Re: [DNSOP] Draft for dynamic discovery of secure resolvers

Doug Barton <dougb@dougbarton.us> Sun, 19 August 2018 17:02 UTC

Return-Path: <dougb@dougbarton.us>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FE76130E4D for <dnsop@ietfa.amsl.com>; Sun, 19 Aug 2018 10:02:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dougbarton.us
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NBBZQti1Udru for <dnsop@ietfa.amsl.com>; Sun, 19 Aug 2018 10:02:17 -0700 (PDT)
Received: from dougbarton.us (dougbarton.us [IPv6:2607:f2f8:ab14::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E853130E43 for <dnsop@ietf.org>; Sun, 19 Aug 2018 10:02:17 -0700 (PDT)
Received: from [192.168.10.247] (71-9-84-238.dhcp.snbr.ca.charter.com [71.9.84.238]) by dougbarton.us (Postfix) with ESMTPSA id B248B79C for <dnsop@ietf.org>; Sun, 19 Aug 2018 10:02:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=dougbarton.us; s=dkim; t=1534698136; bh=CYP9+tVXRTrFczWOjyAygAH+y+Iy3iwUufydbspFKAo=; h=From:Subject:To:References:Date:In-Reply-To:From; b=QnUZ97kDkpevCs2Xt93RflUQBPvhyJ0wPJLT2C0uOCYK0TQFObgrikA0urZfmzRDX IluC/Py4TO6DBcmFYbTZ0QvzLW319ZC1/Dxwj8Ncp7b9cD75fwQSjf3wRa86LsByCz dyi/2D+l75Ci/FdHxzShDASDXHvY55aORfg2EbhU=
From: Doug Barton <dougb@dougbarton.us>
To: dnsop@ietf.org
References: <CAC=TB13mUH2SDxFb4c3rOz0-Z6PE_r9i84_xK=dmLxiVr45+tA@mail.gmail.com> <CAPt1N1=-792WkQmbTigPdqOh0dONykYycG0hheOecoQa4ai=Hw@mail.gmail.com> <CAC=TB11tG4o0dkavXGb20=DGBCrmVoRP60bpzsvq5=Q0zFjhDg@mail.gmail.com> <CAPt1N1kj7Y0dPLeDk=PMqQEpAd-Mvds6VLT8XUC1BYOfdyUbJA@mail.gmail.com> <CAC=TB125M81nwiCTNr8Vbee+Z7Fh_3L+6EdZ8evXVzP-2ji4fg@mail.gmail.com> <CAPt1N1n9hDUZQ-Ltvs73T20=fpG-FR_j-t4m0kMapDiv2Us1kw@mail.gmail.com> <5B78BFB9.40103@redbarn.org> <47508D79-0D49-4F31-9BA6-6DC80C38F1DE@cable.comcast.com>
Message-ID: <ad1f6dff-ebcc-97a9-6f4b-1ed683827cc7@dougbarton.us>
Date: Sun, 19 Aug 2018 10:02:15 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <47508D79-0D49-4F31-9BA6-6DC80C38F1DE@cable.comcast.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/e6DG875AtkEfVh-JqjxOrSSfgHA>
Subject: Re: [DNSOP] Draft for dynamic discovery of secure resolvers
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Aug 2018 17:02:19 -0000

On 08/19/2018 06:18 AM, Livingood, Jason wrote:
> So I suppose that the threat model in this example is presumably someone (1) eavesdropping on the relatively short path between CMTS and resolver or (2) modifying non-DNSSEC-validated responses - and that's does not seem like a very high risk threat IMO, given all the other potential and real threats lurking around on the Internet.

Personally I see securing the path from the stub to the resolver as a 
good step in the ultimate goal of encrypting all of the things. :) I'd 
like to see the traffic from the resolver to the authorities encrypted 
as well, along with all the other traffic on the Internet.

In years past people like me who pushed "encrypt, encrypt, encrypt!" 
were seen as kooks, but we now know beyond a shadow of a doubt that 
there are a legion of organizations, both public and private sector, 
that are collecting every piece of data about every person that they 
can. We also know that their reach is way farther than was imagined, and 
it's probably actually farther than what we know now.

So the question isn't, "Why encrypt?" the question is, why on earth 
wouldn't you want to?

And Jason, you missed a threat model, which is users who want to bypass 
their ISP's resolver.

I agree that encrypting from the CMTS to the local resolver isn't that 
valuable, since (unless I'm missing something) the ISP is the only one 
that can see that traffic, and they'll be able to log/manipulate the 
resolver already. So it's unlikely that an ISP would deploy DOH or DOT 
in the first place, so the idea of a DHCP option to support it isn't 
necessarily relevant in that environment. That doesn't mean it's not 
relevant elsewhere.

Doug