Re: [dns-privacy] Datatracker State Update Notice:

2022-03-15 Thread Christian Huitema
review. I will start another PR addressing Francesca and Alvaro's point. After that, we may need an editorial pass for the other comments. The goal should be to have a draft ready when the publishing window reopens. -- Christian Huitema On 3/15/2022 8:59 AM, Eric Vyncke (evyncke) wrote:

Re: [dns-privacy] Datatracker State Update Notice:

2022-03-15 Thread Christian Huitema
e offending node but uses more of the local resource. -- Christian Huitema On 3/15/2022 11:39 AM, Christian Huitema wrote: I have entered issues in our repo for all the reviews by IESG members. Ben Kaduk submitted an editorial PR, and it was accepted. There is another PR being processed to add

Re: [dns-privacy] Datatracker State Update Notice:

2022-03-21 Thread Christian Huitema
ssing [ these points ] improved the quality of the documents." Thanks to the IESG members for all the feedback. -- Christian Huitema On 3/15/2022 3:40 PM, Christian Huitema wrote: Pull request https://github.com/huitema/dnsoquic/pull/159 addresses the second comment from Francesca's

Re: [dns-privacy] I-D Action: draft-ietf-dprive-unilateral-probing-00.txt

2022-04-10 Thread Christian Huitema
ly enable the service for a fraction of their clients, maybe using some kind of filter based on the client's IP. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] I-D Action: draft-ietf-dprive-unilateral-probing-00.txt

2022-04-11 Thread Christian Huitema
ycles but protects the client against spoofs. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] New Version Notification - draft-ietf-dprive-dnsoquic-12.txt

2022-04-28 Thread Christian Huitema
he RFC editors. I trust them, but I will verify that these issues are fixed. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Ext] AD review of draft-ietf-dprive-unilateral-probing-09

2023-07-22 Thread Christian Huitema
or DoQ, padding mechanisms are described in Section 5.4 of [RFC9250]. How much to pad is out of scope of this document, but a reasonable suggestion can be found in [RFC8467]. -- Christian Huitema # Section 4.4 Unsure whether the last paragraph has any value... ` a recursive resolver impl

Re: [dns-privacy] [Technical Errata Reported] RFC9250 (7883)

2024-04-04 Thread Christian Huitema
This wording in RFC9250 was deliberate. It was discussed in details when the RFC was written. The current text correctly reflects the result of these discussions. -- Christian Huitema On 4/4/2024 6:38 PM, RFC Errata System wrote: The following errata report has been submitted for RFC9250

[dns-privacy] A pool is not an onion

2014-10-25 Thread Christian Huitema
hetical side effect. So, if really care about hiding requests, then maybe we should consider an onion network of DNS resolvers, of course connected by ecrypted links. Or maybe use DNS over HTTPS over Tor. -- Christian Huitema ___ dns-privacy mailing li

Re: [dns-privacy] What about CGA-TSIG as a solution for DNS privacy?

2014-10-27 Thread Christian Huitema
te renewal. But, yes, solving the "secure provisioning" issue would be nice. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Verisign patent disclosure

2014-10-29 Thread Christian Huitema
Also, suppliants are bound under oath to disclose all the prior art that they know of. Arguably, after reading this thread, they have to forward it to the patent office. -Original Message- From: "Stephen Farrell" Sent: ‎10/‎29/‎2014 12:48 PM To: "Don Blumenthal" ; "Rubens Kuhl" ; "Flo

Re: [dns-privacy] [dprive-problem-statement] Clearly marking privacy considerations?

2014-11-02 Thread Christian Huitema
s when the services use shared infrastructure like CDN or server pools. Real time passive monitoring enables "automated spoofed response," which are used to instantiate MITM attacks. -- Christian Huitema ___ dns-privacy mailing list dns-pr

Re: [dns-privacy] Another reason not to layer DNS security on TLS

2015-03-08 Thread Christian Huitema
of the server." What kind of privacy would we gain? -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Another reason not to layer DNS security on TLS

2015-03-08 Thread Christian Huitema
you wrote, "at the extreme, any client connecting to 8.8.8.8 is doing DNS..." And I would rather not assume that the data comes from the DNS as in (2), before seeing actual designs... -- Christian Huitema ___ dns-privacy mailing list

Re: [dns-privacy] REMINDER: Call for Adoptions on the 3 documents.

