Re: [dns-privacy] Measurement & Padding Policy document

2022-04-05 Thread Daniel Kahn Gillmor
On Mon 2022-04-04 11:10:00 +0100, Sara Dickinson wrote: >> On 25 Mar 2022, at 07:46, Alexander Mayrhofer >> wrote: >> Daniel, do you still have the paper from the link mentioned above? > > (The paper does not seem to be available but for reference a set of slides > presented on this work at NDSS

Re: [dns-privacy] review of dprive-unilateral-probing

2022-04-09 Thread Daniel Kahn Gillmor
Hi Alex-- thanks for this thoughtful review! I've adopted most of the changes you highlighted (until we submit a new draft to the datatracker, they can be seen in the editor's draft https://dkg.gitlab.io/dprive-unilateral-probing/), but wanted to note a few of them that I didn't fully incorporate

Re: [dns-privacy] I-D Action: draft-ietf-dprive-unilateral-probing-00.txt

2022-04-10 Thread Daniel Kahn Gillmor
Hi Sara-- Thanks for this thoughtful and detailed review! I'm trying to do it justice, but i haven't gotten through it all yet. It's triggered a bunch of changes in the editor's copy, but I've also focused on the easy stuff first because i'm lazy :P If anyone wants to offer concrete suggestions

Re: [dns-privacy] I-D Action: draft-ietf-dprive-unilateral-probing-00.txt

2022-04-10 Thread Daniel Kahn Gillmor
On Sun 2022-04-10 19:23:21 +0300, Ilari Liusvaara wrote: > Perhaps there could be separate ALPNs for recursive and authoritative > DNS service, with no distinction if authoritative service is > opportunistic or not? What would be the advantage of that distinction? would it be actionable by either

Re: [dns-privacy] I-D Action: draft-ietf-dprive-unilateral-probing-00.txt

2022-04-10 Thread Daniel Kahn Gillmor
On Sun 2022-04-10 11:57:40 -0700, Christian Huitema wrote: > But Sara has a point, we should give servers a way to control the > deployment. Authoritative servers do have a way to control deployment: they can simply refuse connections on encrypted transport. Rather than refusing arbitrary connect

Re: [dns-privacy] I-D Action: draft-ietf-dprive-unilateral-probing-00.txt

2022-04-11 Thread Daniel Kahn Gillmor
Hi Christian-- On Mon 2022-04-11 15:21:26 -0700, Christian Huitema wrote: > True. But this is easy to spoof. right, but it's even easier to spoof an ICMP Port Unreachable, which will undoubtably have the same effect on an opportunistic recursive resolver. > That could work. It would be similar t

Re: [dns-privacy] [Ext] Restarting the discussion of draft-ietf-dprive-unilateral-probing

2022-09-28 Thread Daniel Kahn Gillmor
Thanks for addressing these suggestions from Puneet, Paul. I'm not so sure about this text: On Mon 2022-09-26 22:32:32 +, Paul Hoffman wrote: > Puneet wrote: > >> Generally any NS IP with working encryption should be preferred over >> Do53. > >All resolvers currently keep NS sets and, in

Re: [dns-privacy] [art] [Ext] Artart last call review of draft-ietf-dprive-unilateral-probing-12

2023-09-12 Thread Daniel Kahn Gillmor
On Thu 2023-09-07 19:38:01 -0700, Rob Sayre wrote: > On Thu, Sep 7, 2023 at 7:15 PM Paul Hoffman wrote: > >> On Sep 7, 2023, at 6:58 PM, Bron Gondwana wrote: >> >> Are you proposing a shorter value for "damping", or a note saying "1 >> day is just the suggested value, you might choose a shorter o

Re: [dns-privacy] [Technical Errata Reported] RFC9539 (7831)

2024-03-02 Thread Daniel Kahn Gillmor
Erratum 7831 in RFC 9539 is correct and should be marked as Verified. The "persistence" parameter should indeed be characterized by the specific encrypted transport it is associated with. A recursive resolver that implements both DoT and DoQ may perfer to use different `persistence` parameters fo

Re: [dns-privacy] [Technical Errata Reported] RFC9539 (7832)

2024-03-02 Thread Daniel Kahn Gillmor
Erratum 7832 in RFC 9539 is correct and should be marked as Verified. The "damping" parameter should indeed be characterized by the specific encrypted transport it is associated with. A recursive resolver that implements both DoT and DoQ may perfer to use different `damping` parameters for each e

Re: [dns-privacy] WG Review: DNS PRIVate Exchange (dprive)

2014-10-06 Thread Daniel Kahn Gillmor
On 10/06/2014 08:44 AM, Stephane Bortzmeyer wrote: > [Keep i...@ietf.org in the loop only if it is substantive comments on > the WG creation, please] > > On Fri, Oct 03, 2014 at 10:38:35AM -0700, > The IESG wrote > a message of 68 lines which said: > >> The primary focus of this Working Group

Re: [dns-privacy] The case for both ends of 'end-to-end'

