Re: [dns-privacy] bootstrapping NS names, was re-evaluation of the draft, was Re: [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

Brian Dickson <brian.peter.dickson@gmail.com> Wed, 10 June 2020 20:59 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 752743A13BE for <dns-privacy@ietfa.amsl.com>; Wed, 10 Jun 2020 13:59:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nu8119f--snS for <dns-privacy@ietfa.amsl.com>; Wed, 10 Jun 2020 13:59:23 -0700 (PDT)
Received: from mail-ua1-x929.google.com (mail-ua1-x929.google.com [IPv6:2607:f8b0:4864:20::929]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E10DC3A13C0 for <dns-privacy@ietf.org>; Wed, 10 Jun 2020 13:59:22 -0700 (PDT)
Received: by mail-ua1-x929.google.com with SMTP id c9so1358409uao.11 for <dns-privacy@ietf.org>; Wed, 10 Jun 2020 13:59:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=98QziCTNofkJLBhdVi+Qfv73iFFlbwp+tlhQFb9ItGw=; b=k/XWWCyi/AaqQDrcr2107LXdjVLVB1yojNQaSvg9IHRTTutufplMVPAUAjI9NW52lV gz+vZyEMbhBApvVWtxV31IguysuQQBIpgsKojJrBXsPePoxtPwewjXmYyFXn3q6H4qrV rq1Cgyk0EIVk3N4X3g3y3PB87zJCI8BXvydc/AfAHJggz2jyd3JtuBEo0tpYDUI8ZZrQ rlZVqLtZsIT6SUtZGT1zqibkjyC0LFueYW9weVtyXqRdtm/9anv64o83lpSLMs6kqFBr qOq5iNSVb/D6ityFCOoHJaczFVMhJdXDWl6GHlAR4c+3doKKM4UctwhZRt+256mLslX+ ulFw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=98QziCTNofkJLBhdVi+Qfv73iFFlbwp+tlhQFb9ItGw=; b=sqAODQpSFFyiE/rbBQ4VihbSvdUaHghL8W62l/ANoK5mMAapu8Pup16VFLA/xhma6w C5gVjbqBPbar2MJDowqdauzHRV3oyKGlbwpU2lf58UoyJfdHNAXhmbZRaSnYWBAM1FQ6 H+A160Y5Y3YpXFIYdnUWrnAfYnPgAxAKJ9ySRPCq5/1zkF2IMUTSSgeklJQwsbyvDlPG w5cxVEvP/vt/gpsxABrcBHEbvt3otysHv1JIgniTKc70Om52hFUQl5Fq0fffA+rQDLEU Qd+a1qxBauvX3GQtN7vvvO/XkHfWn9WmhSJ1zku/mW20p2RwTL6kmwCCD/JR8jmLBkvf SPng==
X-Gm-Message-State: AOAM531nSvCZpf2RD/moYV1VcrSiwIwCn6eOiqZhS69PN19LLRZ9tOXa R67Dx5A3MFL9LeW4USTIPFd6zzDp77lP2wJfsrYasg==
X-Google-Smtp-Source: ABdhPJzMFmO6jeBUqyhHlJg0qTK3Z9nU6cWbxuZSu/UijzpTncsRTS4+h8Mk1vxkbF64j9JAUx8Bg8ISIF978DWmK40=
X-Received: by 2002:ab0:36a6:: with SMTP id v6mr4145968uat.62.1591822761903; Wed, 10 Jun 2020 13:59:21 -0700 (PDT)
MIME-Version: 1.0
References: <CAH1iCir5KaEr6JU5exF7VRQ2yYe6xZ-cLmwmXg3yM=eAC7di7w@mail.gmail.com> <20200610192902.EBE6B1A5CFA3@ary.qy>
In-Reply-To: <20200610192902.EBE6B1A5CFA3@ary.qy>
From: Brian Dickson <brian.peter.dickson@gmail.com>
Date: Wed, 10 Jun 2020 13:59:11 -0700
Message-ID: <CAH1iCioqG-O8VfEaSZ=mgGFt140MgjPPJfpyhEzdLUXwq7U4eQ@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: DNS Privacy Working Group <dns-privacy@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000044c92c05a7c11e41"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/od_YU1xeeb8Ysf9D4rsh0gFz63k>
Subject: Re: [dns-privacy] bootstrapping NS names, was re-evaluation of the draft, was Re: [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jun 2020 20:59:24 -0000

On Wed, Jun 10, 2020 at 12:29 PM John Levine <johnl@taugh.com> wrote:

> In article <CAH1iCir5KaEr6JU5exF7VRQ2yYe6xZ-cLmwmXg3yM=
> eAC7di7w@mail.gmail.com> you write:
> >That leaks information to an attacker ONLY if the attacker has
> successfully
> >caused the resolver to get the wrong NS name at the first step.
> >
> >There is a method for preventing that: if the delegating name server (e.g.
> >TLD) supports DNS-over-TLS-to-Authority (DoTA), and the resolver obtains
> >the unsigned NS over a TLS connection. ...
>
> Right.  We have to bootstrap somehow and this seems about as good as we
> can ask for.
>
> >The details involved in getting the TLSA record for the NS name are left
> as
> >an exercise for the reader (but are easy enough to figure out, they're
> >literally an exercise in 4033/4034/4035.)
>

I wrote "getting" meaning "querying/validating", not setting.


>
> The principle is easy. What's hard is the Provisioning Crudware(TM)
> that will have to be updated to handle TLSA glue. You might see this
> as a dealbreaker, with the alternative being to abuse DS or some other
> record that we hope the Crudware already handles.
>
>
No, this isn't TLSA glue... this is TLSA below the delegation point for the
authority server's zone (which is serving the NS name and has the TLSA
records for all those NS names).
It's TLSA on the child side of the delegation, which depends on either
trusting, or validating (somehow) the NS record for the delegation for the
zone owner's domain to the providers name server(s).
The TLSA record is for a name which is not subordinate to the zone owner's
domain, it is for a name operated by the DNS provider.

I.e. that is stuff the DNS provider is responsible for, and does not
require the zone owner to deal with.
The zone owner points at the right NS, and other than the initial DS
record, doesn't need to do anything else.


> >(The reason for this is mostly about how EPP handles host records needed
> >for maintaining TLD glue, and scalability of management of all of that.)
>
> See above.  It's not just EPP, it's the provisioning system for any DNS
> server
> that delegates a subtree to another server.
>

The presumption I make is that there is nothing to add for provisioning
this... it is literally piggy-backing on the NS, for getting the name used
for the TLS connection, and getting the corresponding TLSA record.
This still does have the problem to solve, for "protecting" the NS name
which is not signed.
The options I can think of there are DoTA to the TLD, or AXFR with TSIG or
ZONEMD, or direct queries with TSIG to the TLD.
None of these is scalable or nice, and the TSIG one requires de-anonymizing
the recursive operator, or at least registering specific TSIG keys via
unspecified anonymous/pseudonymous methods.

Brian