Re: [dns-privacy] how can we ADoT?
Tony Finch <dot@dotat.at> Wed, 18 November 2020 23:09 UTC
Return-Path: <dot@dotat.at>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1AAB3A0DDB for <dns-privacy@ietfa.amsl.com>; Wed, 18 Nov 2020 15:09:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d4Ivmx73Uw3Y for <dns-privacy@ietfa.amsl.com>; Wed, 18 Nov 2020 15:09:34 -0800 (PST)
Received: from ppsw-41.csi.cam.ac.uk (ppsw-41.csi.cam.ac.uk [131.111.8.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 890AC3A0E27 for <dns-privacy@ietf.org>; Wed, 18 Nov 2020 15:09:29 -0800 (PST)
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus
Received: from grey.csi.cam.ac.uk ([131.111.57.57]:51860) by ppsw-41.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.139]:25) with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) id 1kfWZp-000Ij9-Sk (Exim 4.92.3) (return-path <dot@dotat.at>); Wed, 18 Nov 2020 23:09:25 +0000
Date: Wed, 18 Nov 2020 23:09:24 +0000
From: Tony Finch <dot@dotat.at>
To: Peter van Dijk <peter.van.dijk@powerdns.com>
cc: dns-privacy@ietf.org
In-Reply-To: <73abac2db221cd67abfb1e5860e2bf8566694318.camel@powerdns.com>
Message-ID: <alpine.DEB.2.20.2011182233220.26481@grey.csi.cam.ac.uk>
References: <alpine.DEB.2.20.2011111856160.17264@grey.csi.cam.ac.uk> <68a48d20bc23da7e30b50639b74fe2ed48ddf6f6.camel@powerdns.com> <alpine.DEB.2.20.2011170006580.25321@grey.csi.cam.ac.uk> <73abac2db221cd67abfb1e5860e2bf8566694318.camel@powerdns.com>
User-Agent: Alpine 2.20 (DEB 67 2015-01-07)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/XeEpPY3vXrSLb6O_F_GxtmFy23I>
Subject: Re: [dns-privacy] how can we ADoT?
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2020 23:09:37 -0000
Peter van Dijk <peter.van.dijk@powerdns.com> wrote: > > What I think I mean to say there is 'if an auth NS responds on port 853, > it had better offer me all the data it also has to offer on 53'. Yes, I think that makes the most sense. > > * Authenticate the server by `subjectAltName` `iPAddress`. [snip] > > For DOTPIN, Ralph Dolmans had the bright insight to suggest not sending > a server name at all (which matches what I said earlier - name servers > have IPs, not really names). Do you mean not sending in TLS SNI? Yes, that would make sense if we're not doing name-based auth. (I have not really thought about SNI in this context; might be useful for operators who like to use glueful delegations with alternate nameserver names per zone, though I expect that will end up causing sadness if they don't control all the zones.) Even with RFC 8738 acme ip, there's the wrinkle that you can't use acme dns-01 challenges to get the cert - ironic :-) > > * Ignore certificate name mismatches, and authenticate just the public > > key. [snip] > > As above. (Not saying that it is the only way, but 'a name server has > no name' has a lot of convenient properties.) There's another downside to this case: with IP-based or name-based auth, you can put the CA's public key in the TLSA rather than the server key, so there's less rollover churn, but that doesn't make sense for key-based auth. > > * Use the presence of a DNS record associated with the nameserver name > > to indicate that the server's certificate will match the name. > > First thought: yes. Second thought: what if the owner of the 'vanity > name' 'aliased' to the NS just copies the TLSAs? At sufficient > deployment, the failure mode is immediate and clear, of course. That should lead to a certificate name mismatch. If we aren't doing name-based auth then there won't be an immediate failure; instead it's likely to go wrong when the server operator rolls their keys or switches CA, and that delayed failure will be HORRIBLE to debug. I think there are significant (albeit woolly) advantages to staying as close as possible to normal webPKI for DoT: much lower congnitive load for operators who can reuse their https knowledge; deveopers don't have to write code that's too weirdly different from https; very straightforward parallel deployment for DoT, DoH, DoQ (if we ever want to support more transports). On the other hand you are right that IP address auth is much closer to the way the DNS works now. I think the other most plausible design for ADoT is in-band signalling with a strict transport security option and ip-based auth. (As Ekr said) https://mailarchive.ietf.org/arch/msg/dns-privacy/Qhn62UWBclwNXjlMaUNoT6M9sMU/ Tony. -- f.anthony.n.finch <dot@dotat.at> http://dotat.at/ Thames, Dover: Southwest veering northwest later, 6 to gale 8, perhaps severe gale 9 later, decreasing 4 to 6 later. Moderate or rough. Showers. Moderate or good.
- [dns-privacy] how can we ADoT? Tony Finch
- Re: [dns-privacy] how can we ADoT? Eric Rescorla
- Re: [dns-privacy] how can we ADoT? Hollenbeck, Scott
- Re: [dns-privacy] how can we ADoT? Tony Finch
- Re: [dns-privacy] how can we ADoT? Tony Finch
- Re: [dns-privacy] how can we ADoT? Manu Bretelle
- Re: [dns-privacy] how can we ADoT? Brian Dickson
- Re: [dns-privacy] how can we ADoT? Stephen Farrell
- Re: [dns-privacy] how can we ADoT? (with github u… Tony Finch
- Re: [dns-privacy] how can we ADoT? (with github u… Manu Bretelle
- Re: [dns-privacy] how can we ADoT? (with github u… Tony Finch
- Re: [dns-privacy] how can we ADoT? (with github u… Manu Bretelle
- Re: [dns-privacy] how can we ADoT? (with github u… Tony Finch
- Re: [dns-privacy] how can we ADoT? Peter van Dijk
- Re: [dns-privacy] how can we ADoT? Tony Finch
- Re: [dns-privacy] how can we ADoT? Peter van Dijk
- Re: [dns-privacy] how can we ADoT? Tony Finch
- Re: [dns-privacy] how can we ADoT? Peter van Dijk