Re: [dns-privacy] ADoT signalling

Stephane Bortzmeyer <bortzmeyer@nic.fr> Mon, 04 November 2019 15:32 UTC

Return-Path: <bortzmeyer@nic.fr>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59CDD120A36 for <dns-privacy@ietfa.amsl.com>; Mon, 4 Nov 2019 07:32:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ckHhPhOUj6bs for <dns-privacy@ietfa.amsl.com>; Mon, 4 Nov 2019 07:32:28 -0800 (PST)
Received: from mx4.nic.fr (mx4.nic.fr [IPv6:2001:67c:2218:2::4:12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB4BC1209BD for <dns-privacy@ietf.org>; Mon, 4 Nov 2019 07:32:28 -0800 (PST)
Received: from mx4.nic.fr (localhost [127.0.0.1]) by mx4.nic.fr (Postfix) with SMTP id 87B0228066A; Mon, 4 Nov 2019 16:32:26 +0100 (CET)
Received: from relay01.prive.nic.fr (pa-th3.interco.nic.fr [192.134.4.74]) by mx4.nic.fr (Postfix) with ESMTP id 812A2280613; Mon, 4 Nov 2019 16:32:26 +0100 (CET)
Received: from b12.nic.fr (b12.users.prive.nic.fr [10.10.86.133]) by relay01.prive.nic.fr (Postfix) with ESMTP id 6DDCA642A7B0; Mon, 4 Nov 2019 16:32:26 +0100 (CET)
Received: by b12.nic.fr (Postfix, from userid 1000) id 66F2D402C6; Mon, 4 Nov 2019 16:32:26 +0100 (CET)
Date: Mon, 04 Nov 2019 16:32:26 +0100
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Eric Rescorla <ekr@rtfm.com>
Cc: Stephane Bortzmeyer <bortzmeyer@nic.fr>, John Levine <johnl@taugh.com>, dns-privacy@ietf.org
Message-ID: <20191104153226.GA15325@nic.fr>
References: <20191103223335.4395EE54E62@ary.local> <20191104142555.GA10561@nic.fr> <CABcZeBNDPbNznf8dSA8NdVH4TMVJEGGNjR09k4GTyjXWaEm0ZA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CABcZeBNDPbNznf8dSA8NdVH4TMVJEGGNjR09k4GTyjXWaEm0ZA@mail.gmail.com>
X-Operating-System: Debian GNU/Linux 10.1
X-Kernel: Linux 4.19.0-6-amd64 x86_64
X-Charlie: Je suis Charlie
Organization: NIC France
X-URL: http://www.nic.fr/
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/PwjaIiM2kRB40534sL_VNDa6YaE>
Subject: Re: [dns-privacy] ADoT signalling
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Nov 2019 15:32:30 -0000

On Mon, Nov 04, 2019 at 07:12:46AM -0800,
 Eric Rescorla <ekr@rtfm.com> wrote 
 a message of 96 lines which said:

> I'm less worried about the latter because I would expect recursive
> resolvers to generally be operated by people who are able to
> establish their port 853 status.

Not all resolvers are big boxes in the central datacenter. I may want
to run a resolver on a small box at home even if my ISP blocks port
853.

> Well, this is why I asked about the threat model. If we care about
> active attack, then this kind of approach does not work well.

I tend to agree with Stephen Farrell here. If we insist on perfect
resistance to active attackers, we may never deploy anything. I would
suggest something more like "probe 853, remember what it was last time
(to warn the sysadmin about a sudden block), may be allow to whitelist
auth servers that must have DoT".

For signaling, my personal preference goes to DANE, anyway.