2015-04-17 Thread Christian Huitema
On Friday, April 17, 2015, at 11:48 AM, Warren Kumari wrote: > A reminder that this is underway -- we'd like lots of responses, so > don't be shy... I support adoption of draft-hzhwm-dprive-start-tls-for-dns. -- Christian Huitema ___

Re: [dns-privacy] DPRIVE over UDP or TCP

2015-04-27 Thread Christian Huitema
fic to "pin" the port mappings, something that is not needed nearly as much with TCP. Bottom line, DNS/DTLS/UDP does not have much of an advantage over DNS/TLS/TCP. It looks more like gratuitous complexity. -- Christian Huitema ___ dns-privacy

Re: [dns-privacy] DPRIVE over UDP or TCP

2015-04-27 Thread Christian Huitema
ver time. I assume that the client could learn a "temporary key" that is understood by all servers in the pool, and use that to encrypt the messages. But then that requires a fair bit of coordination between the servers in the anycast pool. -- Christian Huitema __

Re: [dns-privacy] DPRIVE over UDP or TCP

2015-04-27 Thread Christian Huitema
;s true, then we should just pick UDP/TLS/TCP and be done with it. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] How many mechanisms in draft-ietf-dprive-start-tls-for-dns?

2015-05-17 Thread Christian Huitema
are that it will also mess with port 53. NAT the connection, drop the STARTTLS, and voila, MITM on 53. If we need a "dirty fallback," then it has to be port 443. The same dirty fallback that other applications use. -- Christian Huitema ___

Re: [dns-privacy] Call For Adoption: draft-wing-dprive-dnsodtls

2015-05-25 Thread Christian Huitema
> Resolution latency is very crucial for DNS system and the latency of > DNS-over-DTLS is relatively low compared with DNS-over-TLS. Do you have measurements showing that, or is it just an opinion? -- Christian Huitema ___ dns-privacy mailin

Re: [dns-privacy] Direction of draft-mayrhofer-edns0-padding

2015-08-05 Thread Christian Huitema
ding will be available at best with TLS 1.3, so we may have to wait some time. And then, there is the general argument that when the application can do padding, this is more efficient than a generic TLS solution. So, yes, that draft is useful. -- Christian Huitema _

Re: [dns-privacy] Please review documents...

2015-09-30 Thread Christian Huitema
sponses. We needed some help to get the encapsulation right. The draft defines the encapsulation format by a reference to DNS over TCP, which is probably fine but confused us. Once the actual encapsulation was explained, everything sailed smoothly. -- Christian Huitema

Re: [dns-privacy] review of draft-ietf-dprive-dnsodtls-01

2015-10-07 Thread Christian Huitema
rement should be very clear in a standards track document. Maybe we should have a unified draft, along the lines of "DTLS and fallback to TLS." -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Non-zero padding (was EDNS0 padding with non-0 MUST respond with FORMERR?)

2015-11-20 Thread Christian Huitema
s futile. Let's keep it simple. I am also reluctant to mandate randomness because this can be a very deep rabbit hole, and is not needed if the local TLS stack does not do compression. What about SHOULD send zeroes, MAY send random, MUST NOT look at the received padding? -- Christian Huitema

Re: [dns-privacy] Non-zero padding (was EDNS0 padding with non-0 MUST respond with FORMERR?)

