presuming that the client will have to look up the hostname of the destination at some stage, and presuming that a passive network attacker may see DNS requests as well as TCP connections, how does this help?

Or does this require the use of DNS over TLS.

And also there will be leakage of certificate IDs in OCSP lookups which cannot be secured due to the paradox that would create. An attacker could mine sites for cert IDs and do a reverse mapping from that.

Adrien

------ Original Message ------
From: "Ben Schwartz" <bem...@google.com>
To: "Robert Edmonds" <edmo...@mycre.ws>
Cc: "dnsop@ietf.org" <dnsop@ietf.org>
Sent: 15/02/2017 9:03:09 AM
Subject: Re: [DNSOP] Proposal for a new record type: SNI



On Tue, Feb 14, 2017 at 2:16 PM, Robert Edmonds <edmo...@mycre.ws> wrote:
Ben Schwartz wrote:
> Hi dnsop,
>
> I've written a draft proposal to improve the privacy of TLS connections, by
> letting servers use the DNS to tell clients what SNI to send.
>
> https://tools.ietf.org/html/draft-schwartz-dns-sni-01 <https://tools.ietf.org/html/draft-schwartz-dns-sni-01>
>
> I've incorporated some helpful feedback [1] from the TLS WG, but now I > could use your help analyzing the DNS side. All comments welcome; this
> draft will change based on your feedback.
>
> One particular issue that I could use advice on: should this be a new > record type, or should it reuse/repurpose an existing type like SRV or PTR?
>
> Thanks,
> Ben
>
> [1] https://www.ietf.org/mail-archive/web/tls/current/msg22353.html <https://www.ietf.org/mail-archive/web/tls/current/msg22353.html>

Hi, Ben:

I'm kind of curious: your examples are pretty HTTP-centric, and HTTP
already has some pretty strong features for origins to persistently
modify how clients perform TLS, i.e., HTTP Strict Transport Security and HTTP Public Key Pinning, along with preloading of those settings by the browser vendors. Why not follow that same model for the functionality in
your draft?

--
Robert Edmonds

Hi Robert,

While this technique would apply to any use of TLS, you're right that I'm mainly motivated by improvements for HTTPS.

It's true, we could accomplish something like this by preloading a data file into browsers. In some sense, this is also true for any aspect of DNS! Obviously, preloading fares very badly when the data in question is valid for short times, or applies to many thousands or millions of domains, and I think both problems apply here.

For example, a CDN that operates DNS on behalf of its customers could apply SNI records to all of their domains. Preloading all of those domains into every browser seems impractical, and the list will quickly become outdated.

Without preloading, we cannot solve the problem of revealing the destination in the initial connection.

I would also note that HSTS and HPKP could not have been implemented using insecure DNS, given their adversary model. The SNI record is very different, and does not require DNSSEC.

--Ben
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to