Hi,

it was not declared if this is intended for client-to-resolver DNS or resolver-to-authoritative DNS. If the latter, it looks like just another method of DoE, and like any of those, can be solvable (only?) by DELEG.

I'd like to see the direct comparison against DoQ. I understand that this should be more lightweight. On the other hand, DoQ is already invented and being implemented, with some hope to succeed. So I don't feel motivated to look around for alternatives.

Libor

Dne 15. 08. 24 v 12:14 Peter Thomassen napsal(a):
Hi Vint,

On 8/15/24 00:06, Vint Joseph wrote:
The core idea/synopsis
We plan to implement a system using elliptic curve cryptography. A preshared key, referred to as the public key G^S, is distributed from the dns server to the client.

How?

Best,
Peter

The server retains the private key S and the corresponding public key G^S, while the client receives the public key G^S. When the client needs a DNS response, it generates a key pair consisting of a private key C and a public key G^C. The client then sends a DNS request encrypted with the shared key G^CS and includes its public key G^C in the DNS extension. Upon receiving the public key G^C, the DNS server computes the shared key G^CS using its private key S and the client's public key G^C. These are ephemeral keys, ensuring that each DNS packet has its own session keys. The DNS server responds to the DNS query and sends the DNS response encrypted using G^CS. If the DNS server plans to change the keys, then a public key G^S1 is sent to the client , in the response packet. But these are optimizations which can be done later.
Thank you and I'm looking forward to your feedback!

Best regards,
Vineeth

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org


_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to