Re: [Resolverless-dns] [Doh] [DNSOP] On today's resolverless DNS meeting

Ben Schwartz <bemasc@google.com> Tue, 06 November 2018 18:58 UTC

Return-Path: <bemasc@google.com>
X-Original-To: resolverless-dns@ietfa.amsl.com
Delivered-To: resolverless-dns@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D02A130E02 for <resolverless-dns@ietfa.amsl.com>; Tue, 6 Nov 2018 10:58:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.5
X-Spam-Level:
X-Spam-Status: No, score=-17.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WfErMqeS7FKM for <resolverless-dns@ietfa.amsl.com>; Tue, 6 Nov 2018 10:58:46 -0800 (PST)
Received: from mail-it1-x129.google.com (mail-it1-x129.google.com [IPv6:2607:f8b0:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63AE6130DEF for <resolverless-dns@ietf.org>; Tue, 6 Nov 2018 10:58:46 -0800 (PST)
Received: by mail-it1-x129.google.com with SMTP id h13so19431095itl.1 for <resolverless-dns@ietf.org>; Tue, 06 Nov 2018 10:58:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=egQKcio2pGYzJpexg+aquAhaAIOdvGePacATRjsd0NI=; b=MyAaZFegrmYc7GhL87MIcU5N6f2sFPu422a25bThOrVb8+BuQzhT3BexKBEo7I9pmQ MAM1oy4ZGezVouF5d7BqPnQkswb0FxKyk8Rlh6430ZVaYRKl4ACPdpJdnRSUqr5Qbqt7 Rhv0xkOYGOgXpTvBoBQX8AIeUWYulOvKTGQxDgrK4Tvf0vBzwgnI9Lf9AbjEdgGPLiz9 SipX0IYozt8bvKaASD/eZMWau7hobIeaj0uTX9r1cSoLIKmeNU+/wjM/Qj/CAwKXU04p 4tyPkxVu/yFhHZEtFZ1ZNlYdOSLhhCwUOPOm2shHOSMQCDVHxS3ytXTkwlXQi7DsWwS3 ffgw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=egQKcio2pGYzJpexg+aquAhaAIOdvGePacATRjsd0NI=; b=j7c8y1Hd02ykDqcdBa2dfgvaAOMSJkBKl9ELrN/oCeiv4FnHqpdw8ASUcrAR2Tg4oo WXLxRxDSPcICORWfZlN9Riq3heMJ51oanuNDWEzSQ/U+HUYY6ShVKf+Rt5zULo3E0T+V UCnPBBTtylymojj/gbM0wsF6N5Q/hd+12iFhnAaoF1Q01OZvVBx/nnT+SOctkW6mR9nR OCVPT2YGh5YszQP4Q3YXtliTgaIXXNxozDz/b9v0h/cSV8uFB31QaxsvvGFHz7vj2wVY 48syNQHK/vb8qusxgtqx3O2h1AVPnDrCSWyR+ZbzJxm1L3FsqhFk+XkerG+FFmkGgpXC Th1g==
X-Gm-Message-State: AGRZ1gLpajrfWwsvpgidjhdCUFh4lQJgj7qblze95mNWeCzWoT0x2Cio ycIL/7FqypNQB8RfXqtz6eQGgsyfVEg7qzqpKT6zRA==
X-Google-Smtp-Source: AJdET5ctDt1YsOSY2CqQ/B6y3oxcDUr0+Gefz2JwNLTKuEJgwR0b2HyuhiCl7kG3qkBeD0jXFpqofLy8vCGqiaT/lJ8=
X-Received: by 2002:a24:5c05:: with SMTP id q5-v6mr3054194itb.70.1541530725322; Tue, 06 Nov 2018 10:58:45 -0800 (PST)
MIME-Version: 1.0
References: <20181106102731.GA5280@naina> <CAJhMdTOnxMbkx0hfbSeBETXeM=AP0Z97ERRhN26dK4sib-2FTA@mail.gmail.com> <CAN-AkJsvrYhLKTKwbqoP+6ig6CSMqD3Km9wYQ0fT+wuddKznFg@mail.gmail.com>
In-Reply-To: <CAN-AkJsvrYhLKTKwbqoP+6ig6CSMqD3Km9wYQ0fT+wuddKznFg@mail.gmail.com>
From: Ben Schwartz <bemasc@google.com>
Date: Tue, 06 Nov 2018 13:58:33 -0500
Message-ID: <CAHbrMsAF55i7-4dpUyKy=pdWV+jOxm_nLPjrggNReJtZRv+6ww@mail.gmail.com>
To: henck=40google.com@dmarc.ietf.org
Cc: jabley@hopcount.ca, resolverless-dns@ietf.org, muks@mukund.org
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="000000000000548547057a0397da"
Archived-At: <https://mailarchive.ietf.org/arch/msg/resolverless-dns/SURo-TBWsdx8Lo11IJrhbzhTEl0>
Subject: Re: [Resolverless-dns] [Doh] [DNSOP] On today's resolverless DNS meeting
X-BeenThere: resolverless-dns@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Resolverless DNS <resolverless-dns.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/resolverless-dns>, <mailto:resolverless-dns-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/resolverless-dns/>
List-Post: <mailto:resolverless-dns@ietf.org>
List-Help: <mailto:resolverless-dns-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/resolverless-dns>, <mailto:resolverless-dns-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Nov 2018 18:58:49 -0000

DOH and dnsop to bcc.

On Tue, Nov 6, 2018 at 9:45 AM Justin Henck <henck=
40google.com@dmarc.ietf.org> wrote:

> Briefly jumping in to add resolverless-dns@ietf.org, which was set up
> after the last meeting for discussion of this specific topic.  Direct link:
> https://www.ietf.org/mailman/listinfo/resolverless-dns
>
> I also just sent the notes to that mailing list.
>
> Justin Henck
> Product Manager
> 212-565-9811
> google.com/jigsaw
>
> PGP: EA8E 8C27 2D75 974D B357 482B 1039 9F2D 869A 117B
>
>
> On Tue, Nov 6, 2018 at 9:39 PM Joe Abley <jabley@hopcount.ca> wrote:
>
>> > On Nov 6, 2018, at 17:27, Mukund Sivaraman <muks@mukund.org> wrote:
>> >
>> > We talked about DNSSEC and certificate signing and such. If the host
>> > serving this webpage to the browser has control over the webpage's
>> > content (e.g., the contents of that src attribute), and the webpage's
>> > contents are already authenticated by TLS, then why does an address
>> > record have to be separately authenticated?
>>
>> I think this is an easy one. It doesn't.
>>
>> The names that it is permissible for a server to push information
>> about (and the names that a client should be allowed to accept) must
>> be constrained such that the names supplied for use in one web
>> application can't influence the operation of another.
>>
>
I don't see any way to do this in the web security model.  For example, if
two web applications both use subresources from the same origin, then
cookies loaded for that origin from one application will be included in
requests to the other.  Similarly, subresource cache entries populated by
one application will be reused by other applications.  Web security is
scoped to the domain of each request, not the domain of the page.
Additionally, most browsers perform connection coalescing for resources on
the same origin, even if the requests are from different tabs.

I'm very interested in finding a solution here, but I don't think it will
be so simple.  For example, there may be a nontrivial interaction with the
iframe "sandbox" attribute.

Some of these problems become easier if we imagine an https-only world.
However, many browser engineers believe that DNS integrity acts as an
important barrier to utilization of stolen WebPKI private keys.  If you
accept this threat model, using unsigned DNS records from untrusted parties
could enable more stolen-key attacks.

There is a complex intersection of web and DNS problems, and IMHO too
speculative for dnsop (and out of scope for doh's current charter), so I
would encourage interested parties to join the resolverless-dns list.

(For example, it would be bad if some generic and otherwise benign web
>> page could feed the browser high-TTL DNS messages for names under
>> online retailer domains that accept credit cards or component APIs
>> used within genuine web apps.)
>>
>> The obvious analogy to me is the logic that controls what cookies a
>> browser should accept. Maybe exactly the same rules are appropriate. I
>> realise that managing those rules using mechanisms like the public
>> suffix list is not without challenges.
>>
>> If we accept that these constraints are necessary, then the presence
>> or absence of DNSSEC signatures doesn't matter. The DoH objects are
>> within the same security perimeter as the URIs that make use of them
>> and don't benefit from additional integrity protection; the transport
>> security for all the other objects being sent from server to client
>> provides the right coverage.
>>
>>
>> Joe
>>
>> _______________________________________________
>> Doh mailing list
>> Doh@ietf.org
>> https://www.ietf.org/mailman/listinfo/doh
>>
> _______________________________________________
> Doh mailing list
> Doh@ietf.org
> https://www.ietf.org/mailman/listinfo/doh
>