On Tue, 19 Aug 2014, Paul Hoffman wrote:

I wonder this 'MUST' may be too strong (or I don't fully understand
the sense of this MUST).  Since the upstream recursive resolver may or
may not support the TLS extension, the DNS forwarder may end up giving
up the resolution altogether.  But depending on the stub clients'
policy it may be still better to provide encryption between the stub
and the forwarder.

Good catch. Proposed replacement to handle the case where the recursive 
resolver doesn't do TLS:

 A stub resolver cannot tell whether it is sending queries to a
 recursive resolver or to a DNS forwarder.  Therefore, a DNS forwarder
 that acts as a TLS server for DNS requests MUST also attempt to act as a TLS
 client for queries to its upstream recursive resolvers, but MAY
 use the normal DNS protocol on port 53 if an upstream recursive
 resolver does set up a TLS session.

A resolver at a coffee shop is mostly concerned about protecting the DNS
in the public wifi, and might not worry at all about its DSL uplink,
especially when it has no real reason to trust its own uplink. So I
would just make it very generic:

  a DNS forwarder that acts as a TLS server for DNS requests SHOULD
  attempt to use TLS with its upstream resolver(s) to maximize the
  anonymity of its stub clients.

Sure, let's be explicit. Proposed addition to the policy section:

If a recursive resolver does not respond on port 443 or set up a TLS session, 
the stub resolver MAY use the normal DNS protocol on port 53.

MAY sounds a little odd here. If there is no preconfiguration for
authenticating this resolver, I don't think we should advise
stubs to refuse to do DNS completely, which is what the MAY is
suggesting as a valid option. (this is breaking the "opportunistic
security design pattern recommendation advise" :)

How about:

        If a recursive resolver for which an authentication method is
        available does not respond on port 443 or fails to set up a TLS
        session, the stub resolver SHOULD NOT use that resolver over
        unencrypted DNS using port 53. If no authentication method is
        available for the recusive resolver, the stub resolver SHOULD
        fallback to using cleartext DNS on port 53.

Paul

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to