Re: [dns-privacy] Some additional signalling ideas

Ilari Liusvaara <ilariliusvaara@welho.com> Sun, 31 March 2019 14:22 UTC

Return-Path: <ilariliusvaara@welho.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CA401203B8 for <dns-privacy@ietfa.amsl.com>; Sun, 31 Mar 2019 07:22:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5PgJggJAkSrx for <dns-privacy@ietfa.amsl.com>; Sun, 31 Mar 2019 07:22:07 -0700 (PDT)
Received: from welho-filter1.welho.com (welho-filter1.welho.com [83.102.41.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B15F11201DF for <dns-privacy@ietf.org>; Sun, 31 Mar 2019 07:22:07 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by welho-filter1.welho.com (Postfix) with ESMTP id 5D18715FE9; Sun, 31 Mar 2019 17:22:05 +0300 (EEST)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp2.welho.com ([IPv6:::ffff:83.102.41.85]) by localhost (welho-filter1.welho.com [::ffff:83.102.41.23]) (amavisd-new, port 10024) with ESMTP id dI22MTDXcrew; Sun, 31 Mar 2019 17:22:05 +0300 (EEST)
Received: from LK-Perkele-VII (87-92-19-27.bb.dnainternet.fi [87.92.19.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp2.welho.com (Postfix) with ESMTPSA id A452972; Sun, 31 Mar 2019 17:22:02 +0300 (EEST)
Date: Sun, 31 Mar 2019 17:22:02 +0300
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: Watson Ladd <watsonbladd@gmail.com>
Cc: dns-privacy@ietf.org
Message-ID: <20190331142202.GA2307@LK-Perkele-VII>
References: <CACsn0ck-SNweieak5Fn7TOLLZTvsQNo6+w3nezxKuZPq0Z4QNA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CACsn0ck-SNweieak5Fn7TOLLZTvsQNo6+w3nezxKuZPq0Z4QNA@mail.gmail.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/hvmAFjBHYCKmJWkaAbpWRg6_mzg>
Subject: Re: [dns-privacy] Some additional signalling ideas
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 31 Mar 2019 14:22:12 -0000

On Sun, Mar 31, 2019 at 05:48:21AM -0700, Watson Ladd wrote:
> Dear all,
> Please rip these ideas to shreds:
> 1) An extra bit in a response for "you could have asked over TLS"

Seems vulernable to downgrade attacks. And seemignly leaves obtaining
the authentication data as open problem.

> 2) An extra field when looking up the nameserver for  "you can ask
> that server over TLS"
> 3) An extra field/bit/convention for "this nameserver supports tls"
> (like tls-ns vs ns)

There are only two records that live on parent side of zone cut, namely
NS and DS (then sometimes one sees "glue" A/AAAA records, needed to
break  chicken-and-egg problem if nameservers for zone are inside zone
itself).

NS is AFAICT not signed, and can only contain hostname of the
nameserver. There are some nasty hacks that code the key into this
name, but those suffer from variety of issues (problems with "cloud"
DNS provoders[1], difficulty of rolling keys, etc...).

DS is signed, and has algorithm field. Supposedly unknown algorithms
are ignored, but there are buggy nameservers out there that break if
all DS entries have unknown algorithm. And turns out abusing DS
records also runs into issues with "cloud" DNS provoders.

Adding another RRtype with needed magic properties would take Standards
Action (as expert review requires RRtype not to be magic) and then
updating parent nameservers to be able to deal with the RRtype (since
it can not be generically handled). And trying to add extra fields to
NS or DS is sure to cause horrible borkage.

One could possibly hack around the "cloud" problems by adding yet
another RRtype (that is not magic from DNS data model perspective)
that lives under the nameserver name and contains the final keys
(and adding an optional layer of indirection).

Adding records at child side of cut has its own issues, namely that
retroactive authentication can be annoying to implement, and it is
more difficult to make the thing work without full DNSSEC chain
(glue records, if parent supports that?).


-Ilari