2014-10-23 Thread Daniel Kahn Gillmor
On Thu 2014-10-23 08:45:45 -0400, Phillip Hallam-Baker wrote: > Which in my view means that the recursive has to be a trusted service and > the notion of promiscuous recursive resolver use has to be stamped out. I'm not convinced that your conclusion follows from your premise here, Phil. I agr

Re: [dns-privacy] The case for both ends of 'end-to-end'

2014-10-24 Thread Daniel Kahn Gillmor
On Thu 2014-10-23 22:44:19 -0400, Phillip Hallam-Baker wrote: > On Thu, Oct 23, 2014 at 7:50 PM, Daniel Kahn Gillmor > wrote: > >> On Thu 2014-10-23 08:45:45 -0400, Phillip Hallam-Baker < >> i...@hallambaker.com> wrote: >> >> > Which in my view means that

Re: [dns-privacy] (re-)identifying from sets of queries (was Re: Start of WGLC for draft-ietf-dprive-problem-statement - please review.)

2015-02-28 Thread Daniel Kahn Gillmor
On Fri 2015-02-27 07:28:57 -0500, Stephane Bortzmeyer wrote: > On Fri, Feb 27, 2015 at 11:53:27AM +, > Stephen Farrell wrote > a message of 55 lines which said: > >> How's about adding something like: >> >> 2.6 Re-identification > > OK for me, thanks for the text. Any advice from the WG?

Re: [dns-privacy] Moving things along...

2015-02-28 Thread Daniel Kahn Gillmor
On Thu 2015-02-26 08:57:19 -0500, Phillip Hallam-Baker wrote: > On Thu, Feb 26, 2015 at 6:35 AM, Neil Cook wrote: >> Whilst I don’t deny that ISPs are using middelboxes for things like >> advertising etc, it should also be pointed out that many ISPs are concerned >> about security, and may be usin

Re: [dns-privacy] Another reason not to layer DNS security on TLS

2015-03-08 Thread Daniel Kahn Gillmor
On Sat 2015-03-07 18:09:27 -0800, Watson Ladd wrote: > On Sat, Mar 7, 2015 at 10:43 AM, Phillip Hallam-Baker > wrote: >> One hole that does raise privacy issues is Server Name Identification. If >> you have 200 web sites on a server, you don't want to have to burn an IPv4 >> address for each one.

Re: [dns-privacy] Starting call for adoptions for "the 3 documents"

2015-04-13 Thread Daniel Kahn Gillmor
On Thu 2015-04-09 10:36:17 -0400, Phillip Hallam-Baker wrote: > As I see it, there are two sub-problems: > > 1) How does a client discover and establish a binding to a DPRIV service? > 2) What transport/sessions(s) are supported for queries? > > Before answering either, I think it is pretty clear t

Re: [dns-privacy] Considering DHCP

2015-04-13 Thread Daniel Kahn Gillmor
[ rearranging for chronological sanity ] On Tue 2015-04-14 00:02:24 -0400, Zhiwei Yan wrote: > [ Paul Wouters wrote: ] >> On Tue, 14 Apr 2015, Zhiwei Yan wrote: >>> Then why not consider the DHCP? >>> DHCP can support client authentication and can be used to configure the RS >>> key on the authen

[dns-privacy] draft-ietf-dprive-start-tls-for-dns-00 comments

2015-05-07 Thread Daniel Kahn Gillmor
Hi all-- Thanks for the start-tls-for-dns draft! i'm happy to see it. I have a few pieces of feedback below... -- A structural nit: the draft has no Table of Contents -- can you update whatever drafting toolchain you're using to include one? they're helpful for people trying to navigate t

Re: [dns-privacy] I-D Action: draft-ietf-dprive-start-tls-for-dns-00.txt

2015-05-12 Thread Daniel Kahn Gillmor
On Tue 2015-05-12 14:40:12 -0400, Simon Josefsson wrote: > What I'm basically wondering, and advocating, is if perhaps one method > would be sufficient. This would reduce complexity on the protocol and > implementation level. I agree that a single mechanism would be cleaner, but perhaps the two m

Re: [dns-privacy] Call For Adoption: draft-wing-dprive-dnsodtls

2015-05-22 Thread Daniel Kahn Gillmor
On Wed 2015-05-20 10:03:27 -0400, Tim Wicinski wrote: > During the previous Call for Adoption a number of participants expressed > interest in adopting this work. WG members felt it needed some > improvements, but thought it had potential. The authors addressed the > issues and feel it meets wh

Re: [dns-privacy] draft-mayrhofer-edns0-padding

2015-07-23 Thread Daniel Kahn Gillmor
On Thu 2015-07-23 18:50:14 +0200, Alexander Mayrhofer wrote: > I had a discussion with Daniel Khan Gillmor today, and we talked about > his proposal to specify a padding option in TLS so that message-size > based correlation attacks on encrypted DNS packets could be > prevented. We continued discu

Re: [dns-privacy] Direction of draft-mayrhofer-edns0-padding

2015-07-29 Thread Daniel Kahn Gillmor
Hi folks-- On Wed 2015-07-29 09:41:10 -0400, Paul Hoffman wrote: > On 29 Jul 2015, at 5:28, Alexander Mayrhofer wrote: >> I'm working through my notes from the DPRIVE session regarding the >> EDNS0 Padding option. My takeaway was as follows: >> >> - Generally, this seems to be a reasonable idea >

Re: [dns-privacy] Call for Adoption: draft-mayrhofer-edns0-padding

2015-11-04 Thread Daniel Kahn Gillmor
On Tue 2015-11-03 21:54:27 +0900, Tim Wicinski wrote: > During the meeting on Monday, it was obvious the Working Group wanted to > make this an official EDNS option. We reached out to the author and > while he is traveling for an extended period of time, he is happy to > work on edits (with a s

Re: [dns-privacy] Non-zero padding (was EDNS0 padding with non-0 MUST respond with FORMERR?)

2015-11-16 Thread Daniel Kahn Gillmor
On Mon 2015-11-16 11:32:57 -0500, Shane Kerr wrote: > Probably a paragraph saying "turn off TLS compression" is a better > approach than trying to figure out how to defeat the compression? yes, please. The consensus of the TLS WG is that compression simply does not belong at the TLS layer, that i

Re: [dns-privacy] Non-zero padding (was EDNS0 padding with non-0 MUST respond with FORMERR?)

2015-11-16 Thread Daniel Kahn Gillmor
On Mon 2015-11-16 16:20:21 -0500, Stephen Farrell wrote: > I agree that that is clearly the opinion in the TLS WG today. I'm > less sure I agree that's correct - my fear is that it's being driven > maybe too much by browsers and the web, where the conclusion is > valid. Well, certainly for a syste

Re: [dns-privacy] Non-zero padding (was EDNS0 padding with non-0 MUST respond with FORMERR?)

2015-11-18 Thread Daniel Kahn Gillmor
On Wed 2015-11-18 15:45:51 -0500, Stephane Bortzmeyer wrote: > On Wed, Nov 18, 2015 at 11:30:53AM +1300, > Alex Mayrhofer wrote > a message of 207 lines which said: > >> - I think we should stick with requiring 0x00 padding (I am avoiding >> the term 'payload' here for a reason). This would pre

Re: [dns-privacy] Non-zero padding (was EDNS0 padding with non-0 MUST respond with FORMERR?)

2015-11-19 Thread Daniel Kahn Gillmor
On Thu 2015-11-19 05:07:42 -0500, Warren Kumari wrote: > I also think (but am not sure) that the sender should pad with random > stuff[0] to prevent issues with "accidental" compression. Yes, we can > say that compression MUST be disabled, but will all implementations > follow this? The way many pe

Re: [dns-privacy] I-D Action: draft-ietf-dprive-edns0-padding-01.txt

2015-11-24 Thread Daniel Kahn Gillmor
On Tue 2015-11-24 07:19:47 -0500, Alex Mayrhofer wrote: > I've submitted a new version of the EDNS0 padding draft. The only major > change is that it does now allow for non-0x00 padding octets. I think > this was the (rough) consensus of the respective WG list discussion. Thanks Alex! a couple

Re: [dns-privacy] I-D Action: draft-ietf-dprive-edns0-padding-01.txt

2015-11-25 Thread Daniel Kahn Gillmor
tl;dr: It's not this simple, and we should not try to use this draft to specify padding policy. below are some pointers about why it's not so simple. If you want to make a separate draft about padding policy, i'm happy to have that discussion there, but please don't hold this mechanism draft up f

Re: [dns-privacy] 2nd WGLC for draft-ietf-dprive-dns-over-tls-02.

2015-12-17 Thread Daniel Kahn Gillmor
On Wed 2015-12-09 18:12:41 -0500, Christian Huitema wrote: > However, I am a bit skeptical of some of the requirement to provide > "two or more pins" for each server. This assumes a specific model of > out-of-band provisioning, and it also assumes that servers always have > a second key to fallba

Re: [dns-privacy] I-D Action: draft-ietf-dprive-edns0-padding-02.txt

2016-01-25 Thread Daniel Kahn Gillmor
On Mon 2016-01-25 12:26:59 -0500, Alex Mayrhofer wrote: > This version addresses comments received since the publication of the > last draft version, including the WGLC comments. > > The only bigger change is that (in line with the comments received) > I've generalized the text about Non-0x00 pa

Re: [dns-privacy] DNS + 0-RTT

2016-04-06 Thread Daniel Kahn Gillmor
On Tue 2016-04-05 14:07:27 -0300, Tim Wicinski wrote: > As many of you are aware, with the TLS1.3 spec, there is some security > concerns around DNS+TLS1.3 0-RTT. dkg put together some threat models > and instead of forwarding some long thread, I figure I would put this > out there and let Mr.

Re: [dns-privacy] DNS + 0-RTT

2016-04-09 Thread Daniel Kahn Gillmor
On Wed 2016-04-06 11:08:55 -0300, Colm MacCárthaigh wrote: > On Wed, Apr 6, 2016 at 6:03 AM, Daniel Kahn Gillmor > wrote: > > > forward secrecy > > --- > > > > IIUC for (b), the failing forward secrecy window is constrained by the > >

Re: [dns-privacy] DNS + 0-RTT

2016-04-11 Thread Daniel Kahn Gillmor
On Mon 2016-04-11 08:52:44 -0400, Shane Kerr wrote: > People who know more can correct me if I'm wrong, but my understanding > is that this sort of RRset rotation is intended to work around clients > that would always pick use first RR from an RRset. Back in the day, > that meant that one gopher s

Re: [dns-privacy] DPRIVE client with captive portal

2016-08-09 Thread Daniel Kahn Gillmor
On Mon 2016-08-08 21:41:20 -0400, 🔓Dan Wing wrote: > Thanks. I searched that document, but my search terms were inadequate to > find the necessary text. patches welcome are for changes to draft-ietf-dprive-dtls-and-tls-profiles that would have matched your search terms :) --dkg

Re: [dns-privacy] ENDS0 Padding Profile: Rough first draft

2016-11-01 Thread Daniel Kahn Gillmor
Thanks for https://tools.ietf.org/html/draft-mayrhofer-dprive-padding-profile-00, Alex! On Tue 2016-11-01 07:09:28 -0400, Hugo Connery wrote: > The list of strategies looks great.  Perhaps you could mention > the "pad the message to the maximum possible message length" > explicitly as a sub-case o

Re: [dns-privacy] Call for Adoption: draft-mayrhofer-dprive-padding-profile

2016-11-18 Thread Daniel Kahn Gillmor
On Fri 2016-11-18 13:42:08 +0900, Warren Kumari wrote: > This starts a Call for Adoption for draft-mayrhofer-dprive-padding-profile. [...] > Please also indicate if you are willing to contribute text, review, etc. As i said in the meeting Friday, I support WG adoption of this document. Implement

Re: [dns-privacy] DNS over DTLS

2016-12-01 Thread Daniel Kahn Gillmor
On Fri 2016-12-02 01:22:40 -0500, Tariq Saraj wrote: > Thanks for your detailed reply, the point I am trying to highlight is the > changes in TCP for DNS which is "TCP out of order packet delivery, i.e. the > OOOP". I think you're referring to "out of order processing" for DNS requests by a recurs

[dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-24 Thread Daniel Kahn Gillmor
orial cleanup can be made as merge requests to https://gitlab.com/dkg/hddemux or by private e-mail. Please send flames by private e-mail only :) --dkg --- Begin Message --- A new version of I-D, draft-dkg-dprive-demux-dns-http-00.txt has been successfully submitted by Daniel Kahn Gillmor and p

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-26 Thread Daniel Kahn Gillmor
Hi Jan-- On Wed 2017-04-26 11:05:33 +0200, Jan Včelák wrote: > thank you for writing this down. The draft is great. And it's awesome > that it's accompanied with an actual running code. thanks! and thanks for the quick review :) > A have just a few notes after reading the draft for the first ti

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-27 Thread Daniel Kahn Gillmor
On Thu 2017-04-27 11:28:15 +0100, Tony Finch wrote: > Section 3.2.2 HTTP/1 > > Is there a SP missing between the request-target and the HTTP-version in > the diagram of the shortest possible request? whoops, i can't believe i missed that. thanks! fixed in git: https://gitlab.com/dkg/hddemu

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-28 Thread Daniel Kahn Gillmor
Hi Joe-- Thanks for the feedback! On Thu 2017-04-27 10:13:54 -0700, Joe Touch wrote: > Speaking as an IANA ports team reviewer: > > IMO this document needs to UPDATE the HTTPS specification. The draft isn't strictly about HTTPS, though that context is certainly a prime motivating factor. It's

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-28 Thread Daniel Kahn Gillmor
On Thu 2017-04-27 12:17:30 -0700, Paul Hoffman wrote: > On 27 Apr 2017, at 11:51, Christian Huitema wrote: > >> So maybe we could build on that, and let application register their >> specific 24 bytes string, allowing for demux on top of TLS. That would >> define an organized process. > > ...which

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-28 Thread Daniel Kahn Gillmor
On Thu 2017-04-27 17:34:27 +, Hugo Maxwell Connery wrote: > Should we mandate that all future protocols are "demuxible" from > all previous? fwiw, i'm not prepared to make any kind of statement anywhere near that grand, and i'd hope that the specific proposal under discussion doesn't hinge on

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-28 Thread Daniel Kahn Gillmor
On Fri 2017-04-28 08:57:39 -0700, Joe Touch wrote: >> -- existing HTTPS isn't going to move to a new port, which means >> traffic on that port would be suspect to a would-be censor or a >> pervasive monitor, right? > > All traffic on the Internet is already subject to censorship and > monitoring.

