> On 30 Oct 2017, at 15:08, Daniel Kahn Gillmor <d...@fifthhorseman.net> wrote:
> 
> On Mon 2017-10-30 13:11:41 +0000, Sara Dickinson wrote:
>> I really do think a description there of the trade-offs of DNSSEC
>> validation are warranted
> 
> I agree that a discussion of the tradeoffs involved in DNSSEC validation
> of the opportunistic meta-query is warranted.  I just come to a
> different conclusion than the requirements in draft-11.
> 
>> if it ends up just being a MAY (although I would like to see SHOULD as
>> a minimum for opportunistic).
> 
> SHOULD validate, but with what failure mode?  are we really saying that
> opportunistic SHOULD deliver a DoS instead of a loss of privacy?  I
> discuss a few optional responses for failures in opportunistic mode
> below.

Can we separate out Opportunistic Privacy from Opportunistic DNSSEC (which I 
don’t think is really a thing, apart from a logