Re: [dns-privacy] DPRIVE client with captive portal

"Christian Huitema" <huitema@huitema.net> Mon, 08 August 2016 22:16 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81C2212D0CB for <dns-privacy@ietfa.amsl.com>; Mon, 8 Aug 2016 15:16:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level:
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b0VxgjWSQdg6 for <dns-privacy@ietfa.amsl.com>; Mon, 8 Aug 2016 15:16:50 -0700 (PDT)
Received: from xsmtp03.mail2web.com (xsmtp03.mail2web.com [168.144.250.223]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B271C12D56D for <dns-privacy@ietf.org>; Mon, 8 Aug 2016 15:16:44 -0700 (PDT)
Received: from [10.5.2.15] (helo=xmail05.myhosting.com) by xsmtp03.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1bWsqg-0000iU-JM for dns-privacy@ietf.org; Mon, 08 Aug 2016 18:16:43 -0400
Received: (qmail 10707 invoked from network); 8 Aug 2016 22:16:41 -0000
Received: from unknown (HELO huitema2) (Authenticated-user:_huitema@huitema.net@[131.107.159.2]) (envelope-sender <huitema@huitema.net>) by xmail05.myhosting.com (qmail-ldap-1.03) with ESMTPA for <dns-privacy@ietf.org>; 8 Aug 2016 22:16:41 -0000
From: Christian Huitema <huitema@huitema.net>
To: 'John Heidemann' <johnh@isi.edu>, 'Dan Wing' <dwing@cisco.com>
References: <ED71C48A-26C7-438D-859C-521122136606@cisco.com> <26953.1470688151@dash.isi.edu>
In-Reply-To: <26953.1470688151@dash.isi.edu>
Date: Mon, 08 Aug 2016 15:16:39 -0700
Message-ID: <032501d1f1c2$8a42ad30$9ec80790$@huitema.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQKhTu5j+9KlK9UaYHYLGDeDE1zOwQGuA9PRnpN1kIA=
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/kh5t5hq_oT9m3QNaogAjZu7pagM>
Cc: 'dns-privacy' <dns-privacy@ietf.org>
Subject: Re: [dns-privacy] DPRIVE client with captive portal
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2016 22:16:54 -0000

On Monday, August 8, 2016 1:29 PM, John Heidemann wrote:
> 
> On Mon, 08 Aug 2016 10:49:17 -0700, =?utf-8?Q?=F0=9F=94=93Dan_Wing?=
> wrote:
> >Are there documented procedures for how a DPRIVE client handles joining a
> network with a captive portal, or other filtering, which prevents
accessing the
> DPRIVE DNS server?
> 
> Yes.  From RFC-7858 section 4.2:
> 
>    However, a configured DNS server may be temporarily unavailable when
>    configuring a network.  For example, for clients on networks that
>    require authentication through web-based login, such authentication
>    may rely on DNS interception and spoofing.  Techniques such as those
>    used by DNSSEC-trigger [DNSSEC-TRIGGER] MAY be used during network
>    configuration, with the intent to transition to the designated DNS
>    provider after authentication.  The user MUST be alerted whenever
>    possible that the DNS is not private during such bootstrap.

There is also a mention of that in section 4.2 of
draft-ietf-dprive-dtls-and-tls-profiles-03. The description of "strict
privacy" includes the mention that there may be queries sent before
authenticating the server. The text says:

                            This profile can include some initial meta
queries
      (performed using Opportunistic Privacy) to securely obtain the IP
      address and authentication information for the privacy-enabling
      DNS server to which the DNS client will subsequently connect.

Then there is complement text is Section 6:

   A privacy-enabling DNS server may be temporarily unavailable when
   configuring a network.  For example, for clients on networks that
   require registration through web-based login (a.k.a. "captive
   portals"), such registration may rely on DNS interception and
   spoofing.  Techniques such as those used by DNSSEC-trigger
   [dnssec-trigger] MAY be used during network configuration, with the
   intent to transition to the designated privacy-enabling DNS servers
   after captive portal registration.  The system MUST alert by some
   means that the DNS is not private during such bootstrap.

Seems that the case is covered.

-- Christian Huitema