On Mon, Oct 7, 2024 at 6:01 AM Paul Wouters <paul.wout...@aiven.io> wrote:

>
> On Sun, Oct 6, 2024 at 12:17 PM Eric Rescorla <e...@rtfm.com> wrote:
>
>> This is explicitly prohibited rfc9460 as it would provide linkability.
>>>> See rfc9460 section 12: "Clients MUST ensure that their DNS cache is
>>>> partitioned for each local network, or flushed on network changes, to
>>>> prevent a local adversary in one network from implanting a forged DNS
>>>> record that allows them to track users or hinder their connections after
>>>> they leave that network."
>>>>
>>>
>>> Not if the ECH record is DNSSEC signed.
>>>
>>
>> Except that no browser client does DNSSEC validation and there is no
>> realistic prospect of that changing.
>>
>
> If you have a TRR configured that does DNSSEC, you can send the DO bit and
> still have the advantage of the
> upstream DNSSEC without doing the work in the browser.
>

If you do encrypted DNS to a TRR, then you're not subject to attack by
resolvers on the local network, regardless of whether they do DNSSEC.



> Of course even better is using RFC 7901 Chain Query and run the few
> signature validations yourself. It only costs
> 1RTT, just like a regular DNS lookup.
>

The issue with local DNSSEC validation isn't primarily performance; it's
breakage by nonconforming intermediaries.
Actually, as I read RFC 7901, the situation is even worse because there are
going to be valid non-RFC 7901
implementing resolvers, and so the attacker -- who, recall, controls the
local network -- can just refuse
the discovery process described in S 5.1.

-Ekr
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to