Re: [dnsoverhttp] New draft: draft-hoffman-dns-over-http-00.txt

Ted Hardie <ted.ietf@gmail.com> Wed, 21 September 2016 17:21 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: dnsoverhttp@ietfa.amsl.com
Delivered-To: dnsoverhttp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEF0712BB74 for <dnsoverhttp@ietfa.amsl.com>; Wed, 21 Sep 2016 10:21:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ovH_U_VStxse for <dnsoverhttp@ietfa.amsl.com>; Wed, 21 Sep 2016 10:21:40 -0700 (PDT)
Received: from mail-oi0-x234.google.com (mail-oi0-x234.google.com [IPv6:2607:f8b0:4003:c06::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A2D812BB6F for <dnsoverhttp@ietf.org>; Wed, 21 Sep 2016 10:21:40 -0700 (PDT)
Received: by mail-oi0-x234.google.com with SMTP id r126so68018992oib.0 for <dnsoverhttp@ietf.org>; Wed, 21 Sep 2016 10:21:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=1O/J9Xa5b9yS+awWTXjKq42NpR0BNck8Dhi3rWaXM2c=; b=ONese7I0zeM1SOG1ilEkzp6em6gu3B7AfpDDV8LimqEAHMwd00ONn7/QBdwhBMuit8 7pXZXzJ0wjHPifbo3OUOACe1sUqDCLlg+4bT4kOFVxOnnjb4Kb5IBrzIHcP/E75sWECC R83xG6/ykJ6my7M7V9wCYA0Maq3ncqoQt2r7fQHhRGbk8mghmnSkBLWkj42p0TLQAdhS inXJV6sNpzIervOLDAd4Nti4iLqoIS6DZoRhoOMVwen5tzLzlumqmiPy9Xcl9z6VwJVI TxKbU6eni6JJhhtyWWNBeWUJoX6ctW/v8RIDBh58wk65rndIh7CFwd1joJOvx8/F1ZM/ 208w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=1O/J9Xa5b9yS+awWTXjKq42NpR0BNck8Dhi3rWaXM2c=; b=VSDFisJUFacxlOJNGPUOslJvFthJ5NI3hJh+EhN06Waa4xbeF3B08G0GVhx5WvqOBg hKEbURGwftmr43ffrSR98nwu/ktZPtYRrMdHivmhzSqcbNpQb7k3n6JIrFsntcVkjrB6 18LxAJ4Q+KSsy9yVU24xaL3U8O2XzMKpcn8DfMzNgJEAEHr6OsCV8mExCZUwHvpAH2dE gclkPMXITacp4Hak2p00OodXBUGodtlXAkDdnHITwX4bEpGoavLEFaGIuQgVOtVO/OEa rLCCLeg/7sHKWGvrYXFgaIKFZIMLlRipkCNrUjM4QaUI0X7cT+m+9U/AyR89CejzRF9M Y3fQ==
X-Gm-Message-State: AE9vXwMbaRjSZtnfNHgxBOASnvPj5ELCvanJVlbTQFnNFcY0hdz5YLpT63HGXMfjpqKhfVbEL5uqnxgCtMzOwg==
X-Received: by 10.202.192.5 with SMTP id q5mr10121559oif.71.1474478499180; Wed, 21 Sep 2016 10:21:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.202.85.72 with HTTP; Wed, 21 Sep 2016 10:21:08 -0700 (PDT)
In-Reply-To: <CABkgnnUnKezkspqFBW4JFaQr2q4=BmUTwy3MWEtF62rt_TvCRQ@mail.gmail.com>
References: <147438228195.28999.4355943522486567954.idtracker@ietfa.amsl.com> <D1E3CC44-FE5A-4ACE-90A1-EF9B5EE975D7@icann.org> <CA+9kkMATL4RVv=RCmS0nqks2OWB1aQSeNcZ_-zyqHBnv5eYmLg@mail.gmail.com> <AF616D4B-A22B-4CB7-AD20-29B4E6107276@icann.org> <CA+9kkMCsX9=+uWmAAydW5yuda_Jzs+qX6MBZBq0ztQKOsEDndQ@mail.gmail.com> <14CE5326-52FD-405F-A17F-1BBE5FC32929@icann.org> <CA+9kkMBqN8Y-h27C7Cde4omO9jLsYpvhsyieFfG9YyS9+K_j9g@mail.gmail.com> <CABkgnnUnKezkspqFBW4JFaQr2q4=BmUTwy3MWEtF62rt_TvCRQ@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Wed, 21 Sep 2016 10:21:08 -0700
Message-ID: <CA+9kkMBx=5GHrm5ogJRTXRwi6dGe3=VxH-mUW0pjc3MXfqPpow@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Content-Type: multipart/alternative; boundary=001a113dddfa2c56d6053d07c7f9
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsoverhttp/FA-fRhXU9d7S-tC806YI9AXcUg8>
Cc: "dnsoverhttp@ietf.org" <dnsoverhttp@ietf.org>, Paul Hoffman <paul.hoffman@icann.org>
Subject: Re: [dnsoverhttp] New draft: draft-hoffman-dns-over-http-00.txt
X-BeenThere: dnsoverhttp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Discussion of DNS over HTTP <dnsoverhttp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsoverhttp>, <mailto:dnsoverhttp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsoverhttp/>
List-Post: <mailto:dnsoverhttp@ietf.org>
List-Help: <mailto:dnsoverhttp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsoverhttp>, <mailto:dnsoverhttp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Sep 2016 17:21:44 -0000

On Tue, Sep 20, 2016 at 7:10 PM, Martin Thomson <martin.thomson@gmail.com>
wrote:

> On 21 September 2016 at 09:02, Ted Hardie <ted.ietf@gmail.com> wrote:
> > That can't be corrected by DNSSEC, since it is correctly signed.
>
> It can be corrected by making another request.
>
>
You'll get a different answer if you make another request using a different
method or DNS API server.


> I find the unstated point that you are pushing on quite interesting:
> DNSSEC doesn't authenticate all the things that might be important in
> the protocol.  Or maybe that there still remains some need for trust
> in the protocol when it comes to recursive resolvers.
>
> > For the server push case, I pretty much assume that the only trusted DNS
> > resources from https://blogplatform.example.com/ will be those related
> to
> > example.com (hello, public suffix list and dbound!)
>
> That would negate much of the value of having this sort of feature.  I
> can see several ways around this.  The easiest being to scope the use
> of the record until it can be independently verified.
>
>
Using a browser as an example, if you scope this such that server pushed
DNS records are only used in the same tab/browser context, then I agree
with you; the threat model I am concerned about is one where it gets
blended into the general name resolution pool.  That means the usual TTL
model of the DNS is not quite the same if you getting the records from this
method, and I think that has to be called out.


> The tracker can use alt-svc, or push its own records to update the
> client's view and correct any infidelity.
>
> If pushed record use is limited to the current site, then the tracker
> might be affected, but that only negatively affects the perception of
> the site that includes the tracker.
>

I tam note sure "site" is quite right here, but I agree with the
sentiment--if you push bad records, they should affect only the perception
of the site that pushed them.

Ted