[DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt
Ben Schwartz <bemasc@meta.com> Tue, 23 July 2024 05:28 UTC
Return-Path: <prvs=2934cffcc9=bemasc@meta.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF670C1519AF; Mon, 22 Jul 2024 22:28:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=meta.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mXY2UGgyk_ij; Mon, 22 Jul 2024 22:28:09 -0700 (PDT)
Received: from mx0a-00082601.pphosted.com (mx0a-00082601.pphosted.com [67.231.145.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64848C16A128; Mon, 22 Jul 2024 22:28:09 -0700 (PDT)
Received: from pps.filterd (m0109334.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 46N3Xh1S007537; Mon, 22 Jul 2024 22:28:07 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=from :to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=s2048-2021-q4; bh=zJ0K951F9uwop6k8 RtXupMebby0nkfYrHfszKPP8hWU=; b=Bh3g7XV436CljNWfGfvs3K6LCcd4myPc gVXeFn2rZ9Zu4qTPDogE6AxPVwZJIHbJZK1ljpSIYjnwgnh9kY/m6KTlr5De7Jml CDugGhP8NqRkqiOeqPwmDMFvoWosWJtGbuY+COt5ZzxFNVd8ujwNzrDPVNNFhfXW +rrmgzaJ1Q7/4e6eUsXdOwd2l46UDP2jD07NNBoEErVThlP0T9OFXjfgP38UBVaS n3nmW2JOu+iwiVSJQzdemdgSmY6Rwb+f4G+ieYDxr0ZxvJDHvTBk5HubpGfRlF3z ziMAG4+G65Qqo56gnySXC2rMZOd844xe+Sv7hjINJEavzoBGgr32xw==
Received: from nam04-mw2-obe.outbound.protection.outlook.com (mail-mw2nam04lp2173.outbound.protection.outlook.com [104.47.73.173]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 40hs6d4fvs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 22 Jul 2024 22:28:06 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NTch1fMyS0jXXSugQ76ND5O0BECdPkjDQdrFCUX7SS3kQZazn5ofpLuhoI/ZTx4PnB39G96Q19BxDIFYq0t0oVy4DTcLL4LDJGnsdrw2ANw1KUxCLceDsDAmoOpX3q4may47Fy09txOPzyOglXJswdyHdiTxiZBAIAs3KKQa81PzwM5dq6jakKNwVCKReWOwcKNmKHkKILSd4ZNXincYvdvm72rgQAMuhtqOVjvpFV4cc8zgBGde99rkS8T//Vv1UclJiM/eQPch6EcGl9J0juKO1xAppZFP0ayEH1y7J8N42Adsw32Q9voernrx71WeN6ZS12b6533Gtg9QN+Nc3g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DzKeU2/NfeLfNrvCunpf+5M3+wpVPrhweQwQP3jVrPI=; b=Hh+LrqZ/24Jsv588XXZn3aNOHx4965KJpzefpAkKSFQoPtXJ62CmWeJxA9uvgII7wcMekMn7ahPdE627rMnpwnJvOS/811Y8NCHLAXc5H6tkA7mPUrjTcyubD5JC1HBk70HNejrgLQUdC9C4plUZ6pp2cXZ4IYxyaSYk2nEar77HUMXpzwLarp/83MSC5JoAfja5mA/Bzx7SL3EQTBdddxGXFqB4d2nijqax+VSO5AVdNRpZ55mm96Ca3QuV9Q5xwwGt9bix1swzyjdUH23Nc0fhvYMhGd2rb1tbpXmP325ZuRaTwPG6cOdbzUPkE2dTvfoNNGETCp4CcpfqtSBeUg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=meta.com; dmarc=pass action=none header.from=meta.com; dkim=pass header.d=meta.com; arc=none
Received: from SA1PR15MB4370.namprd15.prod.outlook.com (2603:10b6:806:191::8) by CH0PR15MB5971.namprd15.prod.outlook.com (2603:10b6:610:18c::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.28; Tue, 23 Jul 2024 05:28:01 +0000
Received: from SA1PR15MB4370.namprd15.prod.outlook.com ([fe80::b6dd:72cc:243a:babb]) by SA1PR15MB4370.namprd15.prod.outlook.com ([fe80::b6dd:72cc:243a:babb%7]) with mapi id 15.20.7784.016; Tue, 23 Jul 2024 05:28:01 +0000
From: Ben Schwartz <bemasc@meta.com>
To: Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org>, dnsop <dnsop@ietf.org>
Thread-Topic: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt
Thread-Index: AQHayMBg6kjNpOFYMU6jFYLXgA5D67Hb73JZgCeWt7WAAATOvoAAYVpr
Date: Tue, 23 Jul 2024 05:28:01 +0000
Message-ID: <SA1PR15MB4370839774EAFC0FA8A23B32B3A92@SA1PR15MB4370.namprd15.prod.outlook.com>
References: <171951314842.227.16506719010762251285@dt-datatracker-ff7f57fbb-ch6dm> <SA1PR00MB1344B00639280305247F898FFAD72@SA1PR00MB1344.namprd00.prod.outlook.com> <SA1PR15MB4370F27B20C2F62B3F84D785B3A82@SA1PR15MB4370.namprd15.prod.outlook.com> <LV8PR00MB1957314D5A12E038C55B1363FAA82@LV8PR00MB1957.namprd00.prod.outlook.com>
In-Reply-To: <LV8PR00MB1957314D5A12E038C55B1363FAA82@LV8PR00MB1957.namprd00.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2024-07-22T23:52:57.240Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SA1PR15MB4370:EE_|CH0PR15MB5971:EE_
x-ms-office365-filtering-correlation-id: 27b6c7c3-cc7e-4701-bd77-08dcaad83823
x-fb-source: Internal
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|366016|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR15MB4370.namprd15.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SA1PR15MB4370839774EAFC0FA8A23B32B3A92SA1PR15MB4370namp_"
MIME-Version: 1.0
X-OriginatorOrg: meta.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA1PR15MB4370.namprd15.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 27b6c7c3-cc7e-4701-bd77-08dcaad83823
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jul 2024 05:28:01.0800 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zLl8UCNuBNvQ1s41KMW4En+u9bljtvFIzzdlorUowv0Nu2nih0jEHj8iFtzV1e3s
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR15MB5971
