Ted & ErikN,

So it looks like ErikN submitted the following PR and ekr approved:
https://github.com/tlswg/draft-ietf-tls-svcb-ech/pull/1

If we have resolved your comments, can I ask on of the authors to spin a new 
version and we can look to move this I-D.

Also, could I kindly ask you to revise your review to change to “ready” and 
maybe refer to thread:
https://mailarchive.ietf.org/arch/msg/tls/VQcqUuOXSE8sgcp4_CHa6Jlc394/

spt

> On Mar 30, 2024, at 19:17, Eric Rescorla <e...@rtfm.com> wrote:
> 
> 
> 
> On Sat, Mar 30, 2024 at 11:09 AM Ted Lemon <mel...@fugue.com> wrote:
> Encrypted dns transport works if you can trust the provider you are talking 
> to. DNSSEC works even if you can’t. And if your provider is trustworthy, 
> DNSSEC validation of results acquired through this tunnel should work. So 
> it’s silly in this case to trust the tunnel—there’s no upside to doing so 
> other than avoiding a few signature verifications. 
> 
> I don't object to people doing DNSSEC validation of ECH records (though AFAIK 
> no major browser does so), but...
> 
> 1. The resolver only gains a limited amount by forging the SVCB response 
> because the resolver already knows the domain name you are going to. This 
> does conceal (say) the ALPN, but that's usually less interesting than the SNI.
> 2. If the authoritative domain is misconfigured, which is not unheard of, 
> then this can create resolution failures (this is true for A/AAAA, of 
> course). Probably not much of an issue for the big public recursives, but can 
> definitely be an issue if you are just talking to some locally-supplied 
> resolver.
> 
> -Ekr
> 
> 
> Op za 30 mrt 2024 om 14:02 schreef Rob Sayre <say...@gmail.com>
> On Sat, Mar 30, 2024 at 10:47 AM Erik Nygren <erik+i...@nygren.org> wrote:
> 
> An attacker who can prevent SVCB resolution can deny clients any associated 
> security benefits.
> 
> Yes.
>  
> A hostile recursive resolver can always deny service to SVCB queries, but 
> network intermediaries can often prevent resolution as well, even when the 
> client and recursive resolver validate DNSSEC and use a secure transport. 
> These downgrade attacks can prevent a client from being aware that "ech" is 
> configured which would result in the client sending the ClientHello in 
> cleartext.
> 
> I think s/would/could/ here.
> 
> I don't know if we want to write it, but doesn't using encrypted transport 
> DNS to an IP address avoid this problem? Like using 1.1.1.1 or 8.8.8.8 etc. I 
> know that raises centralization issues, but it does help with this issue.
> 
> thanks,
> Rob
> 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to