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-28 Thread Daniel Kahn Gillmor
On Fri 2017-04-28 09:15:18 +0100, Ray Bellis wrote: > On 28/04/2017 08:42, Daniel Kahn Gillmor wrote: > >> But does the non-predictability requirement hold in stream-based DNS, >> where the establishment of the stream itself provides at least as good >> protection against s

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-00.txt]

2017-04-28 Thread Daniel Kahn Gillmor
On Fri 2017-04-28 08:50:44 -0700, Joe Touch wrote: > On 4/28/2017 12:14 AM, Daniel Kahn Gillmor wrote: >> In particular, the approach i've described in the draft only works for >> client-speaks-first, stream-based protocols. > > I don't think you can assert that

[dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
Hi HTTP folks-- I've just pushed a revision to a recent individual submission about a technique for hiding DNS traffic that makes use of HTTP: https://datatracker.ietf.org/doc/draft-dkg-dprive-demux-dns-http/ It describes how a TLS server can offer both HTTPS and DNS-over-TLS on the same port,

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
On Wed 2017-05-03 12:35:52 -0700, Roy T. Fielding wrote: > I see no reason to suggest that spraying DNS on an HTTP connection would > be interoperable. HTTP/1.x has a tradition (good or bad) of allowing > robust parsing of bad messages, which means no analysis of DNS uniqueness > can guard against

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
Hi Patrick-- On Wed 2017-05-03 14:57:24 -0400, Patrick McManus wrote: > My initial response is that legacy HTTP/1 implementations will sink you by > scanning for stuff that looks like HTTP in your stream - even if the > leading bytes don't match the production those RFCs required (and HTTP/1.0 >

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
On Wed 2017-05-03 15:13:43 -0400, Patrick McManus wrote: > I forgot to mention another potential challenge with the demux approach - > h2 is not client send first.. typically both sides send SETTINGS > simultaneously.. and its important to the server not to hold those back > .5RTT as it can contain

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
Hi Colm-- On Wed 2017-05-03 12:26:40 -0700, Colm MacCárthaigh wrote: > Cool idea. One concern might be compatibility with other similar > mechanisms. For example, there are protocols such as Netscaler Client IP: > > https://www.citrix.com/blogs/2016/04/25/how-to-enable-client-ip-in-tcpip-option-of

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
Hi Alex-- On Wed 2017-05-03 17:34:47 -0600, Alex Rousskov wrote: > On 05/03/2017 05:17 PM, Daniel Kahn Gillmor wrote: >> The idea of the demuxing stage is that a server that opts into this would >> put the demuxing *before* the HTTP/1 server implementation gets access >> to t

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
On Thu 2017-05-04 10:21:20 +1000, Martin Thomson wrote: > On 4 May 2017 at 10:14, Mike Bishop wrote: >> It's ALPN. At first blush, I would pick a different ALPN token for >> h2+DNS and define it as a new, derivative protocol. > > For DKG to realize his goal, every client would have to offer that

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
On Wed 2017-05-03 20:37:21 -0400, Patrick McManus wrote: >> is the draft you and Paul are working on different than >> ietf-dnsop-dns-wireformat-http ? Can they be reconciled? > > its a superset of that -more aligned with HTTP than that draft, but it can > also carry wireformat. > > your work does

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
On Wed 2017-05-03 20:49:22 -0400, Patrick McManus wrote: > the http/1 share of https:// traffic is dwindling fast. Its down to about > 1/3 of https for me. So if you're looking to hide in a big pool, that's a > shrinking segment. 1/3 of https traffic is still huge collateral damage to inflict, if

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener [New Version Notification for draft-dkg-dprive-demux-dns-http-02]

2017-05-03 Thread Daniel Kahn Gillmor
On Thu 2017-05-04 11:11:59 +1000, Martin Thomson wrote: > On 4 May 2017 at 10:43, Daniel Kahn Gillmor wrote: >> I address this in the draft section "Why not ALPN?" -- if anyone thinks >> the text there could be improved, i'd be happy to hear suggestions for &g

Re: [dns-privacy] Demultiplexing HTTP and DNS on the same listener

2017-05-18 Thread Daniel Kahn Gillmor
Thanks to everyone for their useful feedback and commentary. I've just uploaded draft-dkg-dprive-demux-dns-http-03, which attempts to include the insights that people have shared here. Most significantly, it drastically tightens the scope of the draft by focusing on HTTP/1.x only and explicitly e

Re: [dns-privacy] dprive (bar) BoF?

2017-10-22 Thread Daniel Kahn Gillmor
On Mon 2017-10-23 06:14:36 +, Alexander Mayrhofer wrote: > since we're not scheduled for a session in Singapore - would anybody > be interested in meeting up for a bar BoF during the meeting? eg. a > lunch break? I'd be interested. --dkg ___ d

Re: [dns-privacy] Why is draft-ietf-dprive-dtls-and-tls-profiles still blocked?

