Ralf,

The "same-domain" requirement here serves two main purposes:

1. Prevent DDoS attacks.  A malicious DNS server could cause a large number of 
clients to fetch incident reports from an arbitrary victim server.  (c.f. Great 
Cannon [A])

2. Block reports that transited a naive forwarder.  These reports could be 
inauthentic, if the forwarder's upstream transport is unencrypted.

We could probably develop some technical mechanism that prevents both of these 
attacks without the same-domain requirement.  However, that may not be 
necessary.  As Emily points out, clients (i.e. browsers) might have their own 
reputation systems for determining which reports can safely be displayed to the 
user.

When the client applies its own reputation system, the same-domain requirement 
and central registry are both unnecessary.

--Ben Schwartz

[A] https://en.wikipedia.org/wiki/Great_Cannon
________________________________
From: Ralf Weber <d...@fl1ger.de>
Sent: Thursday, November 7, 2024 11:25 AM
To: Ben Schwartz <bemasc=40meta....@dmarc.ietf.org>
Cc: Stephane Bortzmeyer <bortzmeyer=40nic...@dmarc.ietf.org>; Mark Nottingham 
<mnot=40mnot....@dmarc.ietf.org>; dnsop@ietf.org <dnsop@ietf.org>
Subject: [DNSOP] Re: New Version Notification for 
draft-nottingham-public-resolver-errors-00.txt

Moin!

On 7 Nov 2024, at 15:19, Ben Schwartz wrote:

> I think this proposal is promising, but I agree with Stephane that the 
> registry of participating resolvers is unappealing.  However, I believe it is 
> also unnecessary.  Instead, the EXTRA-TEXT can simply convey an "https://"; 
> URL for the Incident Description.  The client can enforce that this URL's 
> hostname be the same as the one used to reach DNS server, ensuring 
> authenticity.

I don’t think having the DoH server also present blocking information is a good 
idea. The draft does also not put any restrictions on the URI template and I 
would rather have my DoH servers focus on delivering DNS answers via DoH.

So I think a registry is needed. What that registry is and who will be in that 
registry needs to be discussed. While the definition in 6.2 does not put any 
limit on that the last paragraph of the introduction does. A better way to 
limit that IMHO would be to allow only resolver operators to be added to the 
registries that are under regulation as only those are usually forced to block 
stuff and hence need the transperency.


> For clients using insecure DNS, I would probably rule out this mechanism 
> entirely, since the authenticity of the report cannot be established.

That is what draft-ietf-dnsop-structured-dns-error says in section 5.3 anyway, 
and this is an extension of this as I understand it.

So long
-Ralf
——-
Ralf Weber

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to