Re: [Doh] [Ext] Fallback to untrusted DOH servers

Mateusz Jończyk <mat.jonczyk@o2.pl> Sun, 22 April 2018 13:22 UTC

Return-Path: <mat.jonczyk@o2.pl>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2203112DA2B for <doh@ietfa.amsl.com>; Sun, 22 Apr 2018 06:22:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eOZItNjVwTbl for <doh@ietfa.amsl.com>; Sun, 22 Apr 2018 06:21:58 -0700 (PDT)
Received: from mx-out.tlen.pl (mx-out.tlen.pl [193.222.135.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7249C12D959 for <doh@ietf.org>; Sun, 22 Apr 2018 06:21:55 -0700 (PDT)
Received: (wp-smtpd smtp.tlen.pl 30768 invoked from network); 22 Apr 2018 15:21:53 +0200
Received: from aclb249.neoplus.adsl.tpnet.pl (HELO [192.168.1.22]) (mat.jonczyk@o2.pl@[83.10.103.249]) (envelope-sender <mat.jonczyk@o2.pl>) by smtp.tlen.pl (WP-SMTPD) with ECDHE-RSA-AES256-GCM-SHA384 encrypted SMTP for <doh@ietf.org>; 22 Apr 2018 15:21:53 +0200
From: Mateusz Jończyk <mat.jonczyk@o2.pl>
To: Patrick McManus <pmcmanus@mozilla.com>, doh@ietf.org
References: <f17cbdf0-cd88-9fa9-c83d-26e2cf13b8c1@o2.pl> <21B4DD30-46B0-4E63-833E-FDE66EF28F95@icann.org> <765e9e5a-9b8c-fa1c-85b5-da824807e609@o2.pl> <CAOdDvNrC6VGQtCYgLOoRvwCGn0kRJuchncFj4m5r_KZ-ig7=NA@mail.gmail.com>
Message-ID: <28678acd-f67d-7f95-273f-26ed1115d3ee@o2.pl>
Date: Sun, 22 Apr 2018 15:21:44 +0200
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0
MIME-Version: 1.0
In-Reply-To: <CAOdDvNrC6VGQtCYgLOoRvwCGn0kRJuchncFj4m5r_KZ-ig7=NA@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="PWei9afLNWJIaxF7TScjMmDT4yFsK87s1"
X-WP-MailID: 04b5e104e1ba67f76cd805682907fd46
X-WP-AV: skaner antywirusowy Poczty o2
X-WP-SPAM: NO 000000A [AYPU]
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/Q-hDpeKxZdCL0LPQtFp41z-N8ds>
Subject: Re: [Doh] [Ext] Fallback to untrusted DOH servers
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Apr 2018 13:22:06 -0000

W dniu 15.04.2018 o 21:15, Patrick McManus pisze:
> The document says "must not trust simply because it was discovered".. "only
> trust configured".. and explicitly does not go into configuration.
>
> imo you're reading too much into the text. It's just trying to say an endpoint
> isn't to be trusted just because it speaks DoH and you found it (e.g. becuase
> www.example.com <http://www.example.com> pushed you a DoH request and
> response). Note that it doesn't say "must not use" it says "must not trust".
> Whether or not you would use an untrusted server if you have no trusted
> options is not something that's going to be in scope here.
Hello,
Sorry, but I didn't have time to deal with DOH in the last week.

I think if Your interpretation of DOH is correct, that the text is unclear there
and should be clarified.
I would suggest to add the following clarification:

	A client MAY use an untrustworthy DNS API server as a fallback.

I am going to submit a draft that specifies how a fallback DNS API server could
be retrieved from DHCP.

Greetings,
Mateusz Jończyk

>
> On Sun, Apr 15, 2018 at 1:39 PM, Mateusz Jończyk <mat.jonczyk@o2.pl
> <mailto:mat.jonczyk@o2.pl>> wrote:
>
>     W dniu 14.04.2018 o 22:54, Paul Hoffman pisze:
>     > On Apr 14, 2018, at 9:36 AM, Mateusz Jończyk <mat.jonczyk@o2.pl <mailto:mat.jonczyk@o2.pl>> wrote:
>     >>
>     >> Hello,
>     >> Current DOH draft specifies that:
>     >>
>     >>   A client MUST
>     >>   NOT trust a DNS API server simply because it was discovered, or
>     >>   because the client was told to trust the DNS API server by an
>     >>   untrusted party.  Instead, a client MUST only trust DNS API server
>     >>   that is configured as trustworthy.
>     >>
>     >> It may happen that either no trustworthy DOH server has been
>     configured, or the
>     >> configured DOH server is not working. In such cases a DOH client would
>     usually
>     >> revert to using an untrusted DNS server on port 53, possibly one that was
>     >> discovered through unsecure DHCP. This DNS resolver would also be able
>     to poison
>     >> DNS caches then.
>     >
>     > The topic of how a user (well, really, an OS or browser) choose a DNS
>     server to use is a worthy one to look at, but not in this document. If
>     someone wants to start such a document, it needs to deal with trust in
>     DHCP, DHCP MITMs, DNS-over-TLS, DNS-over-TLS policy, DOH, and DOH policy.
>     (There are likely additional topics...)
>
>     This draft specifies some limitations on DNS resolvers a client can use.
>     Therefore - I would argue - it is fine to discuss whether these
>     limitations are
>     appropriate and not overbroad.
>
>     >
>     > --Paul Hoffman>
>
>     Greetings,
>     Mateusz Jończyk
>
>     _______________________________________________
>     Doh mailing list
>     Doh@ietf.org <mailto:Doh@ietf.org>
>     https://www.ietf.org/mailman/listinfo/doh
>     <https://www.ietf.org/mailman/listinfo/doh>
>
>