Re: [DNSOP] extension of DoH to authoritative servers

Bjørn Mork <bjorn@mork.no> Thu, 14 February 2019 12:12 UTC

Return-Path: <bjorn@mork.no>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5C07130EB3 for <dnsop@ietfa.amsl.com>; Thu, 14 Feb 2019 04:12:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mork.no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BT09LNA0FkL1 for <dnsop@ietfa.amsl.com>; Thu, 14 Feb 2019 04:12:06 -0800 (PST)
Received: from canardo.mork.no (canardo.mork.no [IPv6:2001:4641::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD3C712D84D for <dnsop@ietf.org>; Thu, 14 Feb 2019 04:12:06 -0800 (PST)
Received: from miraculix.mork.no ([IPv6:2a02:2121:345:7f35:35eb:7b17:79f:f64f]) (authenticated bits=0) by canardo.mork.no (8.15.2/8.15.2) with ESMTPSA id x1ECC1Be032246 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 14 Feb 2019 13:12:01 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mork.no; s=b; t=1550146323; bh=Xn9HOwAUNHEnMZKIp+rDzbwg9w+Y04u24DitlF1t7RM=; h=From:To:Cc:Subject:References:Date:Message-ID:From; b=A95Er1rZEH8zNO5sXhFOpzDl2F0pggKyaVcJSMfdiGQcKzJiRsUCFh8OQeEP6nFXk TAidQ+REtzpOr690h2/RcDqVVkGAGnJzKKf+IdwrFfVo0afV7G5bzD272s/w1nr817 3ZXstN0pxjv1QRWPeW0970PBks7VvZby0ZmU3j2g=
Received: from bjorn by miraculix.mork.no with local (Exim 4.89) (envelope-from <bjorn@mork.no>) id 1guFrw-00084N-0K; Thu, 14 Feb 2019 13:11:56 +0100
From: Bjørn Mork <bjorn@mork.no>
To: Vladimír Čunát <vladimir.cunat+ietf@nic.cz>
Cc: "dnsop@ietf.org" <dnsop@ietf.org>, Shane Kerr <shane@time-travellers.org>
Organization: m
References: <C5525DE2-DCF3-43E5-8C41-BAA58049DC3A@verisign.com> <edc1d393-ad19-2f8e-5f58-367d9b7e3290@nic.cz> <20190214080508.zab7r6hzkbj7kp54@nic.fr> <b3341f0f-cd06-8b08-5b5f-f887289a5f23@nic.cz>
Date: Thu, 14 Feb 2019 13:11:55 +0100
In-Reply-To: <b3341f0f-cd06-8b08-5b5f-f887289a5f23@nic.cz> ("Vladimír Čunát"'s message of "Thu, 14 Feb 2019 12:51:40 +0100")
Message-ID: <87y36iwovo.fsf@miraculix.mork.no>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: clamav-milter 0.100.2 at canardo
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/b0c3hyxcib8ulKVxzjIo3qra8yU>
Subject: Re: [DNSOP] extension of DoH to authoritative servers
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2019 12:12:10 -0000

Vladimír Čunát <vladimir.cunat+ietf@nic.cz> writes:

> You can still multiplex based on SNI sent by the client.  HTTPS clients
> surely send it commonly.  DoT clients perhaps not so often, but that's
> just an implementation detail (which I was fixing in the past few weeks
> in knot-resolver, incidentally).

My understanding of the reference to BCP195 from
https://tools.ietf.org/html/rfc7858#section-3.2
is that SNI support is required for all DoT implementations.

> I'm not sure how easy SNI-based multiplexing is to configure with
> nowadays software, but I believe I've heard of some such setup with
> nginx.  And I don't have any idea whether SNI encryption would interfere
> with that, but I hope not.  ESNI will be a key part of DNS privacy,
> though mainly for the non-DNS traffic.

It's simple to do with haproxy at least:
https://www.haproxy.com/blog/enhanced-ssl-load-balancing-with-server-name-indication-sni-tls-extension/

...which incidentally also can be used to support DoT with *any* DNS
server as backend.



Bjørn