CAOdDvNq+d2nT2=ix73-Pq4DDG1gpGS7nPSEGrnORCb8xh1b3bw@mail.gmail.com> <D6F4FD45-522C-4480-845B-46A29F09E591@sinodun.com>
In-Reply-To: <D6F4FD45-522C-4480-845B-46A29F09E591@sinodun.com>
From: Patrick McManus <mcmanus@ducksong.com>
Date: Fri, 18 Oct 2019 15:50:14 -0700
X-Gmail-Original-Message-ID: <CAOdDvNqd3TZeHm-NQAtFw2p-vdVXDyab74C7qhJ8aE1RH97jAA@mail.gmail.com>
Message-ID: <CAOdDvNqd3TZeHm-NQAtFw2p-vdVXDyab74C7qhJ8aE1RH97jAA@mail.gmail.com>
To: Sara Dickinson <sara@sinodun.com>
Cc: Patrick McManus <mcmanus@ducksong.com>, DNS Privacy Working Group <dns-privacy@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000fcc19d05953728cf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/KkoVdckSFWVl11_aqVi2bFzvYHE>
Subject: Re: [dns-privacy] wglc feedback draft-ietf-dprive-bcp-op
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Oct 2019 22:50:34 -0000

Hi Sara,

My comments about TLSA and Tor are specifically through the lens of BCP -
these mechanisms make a lot of sense in a non BCP document. But. imo, BCP
should give the reader almost a checklist of things that are known to be
widely implemented and successfully deployed(i.e best practices) and
generally at Internet scale (or at least described at the appropriate
scope). While both TLSA and Tor are pretty neat, neither are really a
current best practice as far as I know (but I ask that question in a
genuinely open minded way and would love to see the data) - what I do see
is a couple endpoints that have offerings/support for them but that's not
really the same thing. In other words, I think merely implemented in one or
more services is really too low of a bar for a BCP. The WG should have
confidence that it really works well at scale and can be recommended with
unambiguous guidance.

By way of analogy I have some favorite mechanisms in the HTTP space that
are I think are really valuable but aren't used widely. Alternative
Services is a good example. They are used in a number of places quite
successfully, but compared to the scale and scope of HTTP they don't
register. Work continues apace with them as a mechanism (including the
forthcoming QUIC specifications) which I think will make them grow in
importance over time, but right now Alt-Svc would not be a BCP - there just
isn't enough real world experience to say that.

Particularly with Tor there is reason to believe the Tor network -
necessary for the accessing of a .onion endpoint - could not handle the
same kind of traffic load with anywhere near the same kind of performance
that a pure IP based endpoint like many of the popular public resolvers
could.. and this is more of a factor of the limited capacity and inherently
inefficient routing of the overlay than it is of anything the endpoint
provisions. So is the BCP advice that a resolver should operate a .onion
endpoint but hope people don't use it except when they really need it? Or
they should only do it if they are really small? Or they should only do it
if their customers are ok with coming back tomorrow if it doesn't work
today? To be honest imo those _are_ the implict BCPs of Tor services today
but I don't think they are the best current practices of privacy aware
internet resolvers addressed by this document. I say this because in
practice the two worlds don't operate reliably and efficiently at the same
scales. Tor is a world of its own and before IETF BCPs start recommending
its operational use right along traditional IP we ought to be more certain
about the outcomes of people following that advice.

I look at the TLSA suggestions in a similar frame - though I know less
about usage of them (and have less reason to be proactively concerned). Are
those offerings being used by clients at rates approaching the web-pki
ones? Have they been robust? Have there been expiration related failures?
Basically, is it really an operational BCP? Any maybe the answer is yes -
I'm just asking because that would be new info to me if true. How confident
are we that this is really a documented best practice, instead of
advocating for a good idea? Minimally the TLSA reference should be
restricted to DoT as that's quite a leap for DoH.

On Fri, Oct 18, 2019 at 5:06 AM Sara Dickinson <sara@sinodun.com> wrote:

>
>
> The best reference I could find for setting up an onion endpoint is
> https://riseup.net/en/security/network-security/tor/onionservices-best-practices.
> Would this work or do you have another reference to recommend?
>
>
I would prefer to drop the .onion text entirely. The fact that the Tor
protocol is not an open standard is a further complication but not at the
crux of the issue.


>
> ‘Servers should have no requirement that, to obtain service, clients are
> required to use any form of session resumption mechanism, such TLS
> session resumption [RFC5077] with TLS 1.2 or section 2.2 of RFC8446.”?
>
>
This is much better - but the "Servers should have no requirement" bit
still makes no sense to me. How could a server have such a requirement,
technically speaking? That's not how it works - there's always the
possibility that the client does not have resumption material and you need
to process the handshake that way. Its probably best to leave this up to
the client.. if the client binds resumption material to IP addresses the
risk is constant - resuming with the same address is fine (no new info),
resuming with a different address would be a good place to not resume to
avoid linkability.


>
> * Automate the generation, publication and renewal of certificates. For
> example, ACME [RFC8555] provides a mechanism to actively manage
> certificates through automation and has been implemented by a number of
> certificate authorities.
>
>
nice! thanks.

>
> 4] I am also concerned that it is unreasonable to suggest TLSA in a BCP
> document. What are the examples of existing DNS Privacy Services doing so
> and what are the examples of the matching clients using it? At what scale?
> Do we have comparable evidence about robust management of that vs the more
> traditional TLS PKI and ACME and tools built for that? any experience of
> tlsa with doh at scale before mentioning it as a BCP?
>
>
> It is currently mentioned as an optimisation - I had thought that after a
> previous comment on this we had downgraded it to just an ‘additional
> option’ which I think would be reasonable. There are a DoT few test servers
> that publish TLSA records:
> https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers (I’m not
> aware of any DoH servers doing this).
>
> Would changing it to an ‘Additional option’ be acceptable or do you feel
> strongly that it should be removed completely?
>
> Sara.
>
>