Re: [dnsoverhttp] Survey of DNS over HTTP

Stephen Farrell <stephen.farrell@cs.tcd.ie> Fri, 16 September 2016 11:48 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: dnsoverhttp@ietfa.amsl.com
Delivered-To: dnsoverhttp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58F3012B12E for <dnsoverhttp@ietfa.amsl.com>; Fri, 16 Sep 2016 04:48:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.809
X-Spam-Level:
X-Spam-Status: No, score=-5.809 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.508, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tk2Q5ByEgUnW for <dnsoverhttp@ietfa.amsl.com>; Fri, 16 Sep 2016 04:48:27 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3670D12B206 for <dnsoverhttp@ietf.org>; Fri, 16 Sep 2016 04:48:25 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 1FC72BE53; Fri, 16 Sep 2016 12:48:23 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RWsyhbZGsFOy; Fri, 16 Sep 2016 12:48:23 +0100 (IST)
Received: from [134.226.36.93] (bilbo.dsg.cs.tcd.ie [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 0D047BE58; Fri, 16 Sep 2016 12:48:22 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1474026502; bh=sN3A3brU7aZnz2JTVVOmCeTVpZ0TpdWMI5jKMrtrPbE=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=vlW9p1UtyoaUDmIDrSZM58z/+i4RlMsjPMlQkSXhsqo7Hvf3qinKkjngkdA4LAnFi rvB6yCVLcbG+3Pdmtf5f1SQy6Lg4kcJ/+4LXwGdp5AU/lPBwYObulqbvO+LStJAPGW MgkKuHEvQhTyj/k4ZqoYawdj90JKI/2L7DdS0XWY=
To: Shane Kerr <shane@time-travellers.org>
References: <20160914150428.2bc82011@pallas.home.time-travellers.org> <78341ca7-e348-b2f9-7c63-d4c6909ea11b@cs.tcd.ie> <20160916120520.6f9c213a@pallas.home.time-travellers.org>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <7c0eb95c-077e-2e07-4781-1ed5a481966e@cs.tcd.ie>
Date: Fri, 16 Sep 2016 12:48:21 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <20160916120520.6f9c213a@pallas.home.time-travellers.org>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="wlSrhF9dPWfQg6KPHosXHg1Hv3LkhF803"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsoverhttp/AR69EuD4UrMHj-qpfkvE9cAZuZc>
Cc: dnsoverhttp@ietf.org
Subject: Re: [dnsoverhttp] Survey of DNS over HTTP
X-BeenThere: dnsoverhttp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Discussion of DNS over HTTP <dnsoverhttp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsoverhttp>, <mailto:dnsoverhttp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsoverhttp/>
List-Post: <mailto:dnsoverhttp@ietf.org>
List-Help: <mailto:dnsoverhttp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsoverhttp>, <mailto:dnsoverhttp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Sep 2016 11:48:30 -0000

Hi Shane,

On 16/09/16 11:05, Shane Kerr wrote:
> Stephen,
> 
> At 2016-09-15 08:28:11 +0100
> Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
> 
>> Hi Shane,
>>
>> I have two related questions for which I didn't get answers
>> from your fine document.
>>
>> 1) Are folks using IP addresses or DNS names in the URLs they
>> are de-referencing when using HTTP(S)?
> 
> I assume both.
> 
> Using DNS names does create a bootstrapping problem, but not a huge
> one. After all, current DNS resolvers have a similar bootstrapping
> problem when they start. They use a pre-configured set of IP addresses
> to start (usually hints.txt) and perform resolver priming:
> 
> https://tools.ietf.org/html/draft-ietf-dnsop-resolver-priming-09
> 
> A client using DNS-over-HTTP can either use a pre-configured set of IP
> addresses, or use some other way to map a DNS name into a set of IP
> addresses - such as "normal" DNS. :) 

Interesting. So yeah, I'd guess that building in some such
priming would be useful for any DNS/HTTP thing. If we're
assuming that a major motivator for DNS/HTTP is that today's
DNS is sometimes problematic, then I guess one might have
more to say about how long a client depends on the results
of priming, whether that be based on DNS TTLs or something
else in addition.

> 
>> 2) Are there any functional reasons to ever specifically want
>> DNS/HTTP, as opposed to DNS/HTTP/TLS? By functional I mean to
>> exclude the obvious simplicity, performance and WebPKI-trust
>> reasons why HTTP is "easier" than HTTP/TLS.
> 
> By "functional reasons", you mean is there anything that DNS over HTTP
> can do that DNS over HTTP+TLS can do? The only specific issue that I
> can think of is virtual servers and client-side software that doesn't
> support SNI. (Not as crazy at it seems... SNI was only added to
> the standard Python TLS library in 2014 for example.)
>  
>> BTW, the reason these are related is that if folks are using
>> IP addresses for the requests, then our current inability to
>> get WebPKI certs for IP addresses may be a functional motivation
>> for preserving the ability to do DNS/HTTP in clear.
> 
> I'm not sure about this. (No, really, I am ignorant!)
> 
> RFC 3779 defines X.509 extensions for IP addresses, which is used by
> RPKI:
> 
> https://tools.ietf.org/html/rfc3779
> 
> Also, a quick scan through RFC 5280 indicates that IP addresses can
> also be used in web PKI:
> 
> https://tools.ietf.org/html/rfc5280#section-4.2.1.6
> 
> So it seems possible in principle to use IP addresses in certificates
> with current standards.

Yep, entirely possible in principle, but I don't know of a
service where I can easily go get such a certificate. (If
someone does, I'd be interested). I think it's definitely
the case that server deployment will be a lot easier if
based on certs for DNS names.

> 
> In general though I'd expect DNS over HTTP clients to use a
> pre-configured certificate from the resolver operator... sort of like
> when you sign up for a VPN, and you get a certificate to identify the
> server that you then configure on the client side. 
>  
>> From my POV it'd be a bit sad if we need to define yet another
>> open-kimono/insecure way to do DNS, so I'd be happier were it
>> safe to assume that the client can use a DNS name in the URL
>> and can somehow figure out how to resolve that name to an IP
>> address. But I don't know if that's a reasonable assumption.
> 
> I think that I understand your concern about unencrypted traffic, but
> I'm not sure that insisting on it will actually help.

I was less thinking of insisting, and more of just not
explicitly defining a way to do it on port 80 at all:-)
But sure, it's not clear if that'd be acceptable as a
good plan in all cases.

Cheers,
S.

> 
> Cheers,
> 
> --
> Shane
>