2015-11-20 Thread Christian Huitema
with lazy developers. But then, if they are really lazy, they will just call memzero and meet the requirement. Knowing that other developers may legitimately send something else than zero will also give teeth to the "must ignore" requirement. -- Christian Huitema _

Re: [dns-privacy] I-D Action: draft-ietf-dprive-edns0-padding-01.txt

2015-11-24 Thread Christian Huitema
o are too clever by half. But there are so many hypothetical things that such hypothetical types could do wrong, you don't want to spend time enumerating each and any of them. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@iet

Re: [dns-privacy] I-D Action: draft-ietf-dprive-edns0-padding-01.txt

2015-11-25 Thread Christian Huitema
its objectives: get the option code reserved, and make sure that the option can be used without creating interop issues. We should be happy with that. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailma

[dns-privacy] Review of draft-ietf-dprive-dnsodtls-03.txt

2015-11-27 Thread Christian Huitema
e this kind of deployment considerations for the DTLS draft, and moves them to a common document for TLS and DTLS. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Review of draft-ietf-dprive-dnsodtls-03.txt

2015-11-28 Thread Christian Huitema
ed in https://tools.ietf.org/html/draft-ietf-dprive-dnsodtls- > 03 My bad. Yes, you are right, I somehow missed it when reading the draft. And I agree with your proposed resolution of the other 2 issues. -- Christian Huitema ___ dns-privacy

Re: [dns-privacy] 2nd WGLC for draft-ietf-dprive-dns-over-tls-02.

2015-12-09 Thread Christian Huitema
, there is the question of how often clients should be updated, regardless of the age of the pins. But since it is pretty obvious that key-pinning could also be used by DNS-over-DTLS, the fine details on how to manage pinning and provision clients probably belong in a common document, and th

Re: [dns-privacy] Call for Adoption: draft-dgr-dprive-dtls-and-tls-profiles

2016-01-23 Thread Christian Huitema
e for work" domains. Encrypted connections to a DNS server could traverse these firewalls, and bypass these policy controls. The issue is documented in CERT Alert (TA15-240A), "Controlling Outbound DNS Access," https://www.us-cert.gov/ncas/alerts/TA15-240A. We should address it.

[dns-privacy] Deployment issues

2016-06-02 Thread Christian Huitema
o get data from authoritative resolvers. Or DNS over DTLS. Or a variation of DNS over HTTPS. But are we standardizing that? Is this part of DPRIVE's charter? -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/

Re: [dns-privacy] Deployment issues

2016-06-03 Thread Christian Huitema
ll and cuddly and easy to track. Or big and robust and a target for hacks and threats. That's better than nothing in the short term, but we should not stop there. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] DPRIVE client with captive portal

2016-08-08 Thread Christian Huitema
system MUST alert by some means that the DNS is not private during such bootstrap. Seems that the case is covered. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.

2016-08-19 Thread Christian Huitema
changes to DNS over DTLS when the DTLS spec evolves. -- Christian Huitema From: dns-privacy [mailto:dns-privacy-boun...@ietf.org] On Behalf Of Tirumaleswar Reddy (tireddy) Sent: Thursday, August 18, 2016 7:18 AM To: Bob Harold Cc: dprive-cha...@tools.ietf.org; dns-privacy@ietf.org

Re: [dns-privacy] More WGLC reviews for TLS Profiles draft?

2016-12-08 Thread Christian Huitema
DNS servers are configured by untrusted processes. It would be nice if we had a blow-by-blow example of how that's supposed to work. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Step 2] More discussion needed: state your opinion

2016-12-13 Thread Christian Huitema
ead of queue blocking, and better service than DTCP because it does not limit the amount of data sent in queries and response. But of course, the QUIC WG is just getting started, so it will probably take two years before we can start deployment of something like DNS over QUIC. -- Chris

Re: [dns-privacy] [Step 2] More discussion needed: state your opinion

2016-12-15 Thread Christian Huitema
TCP when the message exceeds a certain size, and that's a big advantage over DTLS. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

[dns-privacy] Fwd: Fwd: New Version Notification for draft-huitema-quic-dnsoquic-00.txt

2017-04-10 Thread Christian Huitema
FYI: Just published this draft describing transport of DNS over a dedicated QUIC connection. -- Christian Huitema Forwarded Message Subject:New Version Notification for draft-huitema-quic-dnsoquic-00.txt Date: Mon, 10 Apr 2017 09:45:37 -0700 From: internet-dra

