On May 22, 2019, at 7:21 PM, John Levine <jo...@taugh.com> wrote:

> As a passive-aggressive DNS manager, I can put RESINFO records
> anywhere I want, including in my rDNS zones.  I can even sign them.
> If a stub does a RESINFO lookup for a record that actually exists,
> what's the cache supposed to do?  

Cache them. They're no different than any other DNS record.

> How can a stub tell a RESINFO
> generated by a RESINFO-aware cache from one passed through a non-aware
> cache?

They cannot.

>  Does it matter?  

No.

> Presumably if I can put records in the rDNS I
> have some connection with whoever is using the address space.

Exactly.

> Bonus question: what is the stub supposed to do about DNSSEC?  The
> record passed through the non-aware is more likely to have valid
> DNSSEC than one inserted by the aware cache.

A validating stub would, well, validate. Again, these are no different than any 
other DNS record.

> For the issue of validating the certificate on a DoT or DoH server, how
> about this kludge: the client contacts the server by IP address, the
> server returns a certificate.  If it has an IP address and it matches,
> swell, you're done. If it has a domain name, do a DNSSEC validated A
> or AAAA lookup, and if you get an answer with the IP of the server,
> it's OK.  If it has multiple domain names, maybe look them all up
> or maybe don't do that.

That is possible, but outside the scope of this document. That is, the same 
would be true for *any* HTTPS client that gets a certificate with an IP address 
in the certificate but not a name that it likes.

> This can work even for servers in RFC 1918 space, since the IP address
> isn't used to contact the cache, only to confirm it's the right one.
> We Let's Encrypt fans can use DNS validation for the certificate, no
> need for the CA to contact the cache either.  This potentially leaks
> info about the location of the cache to anyone who can observe the
> traffic, but usually if there's an observer. it is in the cache itself
> so how much of a problem would that be?

Agree.

> After two minutes of thought I don't see any obvious security holes,
> but it's possible I'm missing something.  It works for DoH and DoT on
> 8.8.8.8 and 8.8.4.4 now.  It almost works on 9.9.9.9 except that the
> cert says *.quad9.net and the hostname is dns.quad9.net.

Those are implementation issues.

--Paul Hoffman
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to