Resorting to in-line responses to reduce the amount of talking past each other.

On 08/19/2018 07:17 PM, Ted Lemon wrote:
No, I think maybe I haven't been communicating as well as I should.  What I have been saying is that we need to decide what our threat model is,

You've been very clear on your numerous repetitions that this is your perspective. I and others have quite clearly disagreed with that. Please don't mistake lack of agreement with lack of clarity. I understand your argument, I just don't agree with it.

so that we can figure out what to recommend.   What you are saying is "we should recommend this."

No, I'm definitely NOT saying that. I and others have expressed surprise that you feel that the existence of a DHCP option constitutes an endorsement. I've been in the business over 20 years, and have never heard this line of reasoning, for example.

 What you are proposing to recommend has a perfectly valid threat model associated with it.   I'm just saying write that up, don't just leave it unstated.   Let's get clarity on it and decide that we're okay with it, or not, before we write a standard based on it.   I don't think this needs to be a heavy-weight process—I'm just objecting to the handwaving.   And to be clear, the model that Paul has been advocating actually is not what you just said—it's a different, also valid, threat model.   The problem with Paul's model is that it assumes a user who is able to reason clearly about threat models; I don't think we can do that, and I would object to a spec that was based on that threat model.   I think we need to do that work, and not leave it to the user.   We've all seen what happens when you demand that users be security experts.

I think Paul's threat model and mine have more in common than you imagine, but I'll leave that aside. What confuses me is the idea that a given option can only be deployed to address one threat model. Clearly, for any draft the security section needs to weigh the pros and cons of the approach.

What it seems like we do agree on is that there is no additional risk to the user who would have been relying on the unencrypted resolver anyway to rely on an encrypted one.

While your three security models have distinctions to a person who is knowledgeable about such things, the only time they matter to your normal, non-security-aware user is when they intentionally configure a resolver (DOH/DOT or not). If they do this, they are taken out of the realm of DHCP resolver options entirely.

Doug

On Sun, Aug 19, 2018 at 8:28 PM, Doug Barton <do...@dougbarton.us <mailto:do...@dougbarton.us>> wrote:

    On 08/19/2018 04:57 PM, manu tman wrote:



        On Sun, Aug 19, 2018 at 4:46 PM Ted Lemon <mel...@fugue.com
        <mailto:mel...@fugue.com> <mailto:mel...@fugue.com
        <mailto:mel...@fugue.com>>> wrote:

             A user who relies on the dhcp server for dns server info is
        no worse
             off. The problem is that if your host lets the dhcp server
        override
             the DoT or DoH configuration you entered manually, you are
        a lot
             worse off.


        This seems to be a static vs dynamic setup. Either you use
        dynamic and you will happily accept what you get from DHCP and
        possibly upgrade to (HTTP|TL)S or you have set your resolvers
        statically and you are already ignoring the nameservers provided
        by the DHCP server.
        If you do not accept the servers provided by DHCP, there is no
        reason you would accept extra attributes for those same
        snameservers.
        Manu


    Yes, those are my thoughts precisely.

    I don't see a risk model where a user configures DOH or DOT servers
    explicitly, but does not disable DHCP configuration for DNS. Am I
    missing something?


    _______________________________________________
    DNSOP mailing list
    DNSOP@ietf.org <mailto:DNSOP@ietf.org>
    https://www.ietf.org/mailman/listinfo/dnsop
    <https://www.ietf.org/mailman/listinfo/dnsop>



_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to