Re: [dns-privacy] New Version Notification for draft-bretelle-dprive-dot-spki-in-ns-name-00.txt

manu tman <chantr4@gmail.com> Tue, 12 March 2019 01:17 UTC

Return-Path: <chantr4@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A894713123C for <dns-privacy@ietfa.amsl.com>; Mon, 11 Mar 2019 18:17:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.748
X-Spam-Level:
X-Spam-Status: No, score=-1.748 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n-qXrFHgCEqS for <dns-privacy@ietfa.amsl.com>; Mon, 11 Mar 2019 18:17:08 -0700 (PDT)
Received: from mail-io1-xd2b.google.com (mail-io1-xd2b.google.com [IPv6:2607:f8b0:4864:20::d2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95CF4131209 for <dns-privacy@ietf.org>; Mon, 11 Mar 2019 18:17:08 -0700 (PDT)
Received: by mail-io1-xd2b.google.com with SMTP id f6so633504iop.3 for <dns-privacy@ietf.org>; Mon, 11 Mar 2019 18:17:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=5EOXnuRu4maQOASAtjiwqJ0O61uBMUVS5GBf7w4ed3Q=; b=ORfC0Ga7gOG+9wgChem4fspx5rns6egjAk8rUqSVScTBe3MzWNBgp0eq2XExhsvm0M vappOH49pIvKvc6MPiIsSBbKql+li3vSltZ/m80k9zsvEFt4MRoiiRxXElORxAAXyp8Q hO9/sYUkAVsZZzedHHKfUuZjU+ZqNcMfvTymMUXwgXzlcxExrsike8SrditkJ94sHzDF DTqHG2dX62Q/hXqPGBbJt4f5cF1j0ia4O4IdoHd/5K6Gq9S+xNUibm6oDIZOp3DgEzXD fuKMW41+phxOC1ZeeDQLRSwbQbV2vdzzr5tMnlbkHQFcv07jtjMSUBcizQ+btrs7jEkW 7ikg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=5EOXnuRu4maQOASAtjiwqJ0O61uBMUVS5GBf7w4ed3Q=; b=UfxljM/ef5v0tTh9b1re8Be8V+frajsB+qWHd6lyqR+mMKgU41A89WSwDivXfDIuxX Vz66u/96O5wzas5pim+i0zJF8Fy2Y+JHPDEJGfsmcUPJVDWY2K7zsuF6NbeGx6YKNLqw jzYM+Pwll9jTIhcxA9khBJ4NMSJXPBbi33OZ6p6Nq73ZAvguq581W80CJroR0hqSIM+z HBlrflXa/FCBCuKVxnWCkxFK18xdVSt8NYuaX4b/dYDFmZAUiw0QbmEulaBmZijX6XvO sDO/VmH6+l8WrgsQAQDsRPaIrohic3kTU5jYtBeWzfqYqfPBmOw9Z7j57gLToZOgx1Sh 3XdQ==
X-Gm-Message-State: APjAAAU548wdaYa/i/xr+8ZbUth/+2HJpTxn3L5iIxEJ0xZKG5b8lMJQ OF5YX3ovwh1m25simvGwoPUaiNzXXpPGB3SBJe5nRx5Y
X-Google-Smtp-Source: APXvYqxs6qA+yqILwHXsXrmZ1h12Rk3IJLRH75ygyvRPLGxijGoWqY6vp86IoNhKA+YogEqbfBfKLhUZz4Pwou3BJnQ=
X-Received: by 2002:a6b:f40d:: with SMTP id i13mr6042881iog.135.1552353427798; Mon, 11 Mar 2019 18:17:07 -0700 (PDT)
MIME-Version: 1.0
References: <CAArYzrLkzYgruSwGLuHEBqH-GqhGQOAKnk=m_4QZJRfW1zEeGw@mail.gmail.com> <638529ee-5df0-ad8a-6c2b-859667c94797@andreasschulze.de>
In-Reply-To: <638529ee-5df0-ad8a-6c2b-859667c94797@andreasschulze.de>
From: manu tman <chantr4@gmail.com>
Date: Mon, 11 Mar 2019 18:16:56 -0700
Message-ID: <CAArYzrL98Qg0-3yNens3WjGBQBpvLapnDLCtqXzYFg1OUXJmmg@mail.gmail.com>
To: "A. Schulze" <sca@andreasschulze.de>
Cc: dns-privacy@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a144590583db72b6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/fy2a5cGyAl7lW0BfY9tMldbP7lM>
Subject: Re: [dns-privacy] New Version Notification for draft-bretelle-dprive-dot-spki-in-ns-name-00.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Mar 2019 01:17:11 -0000

Thanks Andreas,

> what's the reason for "In opportunistic mode, the resolver MUST use the
authoritative name server despite the failure." ?
> A server operator can't distinguish between a resolver in strict mode an
a resolver in opportunistic mode TOGETHER with a failure (on server side?)
> An other option is to force any resolver supporting "dot-" names to fall
back on port 53.

What I meant is roughly around the line of
https://tools.ietf.org/html/draft-bortzmeyer-dprive-resolver-to-auth-01#section-2
. e.g if you operate a resolver in strict mode, and DoT fails (connection
to port 853, fail to validate SPKI) while the name of the name server
indicates that DoT is supported. The resolver should fail.
In opportunistic mode, the resolver will fallback onto port 53. The
operator of the resolver will be setting the mode of operation.

Thanks,
Manu

On Mon, Mar 11, 2019 at 12:12 PM A. Schulze <sca@andreasschulze.de> wrote:

>
>
> Am 11.03.19 um 17:20 schrieb manu tman:
> > I have captured in a draft the mechanism I used during IETF 103
> hackathon and which is available aan experimental module in
> knot-resolver[0].
> >  I was taken short with time before cit-off date, but I hope this will
> better explain how it works.
>
> Hello,
>
> for many years I run a dnscurve proxy [1] infront of my nameservers.
> Worked perfect but virtually nobody used the encryption feature.
> So, the draft *is* interesting to me...
>
> two points comes to my mind while reading the draft:
>
> 1.
> key rotation is hard.
>
> 2.
> what's the reason for "In opportunistic mode, the resolver MUST use the
> authoritative name server despite the failure." ?
> A server operator can't distinguish between a resolver in strict mode an a
> resolver in opportunistic mode TOGETHER with a failure (on server side?)
> An other option is to force any resolver supporting "dot-" names to fall
> back on port 53.
>
> Andreas
>
> [1] http://curvedns.on2it.net/
>
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy
>