On Mon, Oct 7, 2024 at 9:26 AM Eric Rescorla <e...@rtfm.com> wrote:

>
>
> On Mon, Oct 7, 2024 at 6:01 AM Paul Wouters <paul.wout...@aiven.io> wrote:
>
>>
>> On Sun, Oct 6, 2024 at 12:17 PM Eric Rescorla <e...@rtfm.com> wrote:
>>
>>> This is explicitly prohibited rfc9460 as it would provide linkability.
>>>>> See rfc9460 section 12: "Clients MUST ensure that their DNS cache is
>>>>> partitioned for each local network, or flushed on network changes, to
>>>>> prevent a local adversary in one network from implanting a forged DNS
>>>>> record that allows them to track users or hinder their connections after
>>>>> they leave that network."
>>>>>
>>>>
>>>> Not if the ECH record is DNSSEC signed.
>>>>
>>>
>>> Except that no browser client does DNSSEC validation and there is no
>>> realistic prospect of that changing.
>>>
>>
>> If you have a TRR configured that does DNSSEC, you can send the DO bit
>> and still have the advantage of the
>> upstream DNSSEC without doing the work in the browser.
>>
>
> If you do encrypted DNS to a TRR, then you're not subject to attack by
> resolvers on the local network, regardless of whether they do DNSSEC.
>

But still you should verify your trusted resolver where you can. Zerotrust
mentality.

Of course even better is using RFC 7901 Chain Query and run the few
>> signature validations yourself. It only costs
>> 1RTT, just like a regular DNS lookup.
>>
>
> The issue with local DNSSEC validation isn't primarily performance; it's
> breakage by nonconforming intermediaries.
>

There are no intermediaries if you connect to proper functioning TRRs (like
1.1.1.1., 8.8.8.8, 9.9.9.9)


> Actually, as I read RFC 7901, the situation is even worse because there
> are going to be valid non-RFC 7901
> implementing resolvers, and so the attacker -- who, recall, controls the
> local network -- can just refuse
> the discovery process described in S 5.1.
>

The local network can only block the DoH  HTTPS connection to your TRR,
they can't selectively block DNS queries within it.

I agree with not using locally assigned DNS resolvers (via DHCP or ADD) for
anything if you value privacy. Obviously, DNSSEC
can't help you for privacy here anyway.

Paul
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to