I did a proof of concept at a hackathon about four years ago, but getting stuff 
like this into actual routers is hard. We are working on it in CSA/Matter, but 
I don’t see that happening this year. 

On Thu, Mar 6, 2025, at 5:44 PM, Phillip Hallam-Baker wrote:
> How widespread is the support for DNS Update of any kind in the DNS servers 
> built into Home Routers?
> 
> The discussion in SETTLE appears to be currently premised on the answer being 
> 'almost nowhere'. If the answer is 'pretty substantial, things become a lot 
> easier...
> 
> On Thu, Mar 6, 2025 at 9:57 AM Ted Lemon <mel...@fugue.com> wrote:
>> __
>> And is in fact used in IoT via the SRP protocol. Eg CSA/Matter and Thread 
>> use it for updating the local dns zone. 
>> 
>> On Wed, Mar 5, 2025, at 10:11 PM, Mark Andrews wrote:
>>> You do know that SIG(0) has existed for 20 years to authenticate UPDATE 
>>> requests?
>>> 
>>> 
>>> -- 
>>> Mark Andrews
>>> 
>>>> On 6 Mar 2025, at 07:08, Phillip Hallam-Baker <ph...@hallambaker.com> 
>>>> wrote:
>>>> 
>>>> Coming late to this, sorry.
>>>> 
>>>> I am looking for a mechanism that allows a user to easily attach IoT 
>>>> devices to a DNS persona that is assigned to them. This is an extension of 
>>>> my work on DNS handles.
>>>> 
>>>> So I am very interested in a better means of updating DNS records than 
>>>> TSIG because symmetric keys are yucky. The reviews on the alternatives 
>>>> like GSS seem to dislike those as well.
>>>> 
>>>> Seems to me that this is something we should be looking at as more than 
>>>> just a patch job. The existing methods are really limited, we really need 
>>>> a public key based authentication scheme to do the job properly. Any new 
>>>> mechanism is going to have to be at least capable of PQC secure 
>>>> interaction.
>>>> 
>>>> The current draft seems to sit in a nomans-land between being a DNS 
>>>> configuration tool and a device/service configuration tool. There is a 
>>>> good case for both but I don't see a good case for DNS configuration 
>>>> tool-lite.
>>>> 
>>>> What I have written in response to the SETTLE proposal is an 'all-in-one' 
>>>> tool that performs the DNS configuration (via UPDATE) and WebPKI 
>>>> configuration (via ACME). That does the job but it is something that 
>>>> really has to be professionally configured to do the DNS integration.
>>>> 
>>>> 
>>>> Some of the technology I have developed already might be relevant.
>>>> 
>>>> Blue Sky is basically an OpenID type infrastructure that uses DNS names as 
>>>> the user identifier. These are linked to a permanent user identifier by 
>>>> means of a prefixed TXT record. My handle definition for 
>>>> @phill.hallambaker.com is:
>>>> 
>>>> _atproto.phill.hallambaker.com. IN TXT 
>>>> "did=did:plc:k647x4n6h3jm347u3t5cm6ki"
>>>> 
>>>> The ATprotocol user is essentially 120% of OpenID functionality with about 
>>>> 10% of the code. It is not an 'identity framework', it is a fully worked 
>>>> solution. 
>>>> 
>>>> So the obvious next step is to extend it to support end-to-end secure 
>>>> communication:
>>>> 
>>>> _jscontact.phill.hallambaker.com. IN TXT 
>>>> "uri=jscontact://mplace2.social/egnb-zk3g-bm4d-qipg-64jh-doxk-7rvq"
>>>> 
>>>> You can see that record unpacked here:
>>>> 
>>>> https://mplace2.social/Visitor/phill.hallambaker.com
>>>> 
>>>> As you can see, my OpenPGP, S/MIME, Signal and Git contact addresses and 
>>>> credentials are all there. So if you resolve my DNS handle, you can do 
>>>> end-to-end secure chat with me via any protocol I list in my contact, 
>>>> legacy or new on a TOFU basis. If you scan the QR code on my business 
>>>> card, you get end-to-end trust from the start.
>>>> 
>>>> The form of the URI is very particular:
>>>> 
>>>> * "egnb-zk3g-bm4d-qipg-64jh-doxk-7rvq" is the truncated SHA-3-512 digest 
>>>> of the contact plaintext
>>>> 
>>>> * The aes-gcm-256 encrypted contact is retrieved from a well-known service 
>>>> at mplace2.social using 
>>>> SHAKE256("locator:egnb-zk3g-bm4d-qipg-64jh-doxk-7rvq") as the path
>>>> 
>>>> * The encrypted contact is decrypted using 
>>>> SHAKE256("locator:egnb-zk3g-bm4d-qipg-64jh-doxk-7rvq") to obtain the key 
>>>> and IV.
>>>> 
>>>> * The recovered plaintext MUST be checked against the digest value.
>>>> 
>>>> The key can be expressed at any precision up to 256 bits to achieve the 
>>>> desired work factor.
>>>> 
>>>> So having given users the ability to create global personas labelled by a 
>>>> DNS name, seems that we should complete the deal and allow Alice to set up 
>>>> a persona for her home and provision devices to it giving them the ability 
>>>> to do HTTPS with regular Web browsers.
>>>> 
>>>> So Alice sets up 'alicehome.cryptomesh.org', she adds herself, 
>>>> (@alice.cryptomesh.org), Bob (@bob.example.com) and Carol 
>>>> (@carol.example.net) to the authorized users list.
>>>> 
>>>> Alice can now buy a camera, scan a QR code on it plug it in and 
>>>> immediately start using it as https://camera1.alicehome.cryptomesh.org/. 
>>>> The camera has a device description on it that gives 'camera' as the 
>>>> default name. It gets a free ACME certificate and uses the OAUTH 
>>>> specifications attached to their handles to authenticate Alice, Bob and 
>>>> Carol.
>>>> 
>>>> 
>>>> My current TSIG scheme works but requires a shared secret that makes 
>>>> things really a bit nasty.
>>>> 
>>>> So let's start with the notion of using the uri mechanism to bind a public 
>>>> key into a zone file. This means we can now use keys of any length - 
>>>> RSA4096, ML-DSA-87, ML-KEM-1024 all are fine. We could probably pack this 
>>>> into a SIG record.
>>>> 
>>>> Anyone interested in a side meeting to hammer this out? The other related 
>>>> forcing function is going to be PQC DNSSEC and that is likely to mean 
>>>> changes as well.
>>>> 
>>>> 
>>>> 
>>>> _______________________________________________
>>>> DNSOP mailing list -- dnsop@ietf.org
>>>> To unsubscribe send an email to dnsop-le...@ietf.org
>>> _______________________________________________
>>> DNSOP mailing list -- dnsop@ietf.org
>>> To unsubscribe send an email to dnsop-le...@ietf.org
>>> 
>> 
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to