Re: Quic: the elephant in the room

Nico Williams <nico@cryptonector.com> Mon, 12 April 2021 15:51 UTC

Return-Path: <nico@cryptonector.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFCCF3A2389 for <ietf@ietfa.amsl.com>; Mon, 12 Apr 2021 08:51:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cryptonector.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4M7rbKnIKxoJ for <ietf@ietfa.amsl.com>; Mon, 12 Apr 2021 08:51:31 -0700 (PDT)
Received: from donkey.elm.relay.mailchannels.net (donkey.elm.relay.mailchannels.net [23.83.212.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B0793A2388 for <ietf@ietf.org>; Mon, 12 Apr 2021 08:51:31 -0700 (PDT)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 9098C10371D; Mon, 12 Apr 2021 15:51:29 +0000 (UTC)
Received: from pdx1-sub0-mail-a47.g.dreamhost.com (100-105-161-114.trex.outbound.svc.cluster.local [100.105.161.114]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id 22C6B10375A; Mon, 12 Apr 2021 15:51:28 +0000 (UTC)
X-Sender-Id: dreamhost|x-authsender|nico@cryptonector.com
Received: from pdx1-sub0-mail-a47.g.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384) by 100.105.161.114 (trex/6.1.1); Mon, 12 Apr 2021 15:51:29 +0000
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|nico@cryptonector.com
X-MailChannels-Auth-Id: dreamhost
X-Skirt-Minister: 1cb322ff44b54f6a_1618242689416_1416652478
X-MC-Loop-Signature: 1618242689416:2283134249
X-MC-Ingress-Time: 1618242689415
Received: from pdx1-sub0-mail-a47.g.dreamhost.com (localhost [127.0.0.1]) by pdx1-sub0-mail-a47.g.dreamhost.com (Postfix) with ESMTP id BC74F7E5FC; Mon, 12 Apr 2021 08:51:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h=date :from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=cryptonector.com; bh=FU/luvKLWKZKH/ eEahLDldIenUc=; b=CCoJV+AQzWV+ZJb4YwDYQVXI8Q4AHumQ1xebXMYF3Xim3z aIHSDSZkzuKjTnG4r/sDQjVKnvObyPtlcbpaseqySNlZ/eyQ+jZSiBVXfNYdC0T8 iR0XCOGbLUimY+jmz45I0dBtAGM3rhJNI6Ww967SlwDsaOKi6ouYwQEoqkqvA=
Received: from localhost (unknown [24.28.108.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: nico@cryptonector.com) by pdx1-sub0-mail-a47.g.dreamhost.com (Postfix) with ESMTPSA id 47CF8888BB; Mon, 12 Apr 2021 08:51:24 -0700 (PDT)
Date: Mon, 12 Apr 2021 10:51:22 -0500
X-DH-BACKEND: pdx1-sub0-mail-a47
From: Nico Williams <nico@cryptonector.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
Cc: Michael Thomas <mike@mtcc.com>, IETF Discussion Mailing List <ietf@ietf.org>
Subject: Re: Quic: the elephant in the room
Message-ID: <20210412155121.GQ9612@localhost>
References: <3b25c77d-e721-e86d-6c34-a90039aab0e2@mtcc.com> <CAMm+Lwhi8xwFgZJL7jod2g4urZt_f+dm0tNi+3y1osqOfch2mQ@mail.gmail.com> <3593a01f-73f4-7d03-a85b-dff64a8b070e@mtcc.com> <506A780B-9C0D-4F4A-B045-098F6152F4DB@akamai.com> <14cd802e-2a1b-97d4-c80d-b57f93e8cc21@mtcc.com> <E4374100-265E-4426-9F9A-AC437DA31D2B@depht.com> <15059e21-b7c2-4211-869e-df3ffdf7c34a@mtcc.com> <CAMm+LwgnoqXKNSKxt0-rDa8ze6J9LsZz0jVeogBXAWNDveC_ZQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAMm+LwgnoqXKNSKxt0-rDa8ze6J9LsZz0jVeogBXAWNDveC_ZQ@mail.gmail.com>
User-Agent: Mutt/1.9.4 (2018-02-28)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/wvReTRe88tDfXCUGogIguwbGS5o>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Apr 2021 15:51:37 -0000

On Mon, Apr 12, 2021 at 11:33:29AM -0400, Phillip Hallam-Baker wrote:
> On Mon, Apr 12, 2021 at 11:22 AM Michael Thomas <mike@mtcc.com> wrote:
> > Correct. Better: you can do the TLSA request at the same time as the
> > A/AAAA request speculatively. Plus if you've ever had a TLSA record for
> > that domain, you know it's pretty likely you'll get a fresh one even if
> > the last one is expired, so the speculation is minimal.
> 
> Or replace the DNS resolver protocol with a privacy protected one in which
> a single request packet can be answered by multiple response packets. This
> maintains the 'stateless' nature of DNS queries but allows responses of
> 1-32 packets.

As long as it's not over UDP, or otherwise first has a return
routability check.

> Then a query to the responder can return the A record, the AAAA record, the
> SRV record, any relevant TXT and TLSA records [...]

Kinda like "any" queries.

>                                         [...] and the entire cert chain for
> one particular host chosen by the responder.

You get better security properties (w.r.t. possible compromised root or
ccTLD/TLD keys) if the resolver finds the DNSSEC chain on its own using
qname minimization than you get with stapling, but I agree that stapling
is a performance win.  We'll really want transparency for DNSSEC if we
do any kind of full chain stapling.

Nico
--