Re: [dns-privacy] Martin Duke's No Objection on draft-ietf-dprive-dnsoquic-10: (with COMMENT)

Sara Dickinson <sara@sinodun.com> Tue, 22 March 2022 09:40 UTC

Return-Path: <sara@sinodun.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16D4E3A103F; Tue, 22 Mar 2022 02:40:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level:
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sinodun.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GhqWEXDxa0hD; Tue, 22 Mar 2022 02:40:32 -0700 (PDT)
Received: from haggis.mythic-beasts.com (haggis.mythic-beasts.com [IPv6:2a00:1098:0:86:1000:0:2:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A5A13A0EE8; Tue, 22 Mar 2022 02:40:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sinodun.com ; s=mythic-beasts-k1; h=To:Date:From:Subject; bh=sx848OjIKt7NuySqMedCmfwfRgFCr3cebG981vY4oz4=; b=G7uvpMbZVnrWx9lsPsLM5/itQP 9M3YOYiApqg08bYiP+76Qxy3FAzPL3YVTuLrqBkOaHRjB2tibEkoBSn5c2KkGkiOmb9fbG7H1reEe TNRHWYJYgNvhi7qHStopuVYdajhUVNw9eZxM/xnU9C29UYPPrB5sbVrNuefPqqH2t9rWemgmNUrLW iptQj8vIz0/x4Oe7W8vaNGIPnTGWzeiRMnSwZlTrx8K+g8eaNVobIkB2stDW5fhldr+htp8lOO0gf AaSc+GRZCswiZZ3agWgWl5UlG0TWaKQC8mfIu8uYxnokuVcIdOO1OaFOpBjhxaG34jGVpZVoMBGSe ng1CqDFA==;
Received: from 82-68-3-134.dsl.in-addr.zen.co.uk ([82.68.3.134]:19004 helo=smtpclient.apple) by haggis.mythic-beasts.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from <sara@sinodun.com>) id 1nWb05-0005yF-DX; Tue, 22 Mar 2022 09:40:25 +0000
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Sara Dickinson <sara@sinodun.com>
In-Reply-To: <164684766454.27683.16970508061933986550@ietfa.amsl.com>
Date: Tue, 22 Mar 2022 09:40:21 +0000
Cc: The IESG <iesg@ietf.org>, draft-ietf-dprive-dnsoquic@ietf.org, dprive-chairs@ietf.org, dns-privacy@ietf.org, brian@innovationslab.net
Content-Transfer-Encoding: quoted-printable
Message-Id: <8392E6A2-34F5-47FA-B744-6AA5E7B93CC3@sinodun.com>
References: <164684766454.27683.16970508061933986550@ietfa.amsl.com>
To: Martin Duke <martin.h.duke@gmail.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
X-BlackCat-Spam-Score: 4
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/eHsta6sJjJWUSZCbEpvT1keAnz8>
Subject: Re: [dns-privacy] Martin Duke's No Objection on draft-ietf-dprive-dnsoquic-10: (with COMMENT)
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Addition of privacy to the DNS protocol <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 09:40:42 -0000


> On 9 Mar 2022, at 17:41, Martin Duke via Datatracker <noreply@ietf.org> wrote:
> 
> Martin Duke has entered the following ballot position for
> draft-ietf-dprive-dnsoquic-10: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsoquic/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thanks for this draft! It was very easy to read.

Hi Martin,

Many thanks for the comments - please see the updates in version -11 which was just published, which we hope address your comments.

> 
> (4.3) says:
> 
> "Using QUIC might allow a protocol to disguise its purpose from devices on the
> network path using encryption and traffic analysis resistance techniques like
> padding. This specification does not include any measures that are designed to
> avoid such classification."
> 
> but then Sec 6.4 has a detailed, normative discussion of how to use padding to
> avoid classification. I suggest you delete or edit the bit in 4.3.

We’ve update the last sentence to be:
“This specification does not
 include any measures that are designed to avoid such classification --
 the padding mechanisms defined in {{padding}} are intended to obfuscate the specific
 records contained in DNS queries and responses, but not the fact that this is DNS traffic."

> 
> (5.3.1) Clients are allowed to send STOP_SENDING and servers are allowed to
> send RESET_STREAM. Servers sending STOP_SENDING break the connection. Given the
> prescriptiveness of these rules, it's odd that you don't address clients
> sending RESET_STREAM. IMO this should be allowed, but either way it should be
> specified.

We’ve added an additional paragraph at the end of this section to try to address this - please review.

> 
> (6.5.4) and (9.4) I hesitate to write this, as Christian is as well aware as
> anyone, but IMO QUIC address migration is not quite as privacy-destroying as
> this draft suggests. RFC9000 has a number of normative requirements to reduce
> linkability, and work is ongoing to reduce it further. Granted, no
> anti-linkability mitigation is perfect, and if this is a primary goal of DoQ
> it's OK to discourage migration as you've done here.

As I think you discussed with Christian, the issue being addressed is actually about disclosing the client location to the server.

Best regards

Sara.