On Mon, Aug 20, 2018 at 11:37 PM, Petr Špaček <petr.spa...@nic.cz> wrote: > On 21.8.2018 04:38, Tom Pusateri wrote: >> Come to think of it, DNSSEC validation in the stub resolver or browser >> is really a place DoH could shine. Instead of all the round trips >> required for validating up (down) the chain, the webserver could package >> up all those validated records and push them so the client/stub could do >> the validation quickly for all of the links in a page in an order that >> the user is most likely to need based on previous statistics and >> scrolling position. > > Could you elaborate how DOH helps here? I can't see it now. > > We already have RFC 7901 (Chain Query requests in DNS) which allows > resolvers to get all RRs required for DNSSEC validation in one round > trip even over "classic" DNS. > > This haven't been implemented because up to know browser vendors have > not been interested in DNSSEC which consequently lead us (resolver > vendors) to ignore complex RFC with no demand. > > >From my point of view DOH does not change anything in this regard, > complexity on stub & resolver side is the same no matter what transport > is used. > > What am I missing? How does DOH help with this complexity when compared > to classical DNS?
I think Tom is referring to the h/2 push semantics. The resolver can push the trust chain records ahead of time, so the forwarder will already have them in cache when revalidating the final answer. > Petr Špaček @ CZ.NIC > > >> Tom >> >>> On Aug 20, 2018, at 10:31 PM, Tom Pusateri <pusat...@bangj.com >>> <mailto:pusat...@bangj.com>> wrote: >>> >>> Sure. My point was that there could be legitimate uses of DoH. >>> >>> You have to move DNSSEC validation from the resolver to the client in >>> order to really validate the answers if you can’t trust the resolver. >>> >>> Tom >>> >>> >>>> On Aug 20, 2018, at 10:28 PM, Ted Lemon <mel...@fugue.com >>>> <mailto:mel...@fugue.com>> wrote: >>>> >>>> Of course, the question is, how does the consumer of that data decide >>>> what is okay and what's not? We can't just say that the server has >>>> to behave correctly: someone has to enforce it. >>>> >>>> On Mon, Aug 20, 2018 at 10:25 PM, Tom Pusateri <pusat...@bangj.com >>>> <mailto:pusat...@bangj.com>> wrote: >>>> >>>> >>>> >>>> > On Aug 20, 2018, at 10:21 PM, Paul Vixie <p...@redbarn.org >>>> <mailto:p...@redbarn.org>> wrote: >>>> > >>>> > >>>> > >>>> > Tom Pusateri wrote: >>>> >> ... I don’t know if it’s generally accepted that DoH will replace >>>> >> UDP/53 or DoT in the stub resolver or DoH will just end up in the >>>> >> browsers as a way to speed up web pages. But if DoH stays in the >>>> >> browser and DoT is tried and used on all DNS servers, there’s not a >>>> >> problem to solve. >>>> > >>>> > if DOH is widely used by criminals, botnets, and malware to >>>> bypass perimeter security policy, then there will be a big >>>> problem and we will be solving it for many years to come, even if >>>> the browser is the only thing using it. browsers are where most >>>> modern vulns have occurred, and i expect that trend to >>>> accelerate. "because that's where the money was.” >>>> >>>> I can see good use cases and bad ones. >>>> >>>> If web servers did DNSSEC validation and only served addresses >>>> for names that were validated, I wouldn’t have a problem with >>>> that at all. >>>> >>>> If web servers only served addresses for names within the domain >>>> of the web server, I wouldn’t have a problem with that either. >>>> >>>> if they start serving non DNSSEC validated addresses for names >>>> outside their domain, I think they’re overreaching. >>>> >>>> Tom > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop