Re: Quic: the elephant in the room

Michael Thomas <mike@mtcc.com> Mon, 12 April 2021 16:19 UTC

Return-Path: <mike@fresheez.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 786493A24E6 for <ietf@ietfa.amsl.com>; Mon, 12 Apr 2021 09:19:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level:
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mtcc.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2JpCNg6fhQZD for <ietf@ietfa.amsl.com>; Mon, 12 Apr 2021 09:19:05 -0700 (PDT)
Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED3C33A2489 for <ietf@ietf.org>; Mon, 12 Apr 2021 09:17:59 -0700 (PDT)
Received: by mail-pj1-x102d.google.com with SMTP id kk2-20020a17090b4a02b02900c777aa746fso7379328pjb.3 for <ietf@ietf.org>; Mon, 12 Apr 2021 09:17:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mtcc.com; s=fluffulence; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=ylvxZvLC/HEyXHQcMcHTdw7Fw3SlwJqyk0QyrAacofE=; b=FU8s//RoQQG9vGBF3/PQJUB18leLbqqJl5ecW5hDHuRRsMokRGe6S6GQ6+YHJ3PiH3 gngjlwOz9Gh/UWs1xNfNaed2/TRnkkYxAJXNAgESJSH+7bpUkXlXJj9JmHJedicBzlDS 9EIQOjEiuKg6tOfn5lv02PWYBqOy2T9RfqvdzyanpE+Tn1M/gq46txSCsbpfrfpbwf6E 8oeydVRFUkWhSS2fYrdC+Gw6/VtWnmFVp229tvRA3GgYY+KwPn+fOsfdxIYsLSaYVj2U 0mSgJ34G3kcDwe/7JCZNcyQsItLp5lrMYPORvys8YOmfsT1Fy7ZBpWpyDGH+tl4SvpfG qFuw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=ylvxZvLC/HEyXHQcMcHTdw7Fw3SlwJqyk0QyrAacofE=; b=p58qOPZLu8jgFtlrVvNBGjiUlML5C7iBY/S78Z8p4DwMxMOp8pOa3wW8i9eYJIw2mj i6MZ/k91oBZDX8Vs9TWdCydaGg3k6ANT12Ak7ZjQ2/EenkX7m4HPkYvfeaRcIn48Ba3F dzPg/XMw8UYr8DjkhMVwZaJ4IOTLlmGg6zP3G/hMbTSlllfC+cNMGzhy/HXwzsq6YD+t JCbZMV8TluQTtbBp+3BdB70J/kycegq2Nyahej9kBfHWtYcGynC2Njb4H6tKXS4UTeMN vionu9Brn10rJyti1vZEvJQVcgXBBNJu9BBc+UWhkpirEd0KhkwUBrXZ6A+iWmyEjN2x bY0A==
X-Gm-Message-State: AOAM532Ly3zu/3DFoGxrBPIjNcsG0b7neBML1YqxLTUaLX2w9fu77e2y R/htWzm3K62SInjgQs2PjG1XtOxrXD5DKA==
X-Google-Smtp-Source: ABdhPJxAjl8QipXu1NSLV3wnjlJfdyG8RiijEaqi2RlSdTGTjbGXzWtr3MrWysT1Op+9bCb55ewb/w==
X-Received: by 2002:a17:90a:4406:: with SMTP id s6mr29140265pjg.93.1618244277895; Mon, 12 Apr 2021 09:17:57 -0700 (PDT)
Received: from mike-mac.lan (107-182-38-56.volcanocom.com. [107.182.38.56]) by smtp.gmail.com with ESMTPSA id z20sm10179817pfk.21.2021.04.12.09.17.56 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 12 Apr 2021 09:17:56 -0700 (PDT)
Subject: Re: Quic: the elephant in the room
To: Nico Williams <nico@cryptonector.com>
Cc: Phillip Hallam-Baker <phill@hallambaker.com>, IETF Discussion Mailing List <ietf@ietf.org>
References: <3b25c77d-e721-e86d-6c34-a90039aab0e2@mtcc.com> <CAMm+Lwhi8xwFgZJL7jod2g4urZt_f+dm0tNi+3y1osqOfch2mQ@mail.gmail.com> <3593a01f-73f4-7d03-a85b-dff64a8b070e@mtcc.com> <506A780B-9C0D-4F4A-B045-098F6152F4DB@akamai.com> <14cd802e-2a1b-97d4-c80d-b57f93e8cc21@mtcc.com> <E4374100-265E-4426-9F9A-AC437DA31D2B@depht.com> <15059e21-b7c2-4211-869e-df3ffdf7c34a@mtcc.com> <CAMm+LwgnoqXKNSKxt0-rDa8ze6J9LsZz0jVeogBXAWNDveC_ZQ@mail.gmail.com> <20210412155121.GQ9612@localhost> <c268bc55-803a-ab9d-6d38-9d90fd6e5c99@mtcc.com> <20210412161431.GT9612@localhost>
From: Michael Thomas <mike@mtcc.com>
Message-ID: <a2b4f2e2-883b-f41e-2a9a-3eb2fb75295f@mtcc.com>
Date: Mon, 12 Apr 2021 09:17:55 -0700
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.9.0
MIME-Version: 1.0
In-Reply-To: <20210412161431.GT9612@localhost>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/bEi6ywusuOG8dbml55cn580OEss>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Apr 2021 16:19:15 -0000

On 4/12/21 9:14 AM, Nico Williams wrote:
> On Mon, Apr 12, 2021 at 09:02:57AM -0700, Michael Thomas wrote:
>> On 4/12/21 8:51 AM, Nico Williams wrote:
>>> You get better security properties (w.r.t. possible compromised root or
>>> ccTLD/TLD keys) if the resolver finds the DNSSEC chain on its own using
>>> qname minimization than you get with stapling, but I agree that stapling
>>> is a performance win.  We'll really want transparency for DNSSEC if we
>>> do any kind of full chain stapling.
>> Can somebody explain what "stapling" is?
> In general "stapling" means sending all the ancilliary things that the
> peer would otherwise have to lookup on its own to save it the bother.
> So:
>
>   - "OCSP" == RP sends request to OCSP Responder
>
>   - "stapled OCSP" == supplicant sends its EE cert and chain and cached
>     OCSPResponse to the RP so the RP need not go talk to an OCSP
>     Responder
>
>   - "DANE" == RP looks up all the relevant RRs needed to validate
>     supplican't certificate
>
>   - "stapled DANE" == supplicant sends TLSA RRs and DNSSEC chain along
>     with its certificate so that the RP need not perform those lookups
>     separately
>
> (RP == relying party)
> (supplicant == the entity authenticated by the end-endity certificate it
>   presents to the RP)
>
Ah, thanks. I was guessing it might be that. I assume it goes into the 
Additional RR's like SoA records. Are there rules on what a can be 
supplied as additional RR's? Is the client allowed to supply hints or 
does the DNS server have to just guess?

Mike