Re: [dns-privacy] Fwd: Fwd: New Version Notification for draft-huitema-quic-dnsoquic-00.txt

2017-04-11 Thread Christian Huitema
on would be to instruct the transport to perform a particular padding strategy, similar to the padding strategies developed for DNS. This would cover many applications, not just DNS. Failing that, padding at the DNS layer has the advantage of being easy to implement. -- Christian Huitema

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-27 Thread Christian Huitema
yte string, corresponding to the ASCII value "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n", which the server acknowledges by sending a "SETTINGS" frame. So maybe we could build on that, and let application register their specific 24 bytes string, allowing for demux

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-27 Thread Christian Huitema
ation messages are interleaved, traffic analysis becomes significantly harder. That the approach proposed in https://datatracker.ietf.org/doc/draft-hoffman-dns-in-existing-http2/, or in https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-wireformat-http/. We are really seeing many flowers

Re: [dns-privacy] some DNS privacy implementation benchmark

2017-08-12 Thread Christian Huitema
tubby" working. > > As I have this setup now, is there an working implementation that is > missing and should also be in the list? > > DNS-over-QUIC? > DNS-over-HTTP(S)? You probably need to wait until at least October for realistic implementations of DNS over QUIC. --

Re: [dns-privacy] Oblivious DNS

2018-04-09 Thread Christian Huitema
first place? -- Christian Huitema > On Apr 9, 2018, at 10:25 AM, Allison Mankin wrote: > > Annie, Nick and Paul all plan to be at the Hackathon and the IETF in > Montreal. This is work I'm also involved in, and we are working on an i-d > for DPRIVE, to come soon. > >

Re: [dns-privacy] Oblivious DNS

2018-04-09 Thread Christian Huitema
On 4/9/2018 11:00 AM, Warren Kumari wrote: > On Mon, Apr 9, 2018 at 1:53 PM Christian Huitema <mailto:huit...@huitema.net>> wrote: > > At first sight, it seems that this moves the logging hole from the > DNS recursive to the ODNS recursive, and that's a meh

Re: [dns-privacy] Resolver to authoritative discussion guidance

2018-09-07 Thread Christian Huitema
nt approach, the adversaries will have to gain cooperation of a large number of servers, which may well be located in a variety of jurisdictions. This could be much harder. And because of that, I am quite interested in practical ways to encrypt the traffic from clients to authoritative servers. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] User Perspective

2018-09-25 Thread Christian Huitema
better than either UDP or TCP in all scenarios; if it is not, QUIC still performs slightly better than TCP or TLS, because it does not suffer from head of line blocking. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] User Perspective

2018-09-26 Thread Christian Huitema
On 9/26/2018 4:15 AM, Tony Finch wrote: > Christian Huitema wrote: >> The basic QUIC handshake will be 1-RTT before sending the first query, >> with two exceptions: > Thanks for those details! > >> Using 0-RTT is a trade-off between security and performance, beca

Re: [dns-privacy] User Perspective

2018-09-26 Thread Christian Huitema
On 9/25/2018 2:30 PM, Mukund Sivaraman wrote: > Hi Christian > > On Tue, Sep 25, 2018 at 01:40:59PM -0700, Christian Huitema wrote: >> On 9/25/2018 12:15 PM, Tony Finch wrote: >> >>> For DNS-over-QUIC I think that could drop to 2RTT, or maybe 1RTT? I don't >

Re: [dns-privacy] [Doh] [Ext] DNS over HTTP/3?

2018-11-20 Thread Christian Huitema
ch domains are resolved in a particular context, and how they are resolved. But at the same time, the DNS is a widely distributed database accessible through thousands of servers. Given this wide availability, do you really believe that these control techniques ar

Re: [dns-privacy] [Doh] [Ext] DNS over HTTP/3?