2017-10-27 Thread Daniel Kahn Gillmor
On Fri 2017-10-27 09:30:43 -0400, Brian Haberman wrote: > Hi Stephane, > > On 10/27/17 8:55 AM, Stephane Bortzmeyer wrote: >> The datatracker tells us that draft-ietf-dprive-dtls-and-tls-profiles >> has a DISCUSS "This needs to be updated to indicate that the client >> MUST NOT offer 7250 unless it

[dns-privacy] review of draft-ietf-dprive-dtls-and-tls-profiles-11: we should revert DNSSEC validation requirement

2017-10-28 Thread Daniel Kahn Gillmor
Hey DPRIVE folks-- Apologies for the delay, and that this message is so long. I've tried to reconstruct this discussion around draft-ietf-dprive-dtls-and-tls-profiles-11 as best i can, and my analysis follows. If i've misundertood or misanalyzed something, please let me know. Summary --- I

Re: [dns-privacy] review of draft-ietf-dprive-dtls-and-tls-profiles-11: we should revert DNSSEC validation requirement

2017-10-30 Thread Daniel Kahn Gillmor
On Mon 2017-10-30 07:19:36 -0400, Paul Wouters wrote: > Just to be clear. DNSSEC provides authentication of data. TLS provides > privacy of data. Both are needed so I am against this proposed change > to remove DNSSEC validation as a requirement. DNSSEC is part of the > core DNS. It's not a cherry.

Re: [dns-privacy] review of draft-ietf-dprive-dtls-and-tls-profiles-11: we should revert DNSSEC validation requirement

2017-10-30 Thread Daniel Kahn Gillmor
On Mon 2017-10-30 13:11:41 +, Sara Dickinson wrote: > I really do think a description there of the trade-offs of DNSSEC > validation are warranted I agree that a discussion of the tradeoffs involved in DNSSEC validation of the opportunistic meta-query is warranted. I just come to a different

Re: [dns-privacy] Why is draft-ietf-dprive-dtls-and-tls-profiles still blocked?

2017-10-30 Thread Daniel Kahn Gillmor
On Fri 2017-10-27 15:55:10 +0200, Stephane Bortzmeyer wrote: > The datatracker tells us that draft-ietf-dprive-dtls-and-tls-profiles > has a DISCUSS "This needs to be updated to indicate that the client > MUST NOT offer 7250 unless it has a preconfigured SPKI, otherwise > you're going to have inter

Re: [dns-privacy] review of draft-ietf-dprive-dtls-and-tls-profiles-11: we should revert DNSSEC validation requirement

2017-11-28 Thread Daniel Kahn Gillmor
On Tue 2017-11-14 12:04:19 +0100, Sara Dickinson wrote: > This draft is now ready to progress once a -12 version is available. I > just want to circle back round to summarise the fact that the only > proposed difference that will be in the -12 version compared to -11 is > the following (in section

Re: [dns-privacy] Last Call:

2018-03-21 Thread Daniel Kahn Gillmor
On Wed 2018-03-21 04:11:40 -0700, DraftTracker Mail System wrote: > Last Call Request has been submitted for > > > https://datatracker.ietf.org/doc/draft-ietf-dprive-padding-policy/ Yay, i'm glad to see this reach LC! one NIT to deal with before publication: in §4.3: Disadvantage: This polic

[dns-privacy] Oblivious DNS

2018-04-09 Thread Daniel Kahn Gillmor
hey DPRIVE folks-- People on this list might be interested in the recent "Oblivious DNS" work from Annie Edmundson, Paul Schmitt, and Nick Feamster: https://freedom-to-tinker.com/2018/04/02/a-privacy-preserving-approach-to-dns/ https://odns.cs.princeton.edu/ This was presented at DNS-OARC 28 in

Re: [dns-privacy] Oblivious DNS

2018-04-09 Thread Daniel Kahn Gillmor
On Mon 2018-04-09 13:20:28 -0400, Daniel Kahn Gillmor wrote: > People on this list might be interested in the recent "Oblivious DNS" > work from Annie Edmundson, Paul Schmitt, and Nick Feamster gah, i left off Jennifer Rexford from the list of researchers -- no slight was

Re: [dns-privacy] Opsdir last call review of draft-ietf-dprive-padding-policy-04

2018-04-12 Thread Daniel Kahn Gillmor
On Thu 2018-04-12 10:11:34 +0200, Alexander Mayrhofer wrote: > I think it totally depends on the viewpoint (operational vs. > "research-oriented"). Please share your preferred option - keep with > CURRENT or restructure for NEW. I prefer NEW (i like having the recommendation up front) but would no

Re: [dns-privacy] [Ext] DNS PRIVate Exchange (dprive) WG Virtual Meeting: 2018-12-10

2018-12-10 Thread Daniel Kahn Gillmor
On Wed 2018-12-05 10:35:20 -0500, Brian Haberman wrote: > I think it would be quite useful if someone were to explore the use of > message layer security in the context of DNS. That could be one of the > ones you listed above or it could be the work in MLS. Or even Double > Ratchet. > > If any of t

Re: [dns-privacy] Use of separate caches for plain and secure transports

2018-12-13 Thread Daniel Kahn Gillmor
Hi Mukund-- On Tue 2018-12-11 11:13:39 +0530, Mukund Sivaraman wrote: > During last night's meeting, there was talk about use of a split-cache - > one with answers learned from plain transports and another with answers > learned via secure transports. I think i was the one that mentioned that the

Re: [dns-privacy] Issues with encoding keys in nameserver DNS names

2018-12-13 Thread Daniel Kahn Gillmor
On Tue 2018-12-11 11:08:06 +0530, Mukund Sivaraman wrote: > 1. The RDATA of an NS record has to be a hostname, so it would limit the > amount of data that can be encoded within the NSDNAME. As an example, > base32 encoding is not possible. why is base32 encoding not possible for a hostname? just

