Re: [DNSOP] Draft for dynamic discovery of secure resolvers

Paul Ebersman <list-dnsop@dragon.net> Tue, 21 August 2018 02:44 UTC

Return-Path: <list-dnsop@dragon.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC7A4130EB0 for <dnsop@ietfa.amsl.com>; Mon, 20 Aug 2018 19:44:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TDqzB8snKq4a for <dnsop@ietfa.amsl.com>; Mon, 20 Aug 2018 19:44:22 -0700 (PDT)
Received: from mail.dragon.net (mail.dragon.net [IPv6:2001:4f8:3:36::235]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A888130EBD for <dnsop@ietf.org>; Mon, 20 Aug 2018 19:44:22 -0700 (PDT)
Received: from fafnir.remote.dragon.net (localhost [IPv6:::1]) by mail.dragon.net (Postfix) with ESMTP id 6FFF13740205; Mon, 20 Aug 2018 19:44:22 -0700 (PDT)
Received: by fafnir.remote.dragon.net (Postfix, from userid 501) id 4A980AD6C3E; Mon, 20 Aug 2018 20:44:22 -0600 (MDT)
Received: from fafnir.local (localhost [127.0.0.1]) by fafnir.remote.dragon.net (Postfix) with ESMTP id 46AF8AD6C3D; Mon, 20 Aug 2018 20:44:22 -0600 (MDT)
From: Paul Ebersman <list-dnsop@dragon.net>
To: Tom Pusateri <pusateri@bangj.com>
cc: dnsop <dnsop@ietf.org>
In-reply-to: <252FC541-311D-4892-9F0D-B0D7BB2EEC2A@bangj.com>
References: <CAC=TB13mUH2SDxFb4c3rOz0-Z6PE_r9i84_xK=dmLxiVr45+tA@mail.gmail.com> <alpine.DEB.2.20.1808201720060.3596@grey.csi.cam.ac.uk> <23C2BA0B-B4A7-49F2-9FFD-90B90E2928B5@bangj.com> <56B7EA81-A840-4320-BDD0-781E9D999904@vpnc.org> <B5CCB149-BEE2-46D4-BF3C-C32D5BCA3EA3@bangj.com> <20180821014030.C2678AD6354@fafnir.remote.dragon.net> <922DCF48-BA8A-42B8-99BA-2B367D981568@bangj.com> <5B7B7718.7090301@redbarn.org> <EEEB9610-FB85-475D-ACF4-8F07E9884D8D@bangj.com> <CAPt1N1k=xnSiF_DQXz6OS=MdRe5YHbL0CgXHAUdgWgH4vdBDMA@mail.gmail.com> <DA13BC82-2308-4B28-B86B-A52D678A1BFD@bangj.com> <252FC541-311D-4892-9F0D-B0D7BB2EEC2A@bangj.com>
Comments: In-reply-to Tom Pusateri <pusateri@bangj.com> message dated "Mon, 20 Aug 2018 22:38:44 -0400."
X-Mailer: MH-E 7.4.2; nmh 1.7.1; XEmacs 21.4 (patch 22)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <55900.1534819462.1@fafnir.local>
Date: Mon, 20 Aug 2018 20:44:22 -0600
Message-Id: <20180821024422.4A980AD6C3E@fafnir.remote.dragon.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/Pv1uV-IDS9v_trwfbSi2ZzP55XM>
Subject: Re: [DNSOP] Draft for dynamic discovery of secure resolvers
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Aug 2018 02:44:37 -0000

pusateri> Come to think of it, DNSSEC validation in the stub resolver or
pusateri> browser is really a place DoH could shine. Instead of all the
pusateri> round trips required for validating up (down) the chain, the
pusateri> webserver could package up all those validated records and
pusateri> push them so the client/stub could do the validation quickly
pusateri> for all of the links in a page in an order that the user is
pusateri> most likely to need based on previous statistics and scrolling
pusateri> position.

Agreed.

My discomfort with some current proposals where I get DNS answers to
questions I didn't ask yet would be a lot less if I had full validation
info to DNSSEC validate them. Even getting SRV and other service entry
points would be less if they're in the domain I'm already playing in and
the DNSSEC validate.

Trick with this will be getting browser support. We're still debating
why SRV is too many lookups vs CNAME at zone apex. Fingers crossed we
make progress on both.

For other apps, stubby seems like a fine way to get this in the app.