2018-11-21 Thread Christian Huitema
On 11/20/2018 11:39 PM, Vittorio Bertola wrote: >> Il 21 novembre 2018 alle 5.44 Christian Huitema ha >> scritto: >> >> Maybe. Over time various entities have developed control techniques that >> work by limiting which domains are resolved in a particular context

Re: [dns-privacy] DNS PRIVate Exchange (dprive) WG Virtual Meeting: 2018-12-10

2018-12-02 Thread Christian Huitema
s on a given day, and that could very well change day to day. It would be nice if whatever we do does not come as yet another reason to concentrate all the services on a few big platforms... -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] New: draft-bertola-bcp-doh-clients

2019-03-10 Thread Christian Huitema
r space allows for immediate adoption of DNSSEC and privacy enhancements, even when the operating system or the local network does not support them. That genie is not going back in the bottle any time soon. -- Christian Huitema ___ dns-privacy mailing list dns

Re: [dns-privacy] [DNSOP] New: draft-bertola-bcp-doh-clients

2019-03-10 Thread Christian Huitema
f those, there is just one scenario for which the claim has some legitimacy: if the company pays for my laptop and own the laptop, yes of course it has a legitimate claim to control how I am using it. Otherwise, I, the user, get to decide. If I like the application's setting better than t

Re: [dns-privacy] [DNSOP] New: draft-bertola-bcp-doh-clients

2019-03-10 Thread Christian Huitema
many cases in which the contractual power of the network is limited  -- thinks like fair access, network neutrality, etc. Just claiming an empire does not automatically make you the emperor. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [DNSOP] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Christian Huitema
e been called to decide that sort of things, in particular for various "shrink wrap" software licenses. The results vary. Sometimes the courts let the fine print stand, some times they treat it as an abuse of power and nullify it. Which points exactly to Stephane's characterization

Re: [dns-privacy] [DNSOP] [Doh] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Christian Huitema
des public accommodation. Just like hotels cannot discriminate against some categories of customers, I don't think that places providing public connectivity should be able to discriminate against content accessed by their guests. -- Christian Huitema ___

Re: [dns-privacy] [DNSOP] [Doh] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Christian Huitema
tled to override the user choices and impose their own. Really? As Stephane wrote, that may be legit in some circumstances, but much more questionable in others, such as a hotel Wi-Fi attempting to decide what sites I could or could not access. It really is a tussle. -- C

Re: [dns-privacy] [DNSOP] [Doh] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Christian Huitema
trolled by the user. You are claiming that safety mandates giving the network operator full control over name resolution. Both of these positions come from specific visions about how the network should work. Neither is more a political goal than the other. -- Christian Huitema ___

Re: [dns-privacy] [DNSOP] [Doh] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Christian Huitema
d middle-boxes and filtered content because they could. They did not exactly try to get a mandate, or obtain consensus that this was proper. Technologies like DoH force the discussion in the open. Why do you think you can filter content? Who made you king? -- Christian Huitema

Re: [dns-privacy] [Doh] [DNSOP] New: draft-bertola-bcp-doh-clients

2019-03-12 Thread Christian Huitema
On 3/12/2019 9:25 PM, Vittorio Bertola wrote: >> Il 13 marzo 2019 alle 4.39 Christian Huitema ha >> scritto: >> >> On 3/12/2019 7:56 PM, Vittorio Bertola wrote: >>> The reaction I got from some policy people when I mentioned this kind of >>> argumen

Re: [dns-privacy] [DNSOP] [Doh] New: draft-bertola-bcp-doh-clients

2019-03-13 Thread Christian Huitema
On 3/13/2019 9:56 AM, Livingood, Jason wrote: > On 3/12/19, 11:40 PM, "Doh on behalf of Christian Huitema" > wrote: > >> Why do you think you can filter content? Who made you king? > [JL] End users may have opted into / subscribed to such a parental control >

Re: [dns-privacy] draft-ietf-dprive-bcp-op-2 and tls

2019-03-29 Thread Christian Huitema
s being resumed, and with all the sessions before that in a chain of resumptions. That means the server can track the client. If the client does not want that, it will not use session resumption. Hence, the requirement that "Clients should not be required to use TLS sess

Re: [dns-privacy] Fwd: New Version Notification for draft-ghedini-dprive-early-data-01.txt

2019-07-19 Thread Christian Huitema
with the "session resumption ticket" acting as a super cookie, and allowing the server to link the resumed session with the previous one, thus exposing more of the client's "history". -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Call for Adoption: draft-hal-adot-operational-considerations

2019-08-20 Thread Christian Huitema
dea of a progressive transition without disruption. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Ext] Re: ADoT requirements for authentication?

