Re: [dns-privacy] New Version Notification for draft-bretelle-dprive-dot-for-insecure-delegations-01.txt

Ilari Liusvaara <ilariliusvaara@welho.com> Sun, 24 March 2019 18:12 UTC

Return-Path: <ilariliusvaara@welho.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2F8A12001A for <dns-privacy@ietfa.amsl.com>; Sun, 24 Mar 2019 11:12:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 005mXLIPMSjN for <dns-privacy@ietfa.amsl.com>; Sun, 24 Mar 2019 11:12:20 -0700 (PDT)
Received: from welho-filter2.welho.com (welho-filter2.welho.com [83.102.41.24]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DAA2120013 for <dns-privacy@ietf.org>; Sun, 24 Mar 2019 11:12:19 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by welho-filter2.welho.com (Postfix) with ESMTP id 106B1C3F77; Sun, 24 Mar 2019 20:12:17 +0200 (EET)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp3.welho.com ([IPv6:::ffff:83.102.41.86]) by localhost (welho-filter2.welho.com [::ffff:83.102.41.24]) (amavisd-new, port 10024) with ESMTP id JKX1UM0upFjq; Sun, 24 Mar 2019 20:12:16 +0200 (EET)
Received: from LK-Perkele-VII (87-92-19-27.bb.dnainternet.fi [87.92.19.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp3.welho.com (Postfix) with ESMTPSA id EEB172308; Sun, 24 Mar 2019 20:12:12 +0200 (EET)
Date: Sun, 24 Mar 2019 20:12:12 +0200
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: manu tman <chantr4@gmail.com>
Cc: "dns-privacy@ietf.org" <dns-privacy@ietf.org>, "Reed, Jon" <jreed@akamai.com>
Message-ID: <20190324181212.GA30295@LK-Perkele-VII>
References: <CAArYzrLNWFBPU2p06mOOBD2GFGKCoM65Lh8wN6vpNx8QuDArwA@mail.gmail.com> <6EF66B71-918D-41D4-B784-814804A87D78@akamai.com> <20190324140711.GA28961@LK-Perkele-VII> <CAArYzrKS5XAL48hvLj3Wi7HzqDdwN-43pkpLXbcY38MwaFwhaA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CAArYzrKS5XAL48hvLj3Wi7HzqDdwN-43pkpLXbcY38MwaFwhaA@mail.gmail.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/nsAwNoUfg0IsNduIL58CMU_RtWA>
Subject: Re: [dns-privacy] New Version Notification for draft-bretelle-dprive-dot-for-insecure-delegations-01.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Mar 2019 18:12:23 -0000

On Sun, Mar 24, 2019 at 06:45:31PM +0100, manu tman wrote:
> Thanks Ilari,
> 
> 
> > This proposal actually reminds me a lot of idea I had that actually
> > used DS records instead of new record type.
> >
> > AFAIK:
> > - DNSsec ignores any such record (unknown algorithm)
> >   -> No interference with DNSsec.
> > - CDS does not ignore such records.
> >   -> Automated synchnonization.
> > - Lives on parent side of delegation.
> >   -> No post-hoc authentication.
> >
> >
> I heard this idea twice today, and it sounds interesting.
> >From what I gather from Paul Wouters is that not all registrars may accept
> unknown algorithms as well as they would validate that the DS is valid by
> checking the presence of the DNSKEY in the child.
> This would seem to be the biggest hurdle.

Well, a new RRtype definitely would not work with unmodified
nameservers, since it has magic properties (it is on parent side of
zone cut without being glue).

> > The problem that idea ran into was actually the same: If DNS is
> > outsourced to some external provoder (which is actually very
> > common), then key rotations need two parties to coordinate, which
> > is a nasty problem.
> >
> 
> If CDS works, then it should be fine right?

Well, unless there are multiple provoders used at once, which
happens sometimes.

Or self-hosted DNS with cloud secondary.

> > And then there is issue that not all nameservers for zone might have
> > DoT support, and in that case, one would have to discover which ones
> > do. And NS records might not be signed, so one can not rely on those.
> >
> 
> yeah, this would be a problem, even more if using multiple providers. On
> the other hand, the NS selection heuristic should probably prefer a DoT
> nameserver over one that does not support it when possible.

DNS is not exactly delay-tolerant, so one wants to minimize timeouts
and probing (unless said probing can be parallelized).

> > One hack upon hack would be to have second key type be indirect
> > reference, which would then be looked up using new RRtype at the
> > target name. This would allow "cloud" case to work without annoying
> > coordination problems.
> >
> 
> I am not sure I am fully grasping this fully. Mind sharing a  bit more?

Something of style:

example.org. IN DS 0 137 2 <direct sha256 SPKI#1>
example.org. IN DS 0 137 42 <ns1.cloud1.example>
example.org. IN DS 0 137 42 <ns3.cloud2.example>
ns1.cloud1.example. IN IDK 2 <direct sha256 SPKI#2>
ns3.cloud2.example. IN IDK 2 <direct sha256 SPKI#3>
ns3.cloud2.example. IN IDK 2 <direct sha256 SPKI#4>

This gives four keys, presumably first is for self-hosted, the second
is for first cloud provoder, and last two are for second cloud provoder
that is rolling over its keys.



-Ilari