Re: [dnsext] Draft: RRTYPE B - Web Resource Integrity

Robert Edmonds <edmonds@mycre.ws> Fri, 17 November 2023 06:54 UTC

Return-Path: <edmonds@mycre.ws>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AED97C14CF09 for <dnsext@ietfa.amsl.com>; Thu, 16 Nov 2023 22:54:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7IYNn5fNblal for <dnsext@ietfa.amsl.com>; Thu, 16 Nov 2023 22:54:35 -0800 (PST)
Received: from mycre.ws (mycre.ws [45.33.102.105]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DBC0AC14CEF9 for <dnsext@ietf.org>; Thu, 16 Nov 2023 22:54:29 -0800 (PST)
Received: by chase.mycre.ws (Postfix, from userid 1000) id 135688A0147; Fri, 17 Nov 2023 01:54:26 -0500 (EST)
Date: Fri, 17 Nov 2023 01:54:26 -0500
From: Robert Edmonds <edmonds@mycre.ws>
To: James Addison <james@reciperadar.com>
Cc: Niall O'Reilly <niall.oreilly@ucd.ie>, dnsext@ietf.org
Message-ID: <ZVcOIny90R9hRL5a@mycre.ws>
References: <CAF3AkiPt98c5By3M1qY=31qW4ESV9_TF7bzH+wdqz2iqzBB+6w@mail.gmail.com> <D28C0BB5-6788-4CDA-9A7F-8BDD5C113A15@ucd.ie> <CAF3AkiPF9apuZWxmgzh2s7eMTzCcFXODO7sSazsd4Y-sT8Z+gg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAF3AkiPF9apuZWxmgzh2s7eMTzCcFXODO7sSazsd4Y-sT8Z+gg@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsext/8568z_2ZGn0aTjrJh_shGmZke90>
Subject: Re: [dnsext] Draft: RRTYPE B - Web Resource Integrity
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsext/>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Nov 2023 06:54:38 -0000

James Addison wrote:
> Thank you Niall - yes, from a read of RFC 9460, it does seem like a
> SvcParamKey could be a good way to handle this use case, that's
> helpful.  I've taken a look at the IANA registry of existing service
> bindings[1] to confirm that no such binding has been added so far.
> 
> Note: there is one potential conflict from this use case that I'm
> aware of -- this use case is intended to cover both plaintext HTTP and
> encrypted HTTPS web requests.  Section 9.5 of RFC 9460 as I interpret
> it so far seems to require that the client upgrade to TLS/HTTPS for
> web requests.

I guess if you wanted to use the HTTPS RR with plaintext HTTP origins
you could define a new SvcParamKey (e.g. "no-default-hsts") that
indicates that the client should skip the HSTS-style upgrade in Section
9.5 of RFC 9460 and list that new SvcParamKey as a mandatory key when
publishing an HTTPS RR that uses it.

-- 
Robert Edmonds