2019-10-29 Thread Christian Huitema
ty of ADOT did not depend on PKI, because that would introduce a circular dependency. Using DANE instead of PKI there seems prudent. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Threat Model

2019-11-01 Thread Christian Huitema
gree should be in scope? I would think so, yes. I am also concerned with attackers "on the side". They too might try to downgrade the connections from ADOT to clear text. But yes, that should be the general concern: preventing both downgrade attacks and MITM attacks. -- Christian Huitem

Re: [dns-privacy] ADoT signalling

2019-11-04 Thread Christian Huitema
ause I would expect recursive > resolvers to generally be operated by people who are able to establish > their port 853 status. Note that port 853 is a convention. Servers could trivially run multiple services over port 443, and demux based on the ALPN. I suppose that if we see a lot blockage of

Re: [dns-privacy] ADoT signalling

2019-11-05 Thread Christian Huitema
plan to use the same code for receiving DNS requests natively in QUIC streams or through HTTP POST operations. On the client side the code is markedly simpler without the HTTP overhead. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Last-Call] last call review of draft-ietf-dprive-rfc7626-bis-03

2020-01-08 Thread Christian Huitema
ut client identifiers, but there is indeed a difference in complexity between DoH and DoT. Yes you could minimize it by using an absolutely minimal implementation of HTTP for DoH, but the very idea of DoH is to reuse existing HTTP infrastructure for DNS. In practice that

Re: [dns-privacy] Review of draft-ietf-dprive-rfc7626-bis-03 - Section 3.5.1.1 Comments

2020-01-08 Thread Christian Huitema
back end of the network. It could also achieve the opposite, but there are risks on both sides of this issue. I don't see how we can achieve consensus that one side of the risk is more dangerous than the other. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Last-Call] Review of draft-ietf-dprive-rfc7626-bis-03 - Section 3.5.1.1 Comments

2020-01-09 Thread Christian Huitema
r than the 8 networks mentioned as handling 53% of traffic in Pawel and Oliver's study. And yes, it is important to monitor these trends. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

[dns-privacy] Fwd: New Version Notification for draft-huitema-dprive-dnsoquic-00.txt

2020-03-05 Thread Christian Huitema
We just resubmitted the DNS over QUIC draft to DPRIVE. Thanks in advance for the feedback! -- Christian Huitema Forwarded Message Subject:New Version Notification for draft-huitema-dprive-dnsoquic-00.txt Date: Thu, 05 Mar 2020 20:46:29 -0800 From: internet-dra

Re: [dns-privacy] Fwd: New Version Notification for draft-huitema-dprive-dnsoquic-00.txt

2020-03-19 Thread Christian Huitema
On 3/6/2020 6:12 AM, Tony Finch wrote: > Christian Huitema wrote: > >> We just resubmitted the DNS over QUIC draft to DPRIVE. Thanks in advance >> for the feedback! > Looks promising! I have a few comments: > > Is the ALPN "dq" or "doq"? 4.1 and 4.

Re: [dns-privacy] [Ext] Fwd: New Version Notification for draft-huitema-dprive-dnsoquic-00.txt

2020-03-19 Thread Christian Huitema
p to the Introduction. That would leave Section 3.4 just about the > stated design goal. Yes. I would like to end up with just a spec, and leave the discussion about DoT vs DoQ vs DoH vs DoH3 to some other document... -- Christian Huitema ___ dns-pr

Re: [dns-privacy] [Ext] Fwd: New Version Notification for draft-huitema-dprive-dnsoquic-00.txt

2020-03-20 Thread Christian Huitema
sn’t need to > have any code for checking state. QUIC BTW is based on UDP. > And common sense may or may not be right. For many implementations of Quic, encryptions is not the bottleneck. You can run AES GCM at 20 Gbps or more on a single CPU thread. The actual bottleneck is the cost of UDP s

