Re: [dns-privacy] Some additional signalling ideas
Ilari Liusvaara <ilariliusvaara@welho.com> Sun, 31 March 2019 14:22 UTC
Return-Path: <ilariliusvaara@welho.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CA401203B8 for <dns-privacy@ietfa.amsl.com>; Sun, 31 Mar 2019 07:22:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5PgJggJAkSrx for <dns-privacy@ietfa.amsl.com>; Sun, 31 Mar 2019 07:22:07 -0700 (PDT)
Received: from welho-filter1.welho.com (welho-filter1.welho.com [83.102.41.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B15F11201DF for <dns-privacy@ietf.org>; Sun, 31 Mar 2019 07:22:07 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by welho-filter1.welho.com (Postfix) with ESMTP id 5D18715FE9; Sun, 31 Mar 2019 17:22:05 +0300 (EEST)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp2.welho.com ([IPv6:::ffff:83.102.41.85]) by localhost (welho-filter1.welho.com [::ffff:83.102.41.23]) (amavisd-new, port 10024) with ESMTP id dI22MTDXcrew; Sun, 31 Mar 2019 17:22:05 +0300 (EEST)
Received: from LK-Perkele-VII (87-92-19-27.bb.dnainternet.fi [87.92.19.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp2.welho.com (Postfix) with ESMTPSA id A452972; Sun, 31 Mar 2019 17:22:02 +0300 (EEST)
Date: Sun, 31 Mar 2019 17:22:02 +0300
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: Watson Ladd <watsonbladd@gmail.com>
Cc: dns-privacy@ietf.org
Message-ID: <20190331142202.GA2307@LK-Perkele-VII>
References: <CACsn0ck-SNweieak5Fn7TOLLZTvsQNo6+w3nezxKuZPq0Z4QNA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CACsn0ck-SNweieak5Fn7TOLLZTvsQNo6+w3nezxKuZPq0Z4QNA@mail.gmail.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/hvmAFjBHYCKmJWkaAbpWRg6_mzg>
Subject: Re: [dns-privacy] Some additional signalling ideas
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 31 Mar 2019 14:22:12 -0000
On Sun, Mar 31, 2019 at 05:48:21AM -0700, Watson Ladd wrote: > Dear all, > Please rip these ideas to shreds: > 1) An extra bit in a response for "you could have asked over TLS" Seems vulernable to downgrade attacks. And seemignly leaves obtaining the authentication data as open problem. > 2) An extra field when looking up the nameserver for "you can ask > that server over TLS" > 3) An extra field/bit/convention for "this nameserver supports tls" > (like tls-ns vs ns) There are only two records that live on parent side of zone cut, namely NS and DS (then sometimes one sees "glue" A/AAAA records, needed to break chicken-and-egg problem if nameservers for zone are inside zone itself). NS is AFAICT not signed, and can only contain hostname of the nameserver. There are some nasty hacks that code the key into this name, but those suffer from variety of issues (problems with "cloud" DNS provoders[1], difficulty of rolling keys, etc...). DS is signed, and has algorithm field. Supposedly unknown algorithms are ignored, but there are buggy nameservers out there that break if all DS entries have unknown algorithm. And turns out abusing DS records also runs into issues with "cloud" DNS provoders. Adding another RRtype with needed magic properties would take Standards Action (as expert review requires RRtype not to be magic) and then updating parent nameservers to be able to deal with the RRtype (since it can not be generically handled). And trying to add extra fields to NS or DS is sure to cause horrible borkage. One could possibly hack around the "cloud" problems by adding yet another RRtype (that is not magic from DNS data model perspective) that lives under the nameserver name and contains the final keys (and adding an optional layer of indirection). Adding records at child side of cut has its own issues, namely that retroactive authentication can be annoying to implement, and it is more difficult to make the thing work without full DNSSEC chain (glue records, if parent supports that?). -Ilari
- [dns-privacy] Some additional signalling ideas Watson Ladd
- Re: [dns-privacy] Some additional signalling ideas Ralf Weber
- Re: [dns-privacy] Some additional signalling ideas Ilari Liusvaara
- Re: [dns-privacy] Some additional signalling ideas Watson Ladd
- Re: [dns-privacy] Some additional signalling ideas Paul Wouters
- Re: [dns-privacy] Some additional signalling ideas Alexander Mayrhofer
- Re: [dns-privacy] Some additional signalling ideas Stephen Farrell
- Re: [dns-privacy] Some additional signalling ideas Alexander Mayrhofer
- Re: [dns-privacy] Some additional signalling ideas Tony Finch
- Re: [dns-privacy] Some additional signalling ideas Peter van Dijk
- Re: [dns-privacy] Some additional signalling ideas Ilari Liusvaara
- Re: [dns-privacy] Some additional signalling ideas Ralf Weber