Re: [dns-privacy] New Version Notification for draft-bretelle-dprive-dot-for-insecure-delegations-01.txt
Ilari Liusvaara <ilariliusvaara@welho.com> Sun, 24 March 2019 18:12 UTC
Return-Path: <ilariliusvaara@welho.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2F8A12001A for <dns-privacy@ietfa.amsl.com>; Sun, 24 Mar 2019 11:12:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 005mXLIPMSjN for <dns-privacy@ietfa.amsl.com>; Sun, 24 Mar 2019 11:12:20 -0700 (PDT)
Received: from welho-filter2.welho.com (welho-filter2.welho.com [83.102.41.24]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DAA2120013 for <dns-privacy@ietf.org>; Sun, 24 Mar 2019 11:12:19 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by welho-filter2.welho.com (Postfix) with ESMTP id 106B1C3F77; Sun, 24 Mar 2019 20:12:17 +0200 (EET)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp3.welho.com ([IPv6:::ffff:83.102.41.86]) by localhost (welho-filter2.welho.com [::ffff:83.102.41.24]) (amavisd-new, port 10024) with ESMTP id JKX1UM0upFjq; Sun, 24 Mar 2019 20:12:16 +0200 (EET)
Received: from LK-Perkele-VII (87-92-19-27.bb.dnainternet.fi [87.92.19.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp3.welho.com (Postfix) with ESMTPSA id EEB172308; Sun, 24 Mar 2019 20:12:12 +0200 (EET)
Date: Sun, 24 Mar 2019 20:12:12 +0200
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: manu tman <chantr4@gmail.com>
Cc: "dns-privacy@ietf.org" <dns-privacy@ietf.org>, "Reed, Jon" <jreed@akamai.com>
Message-ID: <20190324181212.GA30295@LK-Perkele-VII>
References: <CAArYzrLNWFBPU2p06mOOBD2GFGKCoM65Lh8wN6vpNx8QuDArwA@mail.gmail.com> <6EF66B71-918D-41D4-B784-814804A87D78@akamai.com> <20190324140711.GA28961@LK-Perkele-VII> <CAArYzrKS5XAL48hvLj3Wi7HzqDdwN-43pkpLXbcY38MwaFwhaA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CAArYzrKS5XAL48hvLj3Wi7HzqDdwN-43pkpLXbcY38MwaFwhaA@mail.gmail.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/nsAwNoUfg0IsNduIL58CMU_RtWA>
Subject: Re: [dns-privacy] New Version Notification for draft-bretelle-dprive-dot-for-insecure-delegations-01.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Mar 2019 18:12:23 -0000
On Sun, Mar 24, 2019 at 06:45:31PM +0100, manu tman wrote: > Thanks Ilari, > > > > This proposal actually reminds me a lot of idea I had that actually > > used DS records instead of new record type. > > > > AFAIK: > > - DNSsec ignores any such record (unknown algorithm) > > -> No interference with DNSsec. > > - CDS does not ignore such records. > > -> Automated synchnonization. > > - Lives on parent side of delegation. > > -> No post-hoc authentication. > > > > > I heard this idea twice today, and it sounds interesting. > >From what I gather from Paul Wouters is that not all registrars may accept > unknown algorithms as well as they would validate that the DS is valid by > checking the presence of the DNSKEY in the child. > This would seem to be the biggest hurdle. Well, a new RRtype definitely would not work with unmodified nameservers, since it has magic properties (it is on parent side of zone cut without being glue). > > The problem that idea ran into was actually the same: If DNS is > > outsourced to some external provoder (which is actually very > > common), then key rotations need two parties to coordinate, which > > is a nasty problem. > > > > If CDS works, then it should be fine right? Well, unless there are multiple provoders used at once, which happens sometimes. Or self-hosted DNS with cloud secondary. > > And then there is issue that not all nameservers for zone might have > > DoT support, and in that case, one would have to discover which ones > > do. And NS records might not be signed, so one can not rely on those. > > > > yeah, this would be a problem, even more if using multiple providers. On > the other hand, the NS selection heuristic should probably prefer a DoT > nameserver over one that does not support it when possible. DNS is not exactly delay-tolerant, so one wants to minimize timeouts and probing (unless said probing can be parallelized). > > One hack upon hack would be to have second key type be indirect > > reference, which would then be looked up using new RRtype at the > > target name. This would allow "cloud" case to work without annoying > > coordination problems. > > > > I am not sure I am fully grasping this fully. Mind sharing a bit more? Something of style: example.org. IN DS 0 137 2 <direct sha256 SPKI#1> example.org. IN DS 0 137 42 <ns1.cloud1.example> example.org. IN DS 0 137 42 <ns3.cloud2.example> ns1.cloud1.example. IN IDK 2 <direct sha256 SPKI#2> ns3.cloud2.example. IN IDK 2 <direct sha256 SPKI#3> ns3.cloud2.example. IN IDK 2 <direct sha256 SPKI#4> This gives four keys, presumably first is for self-hosted, the second is for first cloud provoder, and last two are for second cloud provoder that is rolling over its keys. -Ilari
- Re: [dns-privacy] New Version Notification for dr… Peter van Dijk
- [dns-privacy] New Version Notification for draft-… manu tman
- Re: [dns-privacy] New Version Notification for dr… Reed, Jon
- Re: [dns-privacy] New Version Notification for dr… manu tman
- Re: [dns-privacy] New Version Notification for dr… Ilari Liusvaara
- Re: [dns-privacy] New Version Notification for dr… manu tman
- Re: [dns-privacy] New Version Notification for dr… Ilari Liusvaara
- Re: [dns-privacy] New Version Notification for dr… Tony Finch