Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt

Paul Wouters <paul@nohats.ca> Wed, 20 August 2014 16:32 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1370E1A6F1B for <dns-privacy@ietfa.amsl.com>; Wed, 20 Aug 2014 09:32:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.668
X-Spam-Level:
X-Spam-Status: No, score=-2.668 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.668] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzsRiNIj57xq for <dns-privacy@ietfa.amsl.com>; Wed, 20 Aug 2014 09:32:24 -0700 (PDT)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBF261A06A8 for <dns-privacy@ietf.org>; Wed, 20 Aug 2014 09:32:24 -0700 (PDT)
Received: from bofh.nohats.ca (bofh.nohats.ca [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 87FC082E12; Wed, 20 Aug 2014 12:32:23 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1408552343; bh=ICVN0sufvEbuC1jfrbyTJamEXvJnL+ptI2VFcAZC+Sw=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=ebQEdJBecmkqVt05J2clBfrePg6X5nhjqD7j4UW87iU9CX7UnPRQ7jL3qp80WoGUy oNuxZJ6GmmwEBXHQ5wHZcDbPfb2fSuV5W7SUAqj4lThzfZ2SGK6LTM/PS0X8afA3K3 1JRXj78fGSXzwx+R7c2vGyVziehP5aXCzr14r2ms=
Received: from localhost (paul@localhost) by bofh.nohats.ca (8.14.7/8.14.7/Submit) with ESMTP id s7KGWNEq027121; Wed, 20 Aug 2014 12:32:23 -0400
X-Authentication-Warning: bofh.nohats.ca: paul owned process doing -bs
Date: Wed, 20 Aug 2014 12:32:23 -0400
From: Paul Wouters <paul@nohats.ca>
To: Jacob Appelbaum <jacob@appelbaum.net>
In-Reply-To: <CAFggDF3wej+gFU7-_iTu8N=J+K9uKwOnNhz8oavp3G9rA9XYug@mail.gmail.com>
Message-ID: <alpine.LFD.2.10.1408201229350.26631@bofh.nohats.ca>
References: <00ba01cfbbf9$d561f010$8025d030$@rozanak.com> <20140820143453.GD1065@mx1.yitter.info> <814D0BFB77D95844A01CA29B44CBF8A7A28554@lhreml513-mbb.china.huawei.com> <20140820152343.GH1065@mx1.yitter.info> <814D0BFB77D95844A01CA29B44CBF8A7A285FA@lhreml513-mbb.china.huawei.com> <CAFggDF3wej+gFU7-_iTu8N=J+K9uKwOnNhz8oavp3G9rA9XYug@mail.gmail.com>
User-Agent: Alpine 2.10 (LFD 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Archived-At: http://mailarchive.ietf.org/arch/msg/dns-privacy/RjVUwDJYEGVtcHm3rLXw2GORA6E
Cc: "dns-privacy@ietf.org" <dns-privacy@ietf.org>
Subject: Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 16:32:27 -0000

On Wed, 20 Aug 2014, Jacob Appelbaum wrote:

> Paul - perhaps this suggests that all stub and recursive resolvers
> should log keying information, even if it isn't used for
> validation/authentication/etc?

That is one "out of band" authentication mechanism called TOFU (trust on
first use) or LOF (Leap of Faith)

While possible, it will see a lot of false positives, like when going to
a different starbucks using the same wifi ESSID.

It could be done if one also logs mac address and/or lat/long info.

But these are all local policy and local implementations issues.

Paul