On Thu, 28 Nov 2013, W.C.A. Wijngaards wrote:
I also heard that this is the place to discuss DNS privacy.
This is a generic problem people keep mentioning. We need some new WG for DNS extensions that's not operations. i was told this was going to be discussed at dnsops at ietf88 , but it did not happen.
http://tools.ietf.org/html/draft-wijngaards-dnsop-confidentialdns-00 It supports opportunistic encryption, i.e. try to encrypt but fallback to insecure. This supports deployment immensely, because clean DNS paths are uncommon. It supports stateless operation. It uses UDP. It supports encryption for stub-to-cache and cache-to-authority.
Asking the LAN's resolver for a specific record (type ENCRYPT to QNAME ".") seems a bit dangerous. This is of course completely MITM-able, but I see no real other way to trust something fundamentally untrustworthy. So that's okay. But I fear too many of these queries might end up on AS112. I'd rather see an EDNS advertisement. For talking to AUTH servers, there is no reason to use QNAME ".". It could just query for some kind of ENCRYPT record in the zone, which can be authenticated with DNSSEC, and then becomes resistant to MITM. Even if that means you once traverse top down to collect the various TLD ENCRYPT keys. DNS already has a lot of known plaintext. Having a padding flag that an attacker can play with seems dangerous too. We've seen too many padding/oracle attacks. In general, I would prefer that the DNS people don't invent their own crypto scheme, and use something that has seen a lot more scrutiny. If (D)TLS is too expensive, than perhaps we should look around and see how other people solved this in the past. But I think the "too expensive" is specific to real authoritative servers, and for instance would never be an issue for a LAN/ISP resolver - a reason to think of these two problems in two separate documents with possibly different solutions. Additionally, encrypting to authoritative servers seems to not make _that_ much sense to me. Remember, when I need to know www.nohats.ca, I already tell the .ca nameserver the entire QNAME before I get the referral. While I see value in LAN/ISP dns cache encryption, I think encryption of DNS globally is a whole different matter. Encrypting our individual transactions might not gain us much at all. This scheme also depends on state between queries. There are dangers with anycast where specifically the different nodes in different regions should NOT be using the same crypto key. (which makes storing the key in DNSSEC harder as well) Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop