On Tue, Dec 18, 2018 at 10:54 AM Kathleen Moriarty <
kathleen.moriarty.i...@gmail.com> wrote:

> Just a clarifying question inline
> On Sun, Dec 16, 2018 at 3:30 PM Eric Rescorla <e...@rtfm.com> wrote:
>
>>
>>
>> On Sun, Dec 16, 2018 at 11:45 AM Paul Wouters <p...@nohats.ca> wrote:
>>
>>> On Fri, 14 Dec 2018, Eric Rescorla wrote:
>>>
>>> > However, in a large number of cases (e.g., an attacker on your local
>>> network,
>>> > there are non-DNSSEC ways of obtaining this property, such as using
>>> DoH.
>>>
>>> Data origin authenticity is not the same as transport security.
>>>
>>
>> Yes, I'm quite aware of this fact.
>>
>>
>> DoH offers no guarantee that the non-dnssec protected information you
>>> received is not modified.
>>>
>>
>> As with all things security, it depends on your threat model. If the
>> attacker you
>> are concerned with is between you and the DNS server, then in fact it does
>> provide protection.
>>
>>
>> Unfortunately, I keep needing to say this on various IETF lists. The
>>> move towards "blindly trusting DNS over HTTPS/TLS" servers is misguided
>>> and just moving the goal post.
>>>
>>
>> I don't think this is a very accurate characterization of the situation.
>> At present,
>> the vast majority of DNS information is not DNSSEC protected [0], and yet
>> we
>> have to rely on it. If there's a "blindly trusting" in this discussion,
>> it's that. DNS
>> over HTTPS is designed to improve the situation, though of course it's not
>> a panacea.
>>
>> However in *this* case, it actually covers a pretty large fraction of the
>> threat
>> model, because (1) many attackers are close to the user and (2) if the
>> attacker
>> controls your DNS server, then they learn which site you are going to in
>> any case even before you send SNI.
>>
>
> This is written as a pretty broad statement.  Did you intend to say that
> the attackers for this threat vector are close to the user or many
> attackers?
>

I'm not sure I understand the question you are asking. A lot of the threats


Asking as this could sway opinions and the current solution is well suited
> to CDNs, not necessarily others.
>

Yes, the current solution is generally designed to fit into CDN-like
scenarios. However, ESNI is generally not that useful unless you have a lot
of origins on the same domain (otherwise the IP address itself reveals your
destination), and there are a limited number of scenarios of this type
(CDNs, hosting providers, application servers, etc.)



>> [0] https://www.cs.umd.edu/~dml/papers/dnssec_imc17.pdf provides an
>> overview
>>
>
> This is probably a bit better as a reference as it appears to be kept
> current:
> https://www.internetsociety.org/deploy360/dnssec/statistics/
>

Thanks.


and includes links to others providing statistics for reference as well.
> The validation statistics look a bit better in the following study:
> https://stats.labs.apnic.net/dnssec/XA?c=XA&x=1&g=1&r=1&w=7&g=0
> where worldwide, they say 16% DNSSEC validates.
>

I believe this is measuring something different, which is the fraction of
the Internet which is covered by validating resolvers. However, that
doesn't reflect end-to-end validation, but (typically) recursive resolver
validation, which is a rather different matter. To my knowledge, no generic
browser client does DNSSEC validation, for the reason that when people have
looked at it it created unaceptable failure rates.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to