Re: [dns-privacy] Call for Adoption: draft-ghedini-dprive-early-data

2020-04-13 Thread Christian Huitema
+1. I too support adoption. I would much rather reference Alessandro's draft than have to write a paraphrase of it in the DoQ draft. -- Christian Huitema On 4/13/2020 7:47 PM, Martin Thomson wrote: > What Sean said. This is worth doing right. > > I've already reviewed Ales

Re: [dns-privacy] Datatracker State Update Notice:

2020-05-11 Thread Christian Huitema
tion 6.1.1.2, I would scratch most of it, maybe just keeping the very first and the very last paragraph. The text in between does not add much to the specific topic of DNS privacy. Also, there is the ADD working group dedicated to discovery and configuration of encrypted servers. There is no point in

Re: [dns-privacy] Datatracker State Update Notice:

2020-05-13 Thread Christian Huitema
out of the rfc7626-bis draft, and start a separate effort to describe centralization issues. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

2020-05-24 Thread Christian Huitema
of domains. If the client really wants privacy, then maybe it should use ToR or some other mixer to hide its IP address, in which case the debate is moot. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

2020-05-30 Thread Christian Huitema
DP/DoQ are supported. Have you thought about that? -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] NS names, was re-evaluation of the draft, was Re: [Fwd: New Version Notification for draft-vandijk-dprive-ds-dot-signal-and-pin-00.txt]

2020-06-09 Thread Christian Huitema
r and an authoritative server can be used for requests to all domains served by that authoritative server. That's better for both performance and privacy. -- Christian Huitema -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] I-D Action: draft-ietf-dprive-dnsoquic-00.txt

2020-06-26 Thread Christian Huitema
Jan, Should we organize an interop session for the hackathon?  I could set up a page for that. -- Christian Huitema On 6/26/2020 11:09 AM, Jan Včelák wrote: > Hello. > > This is just a quick note that I've refreshed the DNS-over-QUIC proxy > and client code that we wrote at I

Re: [dns-privacy] DNS and QUIC,HTTP/3 Long term vision...

2020-10-07 Thread Christian Huitema
cause operating system resolvers would normally not mix their queries with existing HTTP sessions, and thus don't get any advantage from "integrating to the web" -- unless of course firewall traversal is a big issue. -- Christian Huitema On 10/7/2020 8:31 AM, Tommy Pauly wrote: >

Re: [dns-privacy] DNS and QUIC,HTTP/3 Long term vision...

2020-10-09 Thread Christian Huitema
f RFC 8890. OTOH, if an implementation (like Chrome) is going to use a dedicated connection for DoH (H2 or H3), then it probably could just as well use DoT or DoQ. The only issue is firewalls that would filter based on the DoT or DoQ ALPN, but ECH/ESNI would easily fix that. Hard to b

[dns-privacy] For Stéphane

2020-10-19 Thread Christian Huitema
ic.fr [192.134.4.13] SMTP error from remote mail server after RCPT TO:: 550 5.7.1 : Recipient address rejected: Please see http://www.openspf.net/Why?s=mfrom;id=huitema%40huitema.net;ip=138.201.61.189;r=mx5.nic.fr -- Christian Huitema __

Re: [dns-privacy] Root Server Operators Statement on DNS Encryption

2021-03-31 Thread Christian Huitema
but rather wait and see until the technology matures. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Root Server Operators Statement on DNS Encryption

2021-04-01 Thread Christian Huitema
> On Mar 31, 2021, at 10:51 PM, Rob Sayre wrote: > >  > On Wed, Mar 31, 2021 at 10:43 PM Christian Huitema > wrote: >> I think that's the big motivation behind DoQ. Because QUIC runs over UDP, it >> makes some things easier than TCP. In particular, I h

[dns-privacy] Use of 0-RTT in DNS over QUIC

2021-07-29 Thread Christian Huitema
client, which simply abstains to send some classes of requests over 0-RTT. - Or, of course, allow servers to support 0-RTT without any kind of filtering. Any particular opinion in the working group? -- Christian Huitema ___ dns-privacy mailing

