Re: [dns-privacy] [Ext] New draft on authenticated recursive <-> authoritative

Paul Hoffman <paul.hoffman@icann.org> Thu, 25 February 2021 21:10 UTC

Return-Path: <paul.hoffman@icann.org>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24FE23A0C6C for <dns-privacy@ietfa.amsl.com>; Thu, 25 Feb 2021 13:10:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.799
X-Spam-Level:
X-Spam-Status: No, score=-0.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, PDS_BAD_THREAD_QP_64=0.999, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hsg7t2Uj3Snq for <dns-privacy@ietfa.amsl.com>; Thu, 25 Feb 2021 13:10:33 -0800 (PST)
Received: from ppa5.dc.icann.org (ppa5.dc.icann.org [192.0.46.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2341E3A0BCF for <dprive@ietf.org>; Thu, 25 Feb 2021 13:10:29 -0800 (PST)
Received: from MBX112-W2-CO-1.pexch112.icann.org (out.mail.icann.org [64.78.33.5]) by ppa5.dc.icann.org (8.16.0.42/8.16.0.42) with ESMTPS id 11PLARMe021858 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 25 Feb 2021 21:10:27 GMT
Received: from MBX112-W2-CO-1.pexch112.icann.org (10.226.41.128) by MBX112-W2-CO-2.pexch112.icann.org (10.226.41.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.721.2; Thu, 25 Feb 2021 13:10:26 -0800
Received: from MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) by MBX112-W2-CO-1.pexch112.icann.org ([10.226.41.128]) with mapi id 15.02.0721.008; Thu, 25 Feb 2021 13:10:26 -0800
From: Paul Hoffman <paul.hoffman@icann.org>
To: Eric Rescorla <ekr@rtfm.com>
CC: "dprive@ietf.org" <dprive@ietf.org>
Thread-Topic: [Ext] [dns-privacy] New draft on authenticated recursive <-> authoritative
Thread-Index: AQHXCkLvWpysWy0GRUWwffbaIBelBqpp1yOAgAAIWQCAAAdgAA==
Date: Thu, 25 Feb 2021 21:10:26 +0000
Message-ID: <2D5C5A27-60DC-48D7-A903-F305EFFF3724@icann.org>
References: <CABcZeBPn4QL+N2wph81NwYiwapNOroBUoC6KKWsC0Gcdghxw4w@mail.gmail.com> <577B946F-C839-4986-9241-BEDC54FD118B@icann.org> <CABcZeBPuzcodiAZSRb+7=mtkyXcfco19FFK6YVTK9+k5V097ww@mail.gmail.com>
In-Reply-To: <CABcZeBPuzcodiAZSRb+7=mtkyXcfco19FFK6YVTK9+k5V097ww@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [192.0.32.234]
x-source-routing-agent: Processed
Content-Type: multipart/signed; boundary="Apple-Mail=_153FF44B-633F-41F2-B8B6-EEBB2026BD64"; protocol="application/pkcs7-signature"; micalg="sha-256"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-02-25_11:2021-02-24, 2021-02-25 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/xH7YS7G7aPXm6kzWR9xgPo5K8e8>
Subject: Re: [dns-privacy] [Ext] New draft on authenticated recursive <-> authoritative
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Feb 2021 21:10:40 -0000

On Feb 25, 2021, at 12:44 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> 
> 
> On Thu, Feb 25, 2021 at 12:15 PM Paul Hoffman <paul.hoffman@icann.org <mailto:paul.hoffman@icann.org>> wrote:
> The idea of doing discovery in a new type of glue in the parent seems interesting. For the unauthenticated use case, it potentially removes a round trip, and doing so is quite valuable. If the WG likes the idea of new-glue-type-in-parent, Peter and I can add it to the draft covering unauthenticated ADoT to keep the two use cases in sync.
> 
> Question: why does this draft use an SVCB record instead of a TLSA record for that new glue? The only advantage I see is that SVCB can indicate the DoH template, but the WG has so far not shown interest in DoH over DoT.
> 
> There are (at least) three reasons:
> 1. Semantically, TLSA does not mean "I support TLS", but rather "if you are to do TLS, do it this way. SVCB means something different.

Fair point. However, given that we get to say what a particular usage of a particular RRtype is, that is not fatal.

> 2. It's not clear that the certificate binding properties of TLSA are desirable in the glue in this case, for a number of reasons, including the "getting out of sync" problem that Ben Schwartz pointed out, and the possibility that  we will want to use WebPKI.

OK. From the wording about authentication in the draft, I figured you would actually want DNS-based public keys, even with the general problem of TLSA and getting out of sync.

> 2. SVCB does not just let you signal DoH versus DoT it also allows you to signal DoQ, which has obvious advantages.

TLSA also lets you signal DoQ. If it didn't, we would have rejected it out of hand.

> In addition, if it becomes necessary to signal what kind of credentials the server has. SVCB has a natural way to add that.

Well, you said that in your draft, but I don't see that as a possibility in Ben's draft. It could be added, but there is no extension mechanism there.

> A deeper question for the WG is the draft's elevation of unsigned records received in authenticated TLS as trustworthy. This WG has gone back and forth on this idea over the years, and I thought we ended up with no such elevation. If I'm wrong, or if the the WG shifts back to wanting that, that's great.
> 
> I don't think it's a matter of "trustworthy" or "untrustworthy", but rather that if the referring server is untrustworthy than in many if not most cases there will be marginal privacy benefit to establishing encrypted transport.

That's a better phrasing than my shorthand; agreed.

> The reasons for this are laid out in the security considerations (https://ekr.github.io/draft-rescorla-dprive-adox/draft-rescorla-dprive-adox.html#name-security-considerations [ekr.github.io] <https://urldefense.com/v3/__https://ekr.github.io/draft-rescorla-dprive-adox/draft-rescorla-dprive-adox.html*name-security-considerations__;Iw!!PtGJab4!tX921UZjQGXS55wAOrtbw-opH3qkVrpzieoyLjMLPdY_GagY8gv6l_AiQsvIvAIoiUYWx7ldTQ$>) but briefly  in a great number of cases the resolver just wants to resolve the A/AAAA/CNAME for the child domain or a trivial subdomain (e.g., "www")  so (1) a malicious referring domain already has this information before it even responds and (2) the malicious server can still lie about the unsigned NS records, which one needs to use in order to get the signed NS records, by which time you've again revealed the child name.

That, plus the encrypted channel prevents malicious record substitution.

> 
> Peter and I could then make the draft that now covers just unauthenticated DNS actually be about opportunistic DNS (optional authentication).
> 
> I think trying to figure out what edits to make to which drafts is premature. Let's first decide what we are trying to do and how.

Both can happen at the same time.

--Paul Hoffman