Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

Paul Wouters <paul@nohats.ca> Thu, 28 May 2020 01:27 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 482803A0819 for <dns-privacy@ietfa.amsl.com>; Wed, 27 May 2020 18:27:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Go9lN6GhT0ZM for <dns-privacy@ietfa.amsl.com>; Wed, 27 May 2020 18:27:43 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1FCC3A080E for <dns-privacy@ietf.org>; Wed, 27 May 2020 18:27:43 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 49XVSF67JHz7R0; Thu, 28 May 2020 03:27:41 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1590629261; bh=3RXNuTpE/KYP1wZ7MS3LpnvnsuA1N08NFfFTFDT4VRE=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=YVjyksTuukZmOq2BX+r+FJlf6/DWVEw27z2HvV8ryn5BjvbWPWSdQWtnu+lBkrbSU L4GmNysLHPVdn6c7X40tw/h6mzLgHX7+X6TPSlHzWJeMY1RQ2D+LEHNvPUu4ddL4w2 CGcsxVzGuoivUZX+lPy4cKdPgMcHjLzwjgZQ5ZB8=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 0gCv_3-1FnJc; Thu, 28 May 2020 03:27:40 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Thu, 28 May 2020 03:27:40 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 5F7F36029B9B; Wed, 27 May 2020 21:27:39 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 5B91F66B7C; Wed, 27 May 2020 21:27:39 -0400 (EDT)
Date: Wed, 27 May 2020 21:27:39 -0400
From: Paul Wouters <paul@nohats.ca>
To: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>
cc: Peter van Dijk <peter.van.dijk@powerdns.com>, dns-privacy@ietf.org
In-Reply-To: <CAHbrMsAhKB9=nPfnmYzT-tu8-XMYNwyyuYM3T9106iWNzPpDAQ@mail.gmail.com>
Message-ID: <alpine.LRH.2.21.2005272118320.18445@bofh.nohats.ca>
References: <158987990316.29446.4343920282978207647@ietfa.amsl.com> <a15e2d1df86820f2483516662d3712d8a60161cd.camel@powerdns.com> <alpine.LRH.2.21.2005191134560.13722@bofh.nohats.ca> <ec6bc9248179a9ab56ea490f82b14c7e90ffe819.camel@powerdns.com> <alpine.LRH.2.21.2005241222410.4172@bofh.nohats.ca> <77f7a9c38c6bd0a059679a7ab3027b4da9005512.camel@powerdns.com> <alpine.LRH.2.21.2005241710490.10453@bofh.nohats.ca> <5653e4dd2ab6daa648387808a3ac04e088bbc89b.camel@powerdns.com> <CAHbrMsDKQqfnoty+cRa5bJ=zVkONYTbFf-=8hzAj0E7pWeFXug@mail.gmail.com> <a8f44365b9b3a079753f8286cc19fbb241996bf5.camel@powerdns.com> <CAHbrMsAhKB9=nPfnmYzT-tu8-XMYNwyyuYM3T9106iWNzPpDAQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/jOAROL5X_Y6XG7v-XcO3FNz_fy0>
Subject: Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 May 2020 01:27:45 -0000

On Wed, 27 May 2020, Ben Schwartz wrote:

> I agree that the TLS DNSSEC chain extension isn't substantially deployed today, but I don't think that should stop us from using it if
> it would help.  This use case is important enough to drive deployment.

If people really want to avoid doing an extra RTT, then I guess this
extension could be used. But you would still need to have some kind of
TLS server SAN with FQDN conveyed within the DS record. Having a single
bit in the DS signifying "yes there is DoT", isn't enough if the
additional glue NS records can point to any machine with a valid TLSA
chain.

> Using this extension would indeed require the authoritative server to provide TLSA records for its own name.  I don't think it actually
> has to "resolve its own name", because it can choose a name that is in-bailiwick.  Servers can choose an in-bailiwick authentication
> name even if existing NS records have an out-of-bailiwick name.  If an authoritative server has multiple names, it would presumably
> identify the right one from the TLS-SNI.

The nameserver name has to be known (from DS) before the resolver
connects to the DoT server. How the DoT server would identify itself,
via TLSA or via fake DNSKEY doesn't really matter as it can just provide
whatever we decide to use.

Personally, I think it would be cleanest if we use the DS to signal
the DoT nameserver only by FQDN. Then connect to it and get the TLS
chain containing the TLSA record and the CDS that matches the DS.

That way, we can avoid adding pseudo-DNSKEY records. I understand not
every registry supports DS/CDS, but I think if you want to deploy
this, you cannot be depending on humands anything, so CDS or CDNSKEY
support would be a requirement anyway. Let's just convince those
registries that support CDNSKEY but not CDS, that they need to fix
things. It would make everything a LOT cleaner and we got no bogus
DNSKEY records to ignore in our DNSSEC validation path.

Paul