Re: [dns-privacy] Issues with encoding keys in nameserver DNS names

2018-12-13 Thread Daniel Kahn Gillmor
Hi Mukund-- thanks for your prompt followup! On Fri 2018-12-14 02:22:12 +0530, Mukund Sivaraman wrote: > The trailing '='s are part of the base32 encoding. > > [muks@naina ~]$ echo -n > "MFRGGZDFMZTWQ2LKNNWG23TPOBYXE43UOV3HO6DZPI3TQOJQGEZA" | base32 -d > abcdefghijklmnopqrstuvwxyz789012[muks

Re: [dns-privacy] Use of separate caches for plain and secure transports

2018-12-13 Thread Daniel Kahn Gillmor
On Fri 2018-12-14 02:28:28 +0530, Mukund Sivaraman wrote: > A resolver can respond to several queries without performing any > upstream queries. As an example, take RFC 6761. Nothing can be inferred > about a query simply because it didn't result in resolution. yep, i agree with this in a principl

Re: [dns-privacy] Issues with encoding keys in nameserver DNS names

2018-12-13 Thread Daniel Kahn Gillmor
On Fri 2018-12-14 03:30:29 +0530, Mukund Sivaraman wrote: > I don't think this way. :) I think it will not support every RFC 1035 > DNS name, but only a subset of it. It should work for every valid name, > because they are valid names and some application may want it. Why > settle for hacks when it

Re: [dns-privacy] Use of separate caches for plain and secure transports

2018-12-14 Thread Daniel Kahn Gillmor
On Fri 2018-12-14 11:47:58 -0800, Christopher Wood wrote: > On Dec 14, 2018, 10:47 AM -0800, Wes Hardaker , wrote: >> [And, no, we shouldn't go down the road of "privacy requires you disable >> the cache"] > > Would you mind elaborating on this comment? As you observe, caches are > harmful to priva

Re: [dns-privacy] Issues with encoding keys in nameserver DNS names

2018-12-14 Thread Daniel Kahn Gillmor
On Fri 2018-12-14 19:12:41 +0100, A. Schulze wrote: > Am 11.12.18 um 06:38 schrieb Mukund Sivaraman: >> There was some discussion in last night's meeting about encoding keys in >> the DNS name of a nameserver, similar to DNSCurve. There are at least >> some issues with it: >> 1...4 > > 5. Encoding

Re: [dns-privacy] Alternative signalling propsals

2018-12-14 Thread Daniel Kahn Gillmor
On Fri 2018-12-14 17:43:44 -0500, Paul Wouters wrote: > We fixed that with tls-dnssec-chain :P > > I'll leave it up to others to wonder why and how this did not move > forward, and is now going via ISE. > > Sorry for the side-track of this discussion. This isn't sidetrack at all, it was one of the

Re: [dns-privacy] Alternative signalling propsals

2018-12-14 Thread Daniel Kahn Gillmor
On Fri 2018-12-14 22:58:09 +, Stephen Farrell wrote: > I'm probably exposing my lack of DNS-clue, but I wonder if it > is/isn't possible to embed a "like/want/offer privacy" signal > in the DNS protocol, rather than in the data carried by the > protocol? (Regardless of whether the latter might

[dns-privacy] scope of authoritative signalling [Was: Re: [Ext] Intermediate proposal (what I was saying at the mic)]

2021-08-24 Thread Daniel Kahn Gillmor
On Thu 2021-08-05 11:06:12 -0700, Brian Dickson wrote: >- SVCB in the name server name's zone is where the signalling belongs >(on what transports are supported, per NS name, as well as authenticated or >not, etc) I'm agnostic about the mechanism specifically, but i am curious as to th

[dns-privacy] Why MUST EDNS(0) Padding option only appear once?

2021-11-01 Thread Daniel Kahn Gillmor
Hi DPRIVE folks-- RFC 7830 (The EDNS(0) Padding Option) says: > The "Padding" option MUST occur at most, once per OPT meta-RR (and > hence, at most once per message). Over on https://github.com/PowerDNS/pdns/issues/10884 there's some discussion of a case where it would be technically advantageou

Re: [dns-privacy] Why MUST EDNS(0) Padding option only appear once?

2021-11-01 Thread Daniel Kahn Gillmor
On Mon 2021-11-01 18:56:59 +0100, Vladimír Čunát wrote: > I don't think it's possible to leak more privacy by doing that. Assuming > an encrypted channel, only the overall length of the DNS message should > matter. This is my intuition as well, though i haven't done any deep analysis on it. > P

Re: [dns-privacy] Comments on draft-dkgjsal-dprive-unilateral-probing

2021-11-19 Thread Daniel Kahn Gillmor
On Thu 2021-11-11 16:16:24 +, Jim Reid wrote: >> On 11 Nov 2021, at 15:28, Christian Huitema wrote: >> >> It is not uncommon to see upgrades being rolled out at different times to >> different servers in the farm. Opportunistic strategies and probing >> strategies have to deal with that. >

Re: [dns-privacy] Comments on draft-dkgjsal-dprive-unilateral-probing

2021-11-25 Thread Daniel Kahn Gillmor
On Mon 2021-11-22 11:27:50 -0500, Ben Schwartz wrote: > On Fri, Nov 19, 2021 at 6:48 PM Daniel Kahn Gillmor > wrote: > ... > >> To avoid incurring additional minor timeouts for such a recursive >> resolver, the pool operator should either: >> > > Nit: Th

Re: [dns-privacy] Fwd: New Version Notification for draft-dkgjsal-dprive-unilateral-probing-01.txt

2021-12-10 Thread Daniel Kahn Gillmor
Hi Ben-- Thanks for the prompt review and feedback! On Thu 2021-12-09 16:14:36 -0500, Ben Schwartz wrote: > The SNI guidance looks good to me. > > I find it confusing to mention ECH in this draft. ECH can never be used > with this specification, because there is (by definition) no SVCB record to

Re: [dns-privacy] Signaling with TLSA records

2021-12-10 Thread Daniel Kahn Gillmor
On Thu 2021-12-09 19:17:53 -0500, Robert Evans wrote: > Resolvers can probe for these records today as a signal for > fully-authenticated ADoT support and fallback to opportunistic TLS via > unilateral probing or unencrypted transport when not found. (This turns out > to be exactly the same approac

[dns-privacy] Will unilateral-probing "poison the well"?

2021-12-10 Thread Daniel Kahn Gillmor
One of the concerns raised at IETF 112 about draft-dkgjsal-dprive-unilateral probing was that unilateral probing by recrusive resolvers might "poison the well" and discourage authoritative servers from deploying encrypted transport. For example, in jabber, Erik Nygren commented: "TOFU has a big "p

Re: [dns-privacy] Will unilateral-probing "poison the well"?

2021-12-10 Thread Daniel Kahn Gillmor
On Fri 2021-12-10 20:11:59 -0500, Robert Evans wrote: > This should ideally be replaced with "resolvers discovering TLS support > solely via unilateral probing MUST NOT perform ANY authentication or > validation whatsoever on the TLS certificate(s) presented by the > authoritative name server". Th

Re: [dns-privacy] Fwd: New Version Notification for draft-dkgjsal-dprive-unilateral-probing-01.txt

2021-12-13 Thread Daniel Kahn Gillmor
Hi Ben-- On Mon 2021-12-13 08:34:22 -0800, Ben Schwartz wrote: > The terminology section says > >* "unilateral" means capable of opportunistic probing deployment > without external coordination with any of the other parties > > To my eye, that excludes any way of delivering ECHConfigs,

Re: [dns-privacy] Fwd: New Version Notification for draft-dkgjsal-dprive-unilateral-probing-01.txt

2021-12-17 Thread Daniel Kahn Gillmor
On Thu 2021-12-16 10:37:53 -0800, Ben Schwartz wrote: > In my view, a correct implementation here would simply provide the TLS > stack with an IP address and no validation identity, so there is no > way for the TLS stack to retrieve an ECHConfig. That would be a reasonable implementation, for sure

Re: [dns-privacy] Will unilateral-probing "poison the well"?

2022-01-25 Thread Daniel Kahn Gillmor
ached change to address it. Joey and I are trying to push out a draft -02 soon, and it should be included in that revision. --dkg From 0e05878a7814100a994e38515a33f3dc280b0354 Mon Sep 17 00:00:00 2001 From: Daniel Kahn Gillmor Date: Tue, 25 Jan 2022 11:08:11 -0500 Subject: [PATCH] Clari

Re: [dns-privacy] Tsvart last call review of draft-ietf-dprive-dnsoquic-08

2022-01-27 Thread Daniel Kahn Gillmor
On Thu 2022-01-27 13:17:39 +, Sara Dickinson wrote: > I’ve had a first pass at a PR making RFC8467 normative here: > https://github.com/huitema/dnsoquic/pull/143 Modulo a few minor editorial nits (which i've noted on this PR), i support this change as well. Padding defenses are simple, cheap

Re: [dns-privacy] New Version Notification for draft-dkgjsal-dprive-unilateral-probing-02.txt

2022-01-27 Thread Daniel Kahn Gillmor
Hi folks, just a note explaining what's changed in the unilateral-probing draft: On Wed 2022-01-26 08:28:34 -0800, internet-dra...@ietf.org wrote: > A new version of I-D, draft-dkgjsal-dprive-unilateral-probing-02.txt > has been successfully submitted by Joey Salazar and posted to the > IETF repos

Re: [dns-privacy] please adopt draft-dkgjsal-dprive-unilateral-probing as a WG work item Re: New Version Notification for draft-dkgjsal-dprive-unilateral-probing-02.txt

2022-02-03 Thread Daniel Kahn Gillmor
Hi Peter, DPRIVE folks-- On Thu 2022-02-03 11:03:35 +0100, Peter van Dijk wrote: > Speaking only for myself: some of the parts still seem too prescriptive > to me (but I know I haven't been clear on what parts!). Examples: 4.3.1 > seems too focused on some specific load balancer implementations, a