Re: [dns-privacy] Use of 0-RTT in DNS over QUIC

2021-07-30 Thread Christian Huitema
handshakes or if ticket is old". Some QUIC stack will disable 0-RTT if the ticket is older than 30 seconds, only allowing resumption. This is reasonably easy to implement. -- Christian Huitema On 7/30/2021 8:56 AM, Robert Evans wrote: DoQ plus 0-RTT seems very compelling for achieving 1-

Re: [dns-privacy] Use of 0-RTT in DNS over QUIC

2021-07-30 Thread Christian Huitema
On 7/30/2021 1:38 PM, Robert Evans wrote: On Fri, Jul 30, 2021 at 4:02 PM Christian Huitema wrote: I think we have a reasonable guideline here. 0-RTT for QUIC is so compelling that clients and servers will still do it, even if we tell them not to. So it is better to try provide usage

Re: [dns-privacy] Use of 0-RTT in DNS over QUIC

2021-07-30 Thread Christian Huitema
On 7/30/2021 5:33 PM, Benjamin Kaduk wrote: On Fri, Jul 30, 2021 at 05:21:25PM -0700, Christian Huitema wrote: On 7/30/2021 1:38 PM, Robert Evans wrote: On Fri, Jul 30, 2021 at 4:02 PM Christian Huitema wrote: I think we have a reasonable guideline here. 0-RTT for QUIC is so compelling that

Re: [dns-privacy] Intermediate proposal (what I was saying at the mic)

2021-08-01 Thread Christian Huitema
, the client is probably fine. And given the simplicity of getting PKI, I don't quite see the point of an unauthenticated mode. It does not ease the deployment much, and it paints a thick MITM target. I would rather fall back to Do53 than to unauthenticated DoT or DoQ. -- Christi

Re: [dns-privacy] ADoX experiments (was: Re: Intermediate proposal (what I was saying at the mic))

2021-09-03 Thread Christian Huitema
policy be for those resolvers? Would you let them use TLS without client authentication, or would you want them to fall back to clear text? -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns

Re: [dns-privacy] I-D Action: draft-ietf-dprive-dnsoquic-04.txt

2021-09-09 Thread Christian Huitema
ppose these could be delineated in the guidance RFC.) -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] WGLC review for draft-ietf-dprive-dnsoquic-05

2021-10-14 Thread Christian Huitema
irements for DoQ over future versions of QUIC. As the text says, no deployment of RFC8904 currently exists to our knowledge. The reliance on section 17.2 of RFC 9000 is really an assurance against a very unlikely eventuality, and I cannot see how it would

Re: [dns-privacy] DPRIVE WGLC : https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsoquic/

2021-10-15 Thread Christian Huitema
nd long duration sessions have similar effects on client privacy, and the text needs to reflect that. DPRIVE members may want to discuss these issues on the mailing list. -- Christian Huitema On 10/14/2021 7:38 PM, Martin Thomson wrote: I've reviewed this document (straight from GitHu

Re: [dns-privacy] DoH Identity / Authentication...

2021-10-26 Thread Christian Huitema
he more it looks like we should just do TLS. So in the absence of a really compelling argument for supporting both, along with all of the future overhead it entails, my current position is mutual TLS only. Mutual TLS would work for DoH, DoT or DoQ, so that seems simpler to support. -- Christi

Re: [dns-privacy] Why MUST EDNS(0) Padding option only appear once?

2021-11-01 Thread Christian Huitema
"set right" if there is a way for the application to somehow specify a QUIC padding policy. Otherwise, better be safe and use EDNS padding. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

Re: [dns-privacy] Comments on draft-dkgjsal-dprive-unilateral-probing

2021-11-11 Thread Christian Huitema
rent times to different servers in the farm. Opportunistic strategies and probing strategies have to deal with that. -- Christian Huitema ___ dns-privacy mailing list dns-privacy@ietf.org https://www.ietf.org/mailman/listinfo/dns-privacy

  1   2   >