Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq

Eric Rescorla <ekr@rtfm.com> Sat, 27 March 2021 00:24 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C19693A17A5 for <dns-privacy@ietfa.amsl.com>; Fri, 26 Mar 2021 17:24:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hAHz7z0voB1S for <dns-privacy@ietfa.amsl.com>; Fri, 26 Mar 2021 17:24:40 -0700 (PDT)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EAD93A17A4 for <dns-privacy@ietf.org>; Fri, 26 Mar 2021 17:24:39 -0700 (PDT)
Received: by mail-lf1-x12c.google.com with SMTP id 75so10213278lfa.2 for <dns-privacy@ietf.org>; Fri, 26 Mar 2021 17:24:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=0oJRLmlwwEzM6/foh0LLCbG7XKF7UXRSGc0Fl3aLY0o=; b=k5Ah8lSEdF6D3w0vi4X6nNIeaZFTp2w4CEb/uuXU0zJe+aN6sSqpWRA8FtkvlF2nHP tRMSSX/ALgtP97E3W06kZaW4vhE83CYbodN76/zVD4kc8oJoQAfM7k8CZwZLSVGZmzL/ ayL0jUyESO7LvvuMJzstWmkNdCKmzHiVeTlCgkVQ74HYxYGVzuAwb1DqfLoGAPvNB1gt QCyZMnHSswpvQOfbOWCdEX1EUI/JuYwN+IKP+r0WxDviFEdEfLcXyfy23mWnD+JjxMw7 jHP5eI02WTP32a7iH4noQYgEC7JTXBiSHTrtJ6YvneMODLONH3cEtR8OXDMIXa9rSUDw tKcw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0oJRLmlwwEzM6/foh0LLCbG7XKF7UXRSGc0Fl3aLY0o=; b=AxFL0PWiKZql+nFppRx+CCFEoWuCeBe8Qyg5P10w1LT2RrMU8is9yyhfPk8/Vt9tP2 JZtoKEudgAgCMZfiFe3cBC5w7l+4SYxVK9wahdE3U1XB6e85A96YFrfszWAHvoPOX6Wj z9OeAT7qf8d7wXC+BJEKwyQzPF6T1Qa29FT9Y0gvEFvs4ZSwEcQmiQrdervGJzHbzLaB PpJvX/u+s0MmJwYQz9J5ZtamXFhAKt4d7v8XpgLboCMYWTAXPcguhhH89i5ytt0u44bP 7QTITmv9KTPhXoaEB+D4BjpCk6cc2A/qXRQSqK32ETpn+/zwuACFg9BxCxYs97l7eFYO ixGw==
X-Gm-Message-State: AOAM530u2pLppugNrFxARo08T2A82z8TeU8i7AU30y9Q9ATltUtWWOI0 sBLeyPENNtBTBBi6wVA1ObX4+vWX6TAsR8m+MTAuvQ==
X-Google-Smtp-Source: ABdhPJx1/bhRV3AkUsRaNefP9ikoGfNGgI412ZJNqK7Qigc146zEESn+3NTsm8qvrpnhQNUL/CWEe7/rG1rX36EoPXw=
X-Received: by 2002:ac2:4d9b:: with SMTP id g27mr9699143lfe.113.1616804677629; Fri, 26 Mar 2021 17:24:37 -0700 (PDT)
MIME-Version: 1.0
References: <A68841F4-B7CC-4AAC-BC9F-0961ADF2C8FA@rfc1035.com> <DF40D081-1EA8-4E92-BB67-2966E32688DE@nohats.ca> <2E5B5290-CBBE-4F20-AD89-0BDCE3B2AA7F@pch.net> <DB196A4D-2720-4C9E-8A66-C314AB16BA0E@rfc1035.com> <A45C3DAA-C910-427A-9359-E38570D274D3@pch.net> <C6C1D17A-CE7B-4189-BC63-69FD2C5E9FD8@rfc1035.com>
In-Reply-To: <C6C1D17A-CE7B-4189-BC63-69FD2C5E9FD8@rfc1035.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 26 Mar 2021 17:24:01 -0700
Message-ID: <CABcZeBMHXHY28y3KD=b7+KVkKhZ=A=du-2fJiG2=5oEYgm1ZRQ@mail.gmail.com>
To: Jim Reid <jim@rfc1035.com>
Cc: Bill Woodcock <woody@pch.net>, DNS Privacy Working Group <dns-privacy@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007b4e3805be79ac88"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/woNuhg8cf6-PaFYDakPfDFjOAew>
Subject: Re: [dns-privacy] [Ext] next steps for draft-opportunistic-adotq
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Mar 2021 00:24:45 -0000

On Wed, Mar 24, 2021 at 7:56 AM Jim Reid <jim@rfc1035.com> wrote:

>
>
> > On 24 Mar 2021, at 14:10, Bill Woodcock <woody@pch.net> wrote:
> >
> > How many mqps are necessary to have a voice in your vision of
> multistakeholderism?
>
> I don’t know.
>
> I think/hope we have the same vision of multistakeholderism. If not,
> that’s a conversation for another time and place.
>
> > Or, viewed from the other end of the spectrum, are you suggesting that
> only the two or three largest TLDs out of two thousand, count?
>
> No, of course not. Any TLD or authoritiev server is welcome to do whatever
> it wants here. Even if I think it’s a bad idea. Which could very well be an
> incentive for others to deploy.
>
> What I am saying is this WG needs to think more about the impacts* of
> Do[TH] on busy authoritative servers (not just TLDs). And maybe for busy
> recursive servers too. Some of us were talking about that just over an hour
> ago in the RIPE DNS WG:
>
>
> https://www.ripe.net/participate/ripe/wg/active-wg/dns/remote-sessions/2021-03-24-ripe-dns-wg-hollenbeck-balanced-dns-information-protection-strategy.pdf
>
> AFAICT the WG hasn’t yet considered any of the risk analysis issues
> identified in Scott’s presentation.
>


Right. I've read this and I think it's interesting but not really
dispositive. It seems to me that there are two arguments here:

- The combination of QMIN and aggregation/caching around the recursive
  decreases the need for TLS to the root and the TLD

- There are operational risks to running TLS on the root and TLD
  servers

WRT the first point, I don't think QMIN helps as much as you might
like for two reasons:

1. In a very large number of cases, it's the SLD which is sensitive.
   This means that QMIN at the TLD doesn't really help at all.
   And by extension, because you need to protect the NS record
   for the TLD (and they're not DNSSEC signed at the parent),
   not having TLS to the root means that you don't adequately
   protect the TLS connection to the TLD server either.

2. It's true that caching by the recursive helps some -- especially
   for large resolvers -- but there is still some information
   leakage if the cache is cold and you can observe both sides.
   Moreover, this just seems like an argument against ADoX entirely,
   because it applies as much to the connection to the SLD server.
   And given that ADoX is a charter item, it seems like there is a
   presumption that we should be working on this.

WRT the operational risk (slide 3), it's likely true that it's
somewhat harder to run a DoX server than a Do53 server. However, given
that we have plenty of worked examples of TLS servers of comparable if
not greater scale being operated with high reliability (e.g., Google,
Fastly, Cloudflare, etc.), I think there's pretty strong evidence that
this is an operational issue that can be addressed.

Of course, the IETF can't make the TLD servers run ADoX, but as
long as some TLDs are willing to, it seems odd not to specify it,
especially as the mechanisms are mostly the same at every level
of the hierarchy.

-Ekr


>
> * Those impacts BTW go beyond query rates or TLS session management.
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy
>