X-Proofpoint-ORIG-GUID: jK0UbU9GBz4SpNH-fiAwqgOZ9xoBffOS
X-Proofpoint-GUID: jK0UbU9GBz4SpNH-fiAwqgOZ9xoBffOS
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-22_18,2024-07-23_01,2024-05-17_01
Message-ID-Hash: 3H6BAF4QMR4BZ7VKS3O4FW3FCFGAIKW2
X-Message-ID-Hash: 3H6BAF4QMR4BZ7VKS3O4FW3FCFGAIKW2
X-MailFrom: prvs=2934cffcc9=bemasc@meta.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "Damick, Jeffrey" <jdamick@amazon.com>, Jessica Krynitsky <Jess.Krynitsky@microsoft.com>, "Engskow, Matt" <mengskow@amazon.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/M9VZr8uIMlVUkki8DEuPh89HMsM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>
I am generally skeptical of the idea that we should write recommendations that are "for enterprise". The notion of "enterprise" is too slippery for technical standards. Enterprises are also technically integrated by definition, so they are less reliant on technical standards than multi-party arrangements. This draft is framed as making the argument for choosing mTLS as the authentication mechanism for DoE, but I don't think this choice is within the IETF's purview. Operators are free to deploy any compatible authentication mechanism. Our job is to define these mechanisms and make sure they work, not to tell them that they made the wrong choice. I do think this could be a useful draft if framed as "So you've decided to use mTLS auth for DNS resolution". Helping operators to understand the risks, limitations, and strengths of mTLS in this context could be valuable. --Ben ________________________________ From: Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org> Sent: Monday, July 22, 2024 7:52 PM To: Ben Schwartz <bemasc@meta.com>; dnsop <dnsop@ietf.org> Cc: Damick, Jeffrey <jdamick@amazon.com>; Jessica Krynitsky <Jess.Krynitsky@microsoft.com>; Engskow, Matt <mengskow@amazon.com> Subject: Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt Hey Ben, Thank you for reading the draft and your comments. I agree we would not need a draft for saying mTLS works as expected. This draft is saying something different: "mTLS is the way one should auth clients to encrypted DNS servers Hey Ben, Thank you for reading the draft and your comments. I agree we would not need a draft for saying mTLS works as expected. This draft is saying something different: "mTLS is the way one should auth clients to encrypted DNS servers for many reasons, cross-protocol use among them." The cost of doing something like "make OAuth or Privacy Pass work with DoT and DoQ" needs to be weighed against what benefits that would give over using mTLS that matter to the narrow use case where using client auth with encrypted DNS is appropriate (where both client and server are managed by the same authority, such as enterprise end-to-end). For example, you talk about "privacy properties" of PrivacyPass — which properties are you thinking about that would apply to the enterprise use case and be more useful than mTLS as a result? That's not a leading question, I legitimately don't know enough about PrivacyPass to know. Conversely, can you expand on the downsides of mTLS versus OAuth or PrivacyPass? If you would like to see a different recommendation, it would be good to understand why. If you disagree with the requirements the draft defined to based its reasoning on, that's a good place to start too (I note the markdown didn't survive the submission and the bulleted lists in the first two paragraphs of section 6 are not lists, sorry about that). Thanks, Tommy ________________________________ From: Ben Schwartz <bemasc=40meta.com@dmarc.ietf.org> Sent: Monday, July 22, 2024 4:18 PM To: Tommy Jensen <Jensen.Thomas@microsoft.com>; dnsop <dnsop@ietf.org> Cc: Damick, Jeffrey <jdamick@amazon.com>; Jessica Krynitsky <Jess.Krynitsky@microsoft.com>; Engskow, Matt <mengskow@amazon.com> Subject: Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt mTLS might be the most pragmatic approach today in many situations, but I don't think we can recommend it in the way that this draft would. It has some significant downsides, especially when compared against something like OAuth (which might integrate better with user account systems) or Privacy Pass* (which has much better privacy properties). It's true that these mechanisms can't be used with DoT and DoQ today, but it is within our power to fix that if we care to. If the only significance of this draft is today "mTLS works as you would expect for DoT, DoQ, and DoH", then I don't think we need a draft to tell us that. --Ben *I am a co-chair of PRIVACYPASS but I am speaking only as an individual participant.. ________________________________ From: Tommy Jensen <Jensen.Thomas=40microsoft.com@dmarc.ietf.org> Sent: Thursday, June 27, 2024 2:41 PM To: dnsop <dnsop@ietf.org> Cc: Damick, Jeffrey <jdamick@amazon.com>; Jessica Krynitsky <Jess.Krynitsky@microsoft.com>; Engskow, Matt <mengskow@amazon.com> Subject: [DNSOP] Re: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt Hello dnsop, Not to distract from the "should we deprecate DNS64" discussion I started after proposing updates to 7050, but this is the second draft (last one, I promise) I'll be proposing to this group as interesting work ahead of IETF 120. Joining me are co-authors Jessica from Microsoft and Jeff and Matt from Amazon. In light of enterprises increasingly using encrypted DNS for their own "Protective DNS" resolvers, we are proposing best practices for when and how to use client authentication with encrypted DNS. Since this is a Good Thing for enterprises who control both peers (stronger security for client policy application and security auditing post-attack) and a Bad Thing otherwise (privacy violations for the non-enterprises cases common to consumers), we feel there is a need to specify when implementors should or should not use it. Spoiler alert: we prefer mTLS as the ideal authentication mechanism. I'll let the draft speak for itself as to why. Feedback and discussion is welcome. Thanks, Tommy ________________________________ From: internet-drafts@ietf.org <internet-drafts@ietf.org> Sent: Thursday, June 27, 2024 11:32 AM To: Jeffrey Damick <jdamick@amazon.com>; Jessica Krynitsky <Jess.Krynitsky@microsoft.com>; Matt Engskow <mengskow@amazon.com>; Tommy Jensen <Jensen.Thomas@microsoft.com> Subject: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt A new version of Internet-Draft draft-tjjk-cared-00.txt has been successfully submitted by Tommy Jensen and posted to the IETF repository. Name: draft-tjjk-cared Revision: 00 Title: Client Authentication Recommendations for Encrypted DNS Date: 2024-06-27 Group: Individual Submission Pages: 11 URL: https://www.ietf.org/archive/id/draft-tjjk-cared-00.txt<https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-tjjk-cared-00.txt__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78MhYiKeo$> Status: https://datatracker.ietf.org/doc/draft-tjjk-cared/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-tjjk-cared/__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78334FWQc$> HTML: https://www.ietf.org/archive/id/draft-tjjk-cared-00.html<https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-tjjk-cared-00.html__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78WQDEe_U$> HTMLized: https://datatracker.ietf.org/doc/html/draft-tjjk-cared<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-tjjk-cared__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78MUDB5QU$> Abstract: For privacy reasons, encrypted DNS clients need to be anonymous to their encrypted DNS servers to prevent third parties from correlating client DNS queries with other data for surveillance or data mining purposes. However, there are cases where the client and server have a pre-existing relationship and each peer wants to prove its identity to the other. For example, an encrypted DNS server may only wish to accept resolutions from encrypted DNS clients that are managed by the same enterprise. This requires mutual authentication. This document defines when using client authentication with encrypted DNS is appropriate, the benefits and limitations of doing so, and the recommended authentication mechanism(s) when communicating with TLS- based encrypted DNS protocols. The IETF Secretariat
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Tommy Jensen
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Erik Nygren
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Ben Schwartz
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Tommy Jensen
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Jessica Krynitsky
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Paul Vixie
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Paul Wouters
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Paul Vixie
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Ben Schwartz
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Jessica Krynitsky
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Paul Vixie
- [DNSOP] Re: [EXTERNAL] New Version Notification f… tirumal reddy
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Ben Schwartz
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Paul Vixie
- [DNSOP] Re: [EXTERNAL] New Version Notification f… tirumal reddy
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Ben Schwartz
- [DNSOP] Re: [EXTERNAL] New Version Notification f… Petr Menšík