Re: [dns-privacy] Considering DHCP

Zhiwei Yan <yanzhiwei@cnnic.cn> Tue, 14 April 2015 10:58 UTC

Return-Path: <yanzhiwei@cnnic.cn>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD7FD1A88DC for <dns-privacy@ietfa.amsl.com>; Tue, 14 Apr 2015 03:58:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.54
X-Spam-Level:
X-Spam-Status: No, score=0.54 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, MIME_QP_LONG_LINE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LvG57n4oRTNR for <dns-privacy@ietfa.amsl.com>; Tue, 14 Apr 2015 03:58:22 -0700 (PDT)
Received: from cnnic.cn (smtp13.cnnic.cn [218.241.118.13]) by ietfa.amsl.com (Postfix) with ESMTP id CD15E1A88DA for <dns-privacy@ietf.org>; Tue, 14 Apr 2015 03:58:20 -0700 (PDT)
Received: from [10.48.30.181] (unknown [106.37.32.31]) by ocmail02.zx.nicx.cn (Coremail) with SMTP id AQAAf0AJEITI8ixVsFkwAA--.7780S2; Tue, 14 Apr 2015 18:58:17 +0800 (CST)
References: <CADZyTkkiOVimmg3MzSs1+u4reDXskd78K3nMHtKU+MD6NCox-Q@mail.gmail.com> <201504140903058468192@cnnic.cn> <alpine.LFD.2.10.1504132301570.15124@bofh.nohats.ca> <201504141202242629189@cnnic.cn> <87bnirs4vs.fsf@alice.fifthhorseman.net> <1429004774927-6c580df8-a4db7bb6-ea35c9a1@gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <1429004774927-6c580df8-a4db7bb6-ea35c9a1@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-D71BB3E5-3F26-4071-BE26-9D77F470EAB9"
Content-Transfer-Encoding: 7bit
Message-Id: <5B154C21-8B0F-48B1-9479-38B4B306D0BA@cnnic.cn>
X-Mailer: iPhone Mail (11B511)
From: Zhiwei Yan <yanzhiwei@cnnic.cn>
Date: Tue, 14 Apr 2015 18:57:52 +0800
To: Linhui Sun <lh.sunlinh@gmail.com>
X-CM-TRANSID: AQAAf0AJEITI8ixVsFkwAA--.7780S2
X-Coremail-Antispam: 1UD129KBjvJXoWxur1rXF1fZr1rtw4DKr4rXwb_yoW5Zr45pF 40gFy5Kr1ktr1Ikw4kJw1kZr1Y9r45Xry7Gr9xtw18XFW3ta47tr1IyrZ8CFsrZrn3Gr4j vF1a93s8KwsxZ37anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUy0b7Iv0xC_KF4lb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I2 0VC2zVCF04k26cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rw A2F7IY1VAKz4vEj48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_JFI_Gr1l84ACjcxK6xII jxv20xvEc7CjxVAFwI0_Gr0_Cr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4 A2jsIEc7CjxVAFwI0_GcCE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAv7VC0I7IYx2IY 67AKxVWUGVWUXwAv7VC2z280aVAFwI0_Jr0_Gr1lOx8S6xCaFVCjc4AY6r1j6r4UM4x0Y4 8IcxkI7VAKI48JMx8GjcxK6IxK0xIIj40E5I8CrwCF04k20xvY0x0EwIxGrwCFx2IqxVCF s4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r106r1rMI8I3I0E7480Y4vE14v26r106r 1rMI8E67AF67kF1VAFwI0_Jrv_JF1lIxkGc2Ij64vIr41lIxAIcVC0I7IYx2IY67AKxVWU JVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIxAIcVCF04k26cxKx2IYs7xG6r 1I6r4UMIIF0xvEx4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Gr0_Gr1U YxBIdaVFxhVjvjDU0xZFpf9x07UiTmhUUUUU=
X-CM-SenderInfo: h1dq6xplzhxq5fqqxugofq/
Archived-At: <http://mailarchive.ietf.org/arch/msg/dns-privacy/bgOIRbaHt_vYoiLd4e93RXgO1mM>
Cc: dns-privacy <dns-privacy@ietf.org>, Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Subject: Re: [dns-privacy] Considering DHCP
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Apr 2015 10:58:25 -0000

We should solve two problems:
1) trust problem
2) encryption problem
No matter whether we adopt DHCP, it's better to solve them separately. I mean that it's OK if two solutions are used for these two problems.

Best Regards,
Zhiwei Yan

> 在 2015年4月14日,下午5:46,Linhui Sun <lh.sunlinh@gmail.com> 写道:
> 
> HI, Daniel
> 
> I think there is no difference when we considering which to do first. If the DHCP could offer a better way, that would be fine. However, there are several problems  in the authentication mechanism defined in RFC3118, thus the dhc WG developed another mechanism called secure DHCP (http://datatracker.ietf.org/doc/draft-ietf-dhc-sedhcpv6/ & http://datatracker.ietf.org/doc/draft-jiang-dhc-sedhcpv4/) to enhance the RFC3118.
> 
> I think the key point is whther we could trust a DHCP server just as Melinda mentioned. I'm not sure whether the secure DHCP could solve the "trust" problem, I just provided it here for reference only. If possible, an extension to DHCP may be a good way. Comments are welcome.
> 
> Best Regards,
> Linhui
> 
> 2015-04-14 12:36 GMT+08:00 Daniel Kahn Gillmor <dkg@fifthhorseman.net>:
>> [ rearranging for chronological sanity ]
>> 
>> On Tue 2015-04-14 00:02:24 -0400, Zhiwei Yan wrote:
>> > [ Paul Wouters wrote: ]
>> >> On Tue, 14 Apr 2015, Zhiwei Yan wrote:
>> >>> Then why not consider the DHCP?
>> >>> DHCP can support client authentication and can be used to configure the RS key on the authenticated client.
>> >>> Do you think this will help?
>> >>
>> >> How do you know the DHCP server is not a rogue attacker?
>> >> How does the system determine encrypting to the DHCP/DNS server is
>> >> guaranteed to not be eavesdropped on?
>> >> It depends on if I trust that network (eg my home) or not (eg starbucks)
>> >
>> > RFC 3118 provides a scheme for this issue:
>> > http://www.rfc-base.org/txt/rfc-3118.txt
>> 
>> Haven't we just pushed the problem off a level then?
>> 
>> It seems you've replaced the problem "how do i choose a trust anchor for
>> my DNS server" with "how do i choose a trust anchor for my DHCP server"?
>> 
>> And the trust anchor framework described in 3118 is pretty weak compared
>> to the trust anchor frameworks we have available in TLS (problematic
>> though some of them may be):
>> 
>>  Key Utilization:
>>  https://tools.ietf.org/html/rfc3118#section-5.4
>> 
>>  Key Management:
>>  https://tools.ietf.org/html/rfc3118#page-16
>> 
>> In those scenarios where a trust relationship already exists between a
>> DHCP client and a DHCP server, sure, we should figure out a way to
>> distribute DNS resolver trust information as well, once we know what
>> that looks like (e.g. a DHCP extension containing a SHA256-sum of the
>> DNS server's subjectPublicKeyInfo would be plausible).  But again, that
>> seems like a nice thing to have *after* we've sorted out what the DNS
>> trust anchor looks like in the manually-configured case.
>> 
>>  --dkg
>> 
>> _______________________________________________
>> dns-privacy mailing list
>> dns-privacy@ietf.org
>> https://www.ietf.org/mailman/listinfo/dns-privacy
> 
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy