Re: [Resolverless-dns] Paper on Resolver-less DNS

Anne Bennett <anne@encs.concordia.ca> Tue, 20 August 2019 17:24 UTC

Return-Path: <anne@encs.concordia.ca>
X-Original-To: resolverless-dns@ietfa.amsl.com
Delivered-To: resolverless-dns@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64DE812095B for <resolverless-dns@ietfa.amsl.com>; Tue, 20 Aug 2019 10:24:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.197
X-Spam-Level:
X-Spam-Status: No, score=-4.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D0r5fp_tRlsn for <resolverless-dns@ietfa.amsl.com>; Tue, 20 Aug 2019 10:24:46 -0700 (PDT)
Received: from oldperseverance.encs.concordia.ca (oldperseverance.encs.concordia.ca [132.205.96.92]) by ietfa.amsl.com (Postfix) with ESMTP id 6544A120990 for <resolverless-dns@ietf.org>; Tue, 20 Aug 2019 10:24:46 -0700 (PDT)
Received: from vindemiatrix.encs.concordia.ca (vin-anne@vindemiatrix.encs.concordia.ca [132.205.47.192] port 12940) by oldperseverance.encs.concordia.ca (envelope-from anne@encs.concordia.ca) (8.13.7/8.13.7) with ESMTP id x7KHOhOl010770 for <resolverless-dns@ietf.org>; Tue, 20 Aug 2019 13:24:43 -0400
Received: from vindemiatrix.encs.concordia.ca (vin-anne@localhost) by vindemiatrix.encs.concordia.ca (8.14.7/8.14.7/Submit) with ESMTP id x7KHOfdc025919 for <resolverless-dns@ietf.org>; Tue, 20 Aug 2019 13:24:43 -0400
X-Authentication-Warning: vindemiatrix.encs.concordia.ca: vin-anne owned process doing -bs
To: resolverless-dns@ietf.org
References: <CAHbrMsBhR1yaLxQk7wZk54Jdf5nvkS03KC3UTae0Famu2+SV8g@mail.gmail.com> <9323236.5EVOHOzQma@linux-9daj> <24529.1566231048@vindemiatrix.encs.concordia.ca> <4328897.o8lPr2jyQz@linux-9daj>
In-Reply-To: <4328897.o8lPr2jyQz@linux-9daj>
X-In-Reply-To: Your message of Tue, 20 Aug 2019 07:03:35 -0000
From: Anne Bennett <anne@encs.concordia.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Date: Tue, 20 Aug 2019 13:24:41 -0400
Message-ID: <25918.1566321881@vindemiatrix.encs.concordia.ca>
X-Scanned-By: MIMEDefang 2.58 on oldperseverance.encs.concordia.ca at 2019-08-20 13:24:43 EDT
Archived-At: <https://mailarchive.ietf.org/arch/msg/resolverless-dns/rQ9xCCpbXiHVcvscYwUdkUcA-A8>
Subject: Re: [Resolverless-dns] Paper on Resolver-less DNS
X-BeenThere: resolverless-dns@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Resolverless DNS <resolverless-dns.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/resolverless-dns>, <mailto:resolverless-dns-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/resolverless-dns/>
List-Post: <mailto:resolverless-dns@ietf.org>
List-Help: <mailto:resolverless-dns-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/resolverless-dns>, <mailto:resolverless-dns-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Aug 2019 17:24:52 -0000

PV>>> https://datatracker.ietf.org/doc/draft-sah-resolver-information/

AB>> I took a quick look at the above draft; it specifies a method
AB>> for enquiring about "features of a recursive resolver", but
AB>> gives no ideas or guidance as to what such features might
AB>> consist of, aside from a brief sentence fragment in the
AB>> abstract, "such as whether they perform DNSSEC validation or
AB>> are available over transports other than what is defined in
AB>> RFC 1035".

PV> ah. that's my misunderstanding then. i thought "has policy" was 
PV> one of the assigned indicators. it should be.

It may well become one; the draft states that "IANA will
create a new registry titled "DNS Resolver Information"
that will contain definitions of the names that can be used
with the protocols defined in this document", but since such a
registry is not implemented yet, the reader of the draft can't
assume what's intended.  Likely you've seen another document
or followed another discussion that mentioned it.

AB>> It seems to me straightforward to use this mechanism to supply
AB>> the information *that* a resolver applies filtering, but I don't
AB>> see how it could reasonably *describe* the filtering, since
AB>> such a description would essentially almost *be* the filtering.

PV> i would not, and we could not, export that policy.

We're on the same page there!

ES>>>> we talked about possible privacy drawbacks of resolver-less
ES>>>> DNS. However, did we talk about the privacy risks of using a
ES>>>> traditional DNS resolver? They can monitor the entire browsing
ES>>>> activities of a user and present the real privacy problem.

PV>>> DoT (RFC 7858) corrects that privacy problem and is being deployed.

AB>> I dispute the idea that DNS over TLS addresses the privacy
AB>> problem of the resolver operator having access to all of a
AB>> user's DNS queries.

PV> i think our ships are passing in the night.

Quite possibly, or mine may have sprung a leak.  ;-)

PV> "traditional dns resolver" means one you run on your campus,
PV> on your LAN, on your hypervisor, on your endpoint. this whole
PV> "public DNS" bullpucky is entirely non-traditional.

Ah, I was assuming that "traditional" DNS resolution was the mechanism
of UDP or TCP queries to port 53 (or, now, 853), no matter who was
running the resolver.

I don't have stats on devices on the Internet, but I suspect
that the number of DNS clients on networks run professionally,
with local resolvers, is, at this point, probably small
compared to the number of cellphones, laptops, home systems,
and IoT devices.  Ideally, these would all would use the
ISP's resolvers, but if people are connecting to untrusted
networks (e.g. wireless at the airport or coffee shop), I can
well imagine why using one of the "public" resolvers might
be considered safer, though if DNSSEC validation is used,
a hostile or compromised ISP might matter less.

PV> resolverless is questionless. no knowledge of user intent is
PV> leaked, only knowledge of user probable next steps. this is
PV> an important difference,

Thank you for setting me straight on that; I was indeed thinking of DoH.

ES> Ok, I assume we agree on a traditional DNS resolver being able
ES> to monitor the user's online activities, right?

If here you define "traditional DNS resolver" as the port 53 (or 853)
answerer of questions, then, sort of - that is, most of the user's
online activities will be based on the resolution of hostnames to IP
addresses, and the hostname queries will give the resolver a pretty
good idea of the sites of interest to the user.

But... the ISP can already do traffic analysis, based on the
endpoints of the TCP/IP connections (not to mention sniff the
traffic if it is not encrypted), so if the user is using the
ISP's resolver, there's no *additional* privacy concern there,
I think.

If you're considering that some people use the "big public
resolvers", then sure, those sites could be acquiring
information which a user would prefer to keep private.
It's rather tempting to say "so don't do that" (that is,
don't use the big public resolvers), though.  I'm still not
convinced that a whole new DNS mechanism is a step in the
right direction; it seems to me like just one more attack
surface to have to monitor and protect.

ES> Furthermore, resolver-less DNS is a decentralized approach
ES> where there does not exist a single entity being able to monitor
ES> the full scope of the user's online activities.

The ISP will always be able to do that, even if only traffic analysis.

ES> In resolver-less DNS you do not trust retrieved DNS records
ES> because you validate these records.

At this point, you should probably tell me to Read The Fine
Paper, but I immediately wonder: *how* does the client validate
the records?  I suppose the server may be sending all the
DNSSEC information.

If so, though, your scheme still cuts off my ability, as a network
admin, to use DNS resolution to impose policies to protect my users
from malware (for example).



Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
anne@encs.concordia.ca                                    +1 514 848-2424 x2285