Re: [DNSOP] confidentialdns draft

2013-12-03 Thread Stephane Bortzmeyer
On Thu, Nov 28, 2013 at 11:10:39AM -0500, Paul Wouters wrote a message of 58 lines which said: > Additionally, encrypting to authoritative servers seems to not make > _that_ much sense to me. Remember, when I need to know > www.nohats.ca, I already tell the .ca nameserver the entire QNAME > be

Re: [DNSOP] confidentialdns draft

2013-11-29 Thread Guangqing Deng
: dnsop@ietf.org WG Subject: Re: [DNSOP] confidentialdns draft I think the draft is very unclear on this (DNSSEC) point - at least I don't find this statement about the ENCRYPT RR being signed by with the private key of example.com. Anyway : a RRSIG RR holds the name of the domain that sign

Re: [DNSOP] confidentialdns draft

2013-11-29 Thread Marc Lampo
I think the draft is very unclear on this (DNSSEC) point - at least I don't find this statement about the ENCRYPT RR being signed by with the private key of example.com. Anyway : a RRSIG RR holds the name of the domain that signed in clear text. Kind regards, Marc On Fri, Nov 29, 2013 at 10:40

Re: [DNSOP] confidentialdns draft

2013-11-29 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Marc, In the draft it says to store the ENCRYPT RR in this case at ns.example.com. It would then be signed with the ZSK DNSKEY for example.com, with normal DNSSEC chain of trust. But again, the authenticated operation is not the main aim of this

Re: [DNSOP] confidentialdns draft

2013-11-29 Thread Marc Lampo
Hello, (a reaction on second paragraph of 4. Authenticated Operation, only) That paragraph states that the ENCRYPT RR can be signed by DNSSEC. However, I don't think is possible ! A signature is the hash of DNS-data-sent, encrypted with the private key. But in this case : private key of who ? !!

Re: [DNSOP] confidentialdns draft

2013-11-29 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Paul, So this is another solution, which I want out there in the solution space because it is stateless. And there are many things to consider ... Sending the qname as the zone name in plaintext is not a good idea. For hop-by-hop encryption there

Re: [DNSOP] confidentialdns draft

2013-11-28 Thread Paul Wouters
On Thu, 28 Nov 2013, Glen Wiley wrote: Asking the LAN's resolver for a specific record (type ENCRYPT to QNAME ".") seems a bit dangerous. This is of course completely MITM-able, but I see no real other way to trust something fundamentally untrustworthy. So that's okay. But I fear too many of t

Re: [DNSOP] confidentialdns draft

2013-11-28 Thread Glen Wiley
On Nov 28, 2013, at 11:10 AM, Paul Wouters wrote: > On Thu, 28 Nov 2013, W.C.A. Wijngaards wrote: > >> I also heard that this is the place to discuss DNS privacy. > > This is a generic problem people keep mentioning. We need some new WG > for DNS extensions that's not operations. i was told thi

Re: [DNSOP] confidentialdns draft

2013-11-28 Thread Paul Wouters
On Thu, 28 Nov 2013, W.C.A. Wijngaards wrote: I also heard that this is the place to discuss DNS privacy. This is a generic problem people keep mentioning. We need some new WG for DNS extensions that's not operations. i was told this was going to be discussed at dnsops at ietf88 , but it did n

Re: [DNSOP] confidentialdns draft

2013-11-28 Thread Glen Wiley
Resolution latency is only affected initially when the resolver must fetch the confkey record, after that initial fetch (until TTL expires) there are no additional packets introduced into the query/response exchange. Zone file size is not an issue - adding a single key record to support confide

Re: [DNSOP] confidentialdns draft

2013-11-28 Thread Guangqing Deng
Though bringing privacy protection to the DNS query and response, this method may bring many other negative impacts on DNS system. The DNS resolution latency will be increased due to fetching so-called ENCRYPT RR which makes the DNS zone file bigger. Not onlay the DNS server but also the DNS cli