On Fri, Mar 20, 2015 at 6:33 AM, Stephen Farrell <stephen.farr...@cs.tcd.ie>
wrote:

>
>
> On 19/03/15 23:43, Zhiwei Yan wrote:
> > Hi, all, I think it's better that this draft contains some solution
> > about the client authentication to decrease/avoid the DoS attack. But
> > it's really not the focus of this draft. In order to solve this
> > problem, many other schemes can be used, such as DHCP, SAVI and DANE.
> > Anyway, this draft can make use of them to authenticate the client.
>
> I, and probably others, would fairly strongly object if the work
> of this group that is intended to enhance privacy required all
> clients to be authenticated, and hence identified, and thus give
> up privacy.
>
> There may be a place for authenticated clients in this space (e.g.
> perhaps within an Enterprise n/w) but that had better not be the
> main mitigation for potential DoS attacks.
>
> S.
>

There is message authentication, client authentication, device
authentication and user authentication and they are very different things
where privacy is concerned.

One of the reasons why I am not keen on 'just' use TLS is that it forces
one particular approach that is optimized for a different purpose. I find
it much easier to provide the desired


As far as DNS privacy goes, the big performance issue is the DNS lookup. We
need to get latency reduced to the absolute minimum there and we need to
have strong protections preventing people from DoS-ing the resolution
hosts. For this particular interaction, my preference is for symmetric key
based authentication using a kerberos style ticket to allow stateless key
management on the server. The request is going to be encrypted, so we have
a symmetric key at this point.

So the question is how to establish a shared secret/ticket pair and how
long it would be valid for.


In the enterprise case we are going to require authentication of the user
and/or device in order to connect to enterprise resources behind the split
horizon. Here we will want to do a one time user/device authentication to
establish a local credential.

In the anonymous use case, the simplest approach might be to simply set up
a TLS connection to the DNS service and request a ticket via a HTTP/JSON
type interaction. That is what my current drafts describe.

The problem with the purely anonymous case is that what our customers are
currently paying us to provide is not actually 'privacy'. They are paying
for a mechanism that bypasses local DNS based censorship and a curated
DNS/IP address space that has the criminal element excluded. That makes
things rather complicated because quite often a user may have different
ideas about what censorship is good and which is bad.


This is quite a challenging problem to get 100% right. But if the solution
is less than 100% we are not going to get Microsoft, Apple or Google to
deploy on the platforms 95% of the market uses.
_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to