[dns-privacy] comments on draft-hallambaker-privatedns-01

John Heidemann <johnh@isi.edu> Thu, 23 April 2015 15:25 UTC

Return-Path: <johnh@isi.edu>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A362F1A896B for <dns-privacy@ietfa.amsl.com>; Thu, 23 Apr 2015 08:25:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2qAjMhdzwVlH for <dns-privacy@ietfa.amsl.com>; Thu, 23 Apr 2015 08:25:38 -0700 (PDT)
Received: from mail-b.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC6F41AC3FD for <dns-privacy@ietf.org>; Thu, 23 Apr 2015 08:25:16 -0700 (PDT)
Received: from dash.isi.edu (vir.isi.edu [128.9.160.91]) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id t3NFOmct024402 for <dns-privacy@ietf.org>; Thu, 23 Apr 2015 08:24:49 -0700 (PDT)
Received: from dash.isi.edu (localhost.isi.edu [127.0.0.1]) by dash.isi.edu (Postfix) with ESMTP id A59B0280BB0 for <dns-privacy@ietf.org>; Thu, 23 Apr 2015 08:24:45 -0700 (PDT)
To: dns-privacy <dns-privacy@ietf.org>
From: John Heidemann <johnh@isi.edu>
X-url: http://www.isi.edu/~johnh/
MIME-Version: 1.0 (generated by SEMI 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Date: Thu, 23 Apr 2015 08:24:45 -0700
Message-ID: <24235.1429802685@dash.isi.edu>
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: johnh@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/dns-privacy/wVNIA_MRWahE3SoTwt3nIJ4RcHQ>
Subject: [dns-privacy] comments on draft-hallambaker-privatedns-01
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2015 15:25:39 -0000

I took some time to read over draft-hallambaker-privatedns-01
carefully and take some notes.

I do not think this i-d is ready for WG adoption at this time.

My biggest concern is that the implementation complexity is unclear.
While I've heard comments about "the hard part of the problem is X and Y
is easy", but I'm having trouble assessing that in two ways.

First: how big is the spec?  While this i-d is short, it seems to depend
on [draft-hallambaker-wsconnect-08] which is another 34 pages of specs.
How do DNS implementers evaluate the effort in this aggregate?

Second, whatever protocol we pick must result in multiple independent
implementations.  It seems important to understand how many independent
implementations of there are today, and roughly how many lines of code
they entail.  While it doesn't belong in the i-d, it would be great to
hear more about this.

Detailed comments are below.

   -John Heidemann

----------------------------------------------------------------------

overall comments:

section 1:

"Private-DNS makes use of the JSON Service Connect (JCX) Protocol [I-
D.hallambaker-wsconnect] and the UYFM framing protocol described in that
specification.":  This reference seems to hide a fair bit of
complexity.  JCX may be "easy" (afterall, IETF already has 3 or 4
RPC-like protocols), but if I were a DNS software provider I read this
sentence and get concerned about implementation time.  Although not for
the i-d, one might wish to clarify the availability of libraries for
this protocol (ideally with different licensing), and the sizes of those
libraries (for people who will roll their own).

section 1.1:  "Like the Omnibroker protocol
[I-D.hallambaker-omnibroker], this proposal is built on JCX
[I-D.hallambaker-wsconnect]...":  I see [I-D.hallambaker-omnibroker] is
listed as normative.  Is that correct, or should it be informative?
(Again, I'm thinking about the minimum necessary implementation.)

section 2.1.1: "Following the use case [[U-PUBLIC] described in
[I-D.hallambaker- dnse], ...": DPRIVE seems to have settled on
draft-ietf-dprive-problem-statement-04 as a problem statement.  Does it
make sense to point at examples in that document?

"Since the example.com service does not require authentication...": why
is authentication not required here?  If Alice trusts her ISP, then
confidentiality is not required.  If she does not trust it, isn't
authentication necessary to prevent a person-in-the-middle attack?

section 2.1.2:  this section goes into challenge-repsonse.  Why is this
required since you already established a TLS session, thus presumably
proving identity and freshness?

setion 2: " The Query Protocol Binding wraps the [RFC1035] message structure 
rather than eliminating parts that are redundant. For example, the 
Query Protocol Binding Transaction ID which has a minimum length of 
128 bits supplements rather than replaces the DNS message transaction
ID...": should the i-d specific exactly which fields of the embedded
[RFC1035] query are to be replaced?

Overall, this section gives explicit examples about encodings,
but it doesn't actually specify the formatting.
For example, section 2.2.2.1 extracts keys
from the ticket, but ticket format is not specified in the i-d.

If these formatting details are external, I thinkthe section should clarify
that and give the reference.


section 2.2.3:  "A Private-DNS server MUST authenticate queries.".
Where is authentication specified?  


section 4. "Security Considerationsns" has placeholders for
confidentiality/integrity/access.  Since the goal of DPRIVE is to
improve security, it would be nice to fill in at least the
confidentiality subsection.

(The document could also be spellechecked.: s/Derrivation/Derivation/,
and s/Considerationsns/Considerations/.)