Re: [Driu] [Doh] [DNSOP] Resolverless DNS Side Meeting in Montreal

Tony Finch <dot@dotat.at> Tue, 10 July 2018 18:13 UTC

Return-Path: <dot@dotat.at>
X-Original-To: driu@ietfa.amsl.com
Delivered-To: driu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BECA81311A5; Tue, 10 Jul 2018 11:13:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nt6l760SQ4E8; Tue, 10 Jul 2018 11:13:34 -0700 (PDT)
Received: from ppsw-33.csi.cam.ac.uk (ppsw-33.csi.cam.ac.uk [131.111.8.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90936130F04; Tue, 10 Jul 2018 11:13:34 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus
Received: from grey.csi.cam.ac.uk ([131.111.57.57]:37534) by ppsw-33.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.139]:25) with esmtps (TLSv1:ECDHE-RSA-AES256-SHA:256) id 1fcx8k-000b7f-gQ (Exim 4.91) (return-path <dot@dotat.at>); Tue, 10 Jul 2018 19:13:30 +0100
Date: Tue, 10 Jul 2018 19:13:29 +0100
From: Tony Finch <dot@dotat.at>
To: Dave Lawrence <tale@dd.org>
cc: Paul Vixie <paul@redbarn.org>, DoH WG <doh@ietf.org>, driu@ietf.org, Ben Schwartz <bemasc@google.com>, dnsop <dnsop@ietf.org>, Patrick McManus <pmcmanus@mozilla.com>, Daniel Kahn Gillmor <dkg@aclu.org>, HTTP Working Group <ietf-http-wg@w3.org>
In-Reply-To: <23364.61514.267429.409048@gro.dd.org>
Message-ID: <alpine.DEB.2.11.1807101906580.916@grey.csi.cam.ac.uk>
References: <CAOdDvNp0S5-aEzy4ziqVvL1Kd+V79nD49_Zuo1dLoThXYP7nFg@mail.gmail.com> <5B447154.5010307@redbarn.org> <23364.61514.267429.409048@gro.dd.org>
User-Agent: Alpine 2.11 (DEB 23 2013-08-11)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/driu/ZxUeja2K3bZol_tbd962QdKpEpA>
Subject: Re: [Driu] [Doh] [DNSOP] Resolverless DNS Side Meeting in Montreal
X-BeenThere: driu@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "DNS Resolver Identification and Use \(DRIU\)." <driu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/driu>, <mailto:driu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/driu/>
List-Post: <mailto:driu@ietf.org>
List-Help: <mailto:driu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/driu>, <mailto:driu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 18:13:49 -0000

Dave Lawrence <tale@dd.org> wrote:
>
> In the large I agree with you, but I think there's more to it than
> that.  If it pushed me DNSSEC records that I could verify myself from
> my own configured trust anchor, why can't I trust them then?

I've been idly wondering about this from the point of view of RFC 2181
trust ranking: to what extent does it make sense to promote the rank of
data (e.g. additional records) that has been validated?

The risk, I think, is replaying stale data - there shouldn't be any worse
consequences. So it should amount to a DoS attack (and there are easier
ways to achieve one of those).

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/
Shannon: Northerly 3 or 4, occasionally 5 in east. Moderate. Mainly fair.
Good.