On Sat, Aug 18, 2018 at 5:03 PM, Ted Lemon <mel...@fugue.com> wrote:
> Marek, forgive me for being blunt, but your reply was completely
> non-responsive.   DoH and DoT are being used because they address a threat
> model, or because, as Bert rather bluntly put it, they allow content
> providers to study our query stream.   They are not being used "because they
> are standards track documents."   If you don't have any reason other than
> that to use DoH or DoT, then you shouldn't use them.

No worries, I hoped I described the use case, but perhaps not well enough.

> You say that your proposal does not impact DoT's ability to address the
> threat model or use case that is the reason it is being used.   But this is
> doesn't make sense to me.   The trust model for DoT and DoH right now is
> that they are configured by the user for the user's reasons, or by the
> service provider for the service provider's reasons.   You are proposing

This is the issue that the draft is trying to solve. The service
provider doesn't have a way
to configure DoT on the stub resolver. This problem is described in
https://tools.ietf.org/html/rfc8310#section-6.7
What I'm trying to address more specifically is
https://tools.ietf.org/html/rfc8310#section-7.3

> that whatever configuration the user or service provider has set up be
> replaced by information received by DHCP, and that "DHCP authentication",
> which doesn't exist, be used to validate this information.   This is a

The "DHCP authentication" does exist, I believe you're referring the
deployment status.
I'm happy if we say the draft must depend on RFC3315, or discuss the
trustworthiness of the responses,
but surely there must be a way forward if we want to keep the
recursive DNS (last mile) decentralized and free from tampering.

> completely different trust model than the current trust model.   Maybe it's
> a good idea, maybe it's a bad idea, but it's completely different.   So you
> need to figure out the existing trust model and figure out how your proposal
> impacts that trust model.   To define a DHCP option before you've done this
> is putting the cart before the horse.

I described one possible way how clients could interpret the
advertised information using a trusted CA bundle.
At the very least, if my ISP or office network advertises resolvers on
port 853, using those is arguably better than
the same resolver on port 53.

> On Sat, Aug 18, 2018 at 5:58 PM, Marek Vavruša <mvavr...@cloudflare.com>
> wrote:
>>
>> Hi Ted,
>>
>> thanks for comments. As said, the draft doesn't try to change the
>> trust model or fix DHCP authentication, it merely offers network
>> operators the ability to advertise secure resolvers for their network.
>> The added "danger" is that recipient inherently trusts the
>> information.
>>
>> On Sat, Aug 18, 2018 at 2:22 PM, Ted Lemon <mel...@fugue.com> wrote:
>> > DHCP authentication doesn't exist.   We already rejected a draft that
>> > described how to set up DoH with DHCP.   Yours is a little more
>> > complicated,
>> > but doesn't seem any less dangerous.   Before you go any farther on
>> > this,
>> > you might ask yourself a couple of questions:
>> >
>> > 1. Why is DoH being used?
>>
>> The DoT and DoH are being used because they're both either standard or
>> on a standards track and have deployed client software.
>>
>> > 2. What is the thread model that DoH is addressing?
>> > 3 How does adding this configuration mechanism impact DoH's ability to
>> > address that threat model?
>>
>> It does not. In both cases, determining whether the resolver (or its
>> capabilities) provided by a DHCP server can be trusted is up to the
>> client.
>> The current model is that either OS or applications like browsers
>> install a curated CA bundle with CA's the client should trust.
>> When a DNS stub resolver receives a request, it looks into the
>> resolv.conf (simplifed) and picks a resolver to send query to.
>> Currently the most common method is to pick first, but it might prefer
>> resolvers with secure capabilities first.
>> If a resolver is advertised as secure, the stub resolver may do a TLS
>> handshake and check the certificate.
>> Now at this step, it may:
>>
>> a) only trust certificates issued by a CA trusted by the application
>> with the resolver IP address in SAN (trust system configuration)
>> b) ditto, but certificates with advertised ADN in SAN or matching
>> SPKI pin (this presumes the client trusts DHCP offering, or is okay
>> with TOFU)
>> c) bail and talk to the resolver over port 53
>>
>> In a), the resolver can be trusted. In both b) and c) the trust in the
>> resolver doesn't really change from current status until DHCP
>> authentication happens, but the query stream is hidden from other
>> devices on the same network. Either way, the benefit is that stub
>> resolver can make a decision based on a multitude of factors. Is there
>> a merit in this, or am I perhaps missing something?
>>
>> Marek
>>
>> >
>> > On Sat, Aug 18, 2018 at 5:17 PM, Marek Vavruša
>> > <mvavrusa=40cloudflare....@dmarc.ietf.org> wrote:
>> >>
>> >> Hi,
>> >>
>> >> this is a bit off topic, but I figured it would be useful to solicit
>> >> some early feedback. The current status is that for secure (as in
>> >> RFC7858 DoT or DoH) resolvers is that there's no discovery mechanism,
>> >> and it's also out of scope for [0]. At the same time we're seeing real
>> >> world deployment of clients which either:
>> >>
>> >> a) Probe port 853 and use DoT in opportunistic profile, or probe 443
>> >> and trust WebPKI
>> >> b) Statically configure ADN and/or SPKI pins with well known public
>> >> resolvers
>> >>
>> >> This approach works if there's someone maintaining the statically
>> >> configured information, as with the dnscrypt-proxy stamp lists [1].
>> >> However in most networks the default resolver configuration is pushed
>> >> through DHCP, so it's the network operator that's in charge for
>> >> providing default DNS resolver configuration (unless the user is a DNS
>> >> aficionado and overrides it), but there's currently no good way to
>> >> provide information required to identify and securely bootstrap a
>> >> connection to a resolver using DoT or DoH.
>> >>
>> >> This draft adds an option to provide a capability list for each
>> >> configured resolver. The three defined capabilities are TLS with SPKI
>> >> pin, TLS with ADN, HTTPS. The idea is that DHCP clients reads this
>> >> information and stores it similarly to resolver list and domain search
>> >> path for applications to read. Another possible solution for this is
>> >> to use the system of stamps from dnscrypt-proxy, but it's probably
>> >> less legible for clients and duplicates information that's already in
>> >> the recursive DNS nameservers DHCPv4/v6 option.
>> >>
>> >> The draft does not change the trust model, an end-user or an
>> >> application can still disregard DNS recursive nameserver list from
>> >> DHCP, for better or worse.
>> >>
>> >> Here's the draft:
>> >>
>> >>
>> >> https://github.com/vavrusa/draft-dhcp-dprive/blob/master/draft-dhcp-dprive.txt
>> >>
>> >> Marek
>> >>
>> >> [0]: https://trac.tools.ietf.org/html/rfc8310#section-7.3.1
>> >> [1]:
>> >>
>> >> https://download.dnscrypt.info/dnscrypt-resolvers/v2/public-resolvers.md
>> >>
>> >> _______________________________________________
>> >> DNSOP mailing list
>> >> DNSOP@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/dnsop
>> >
>> >
>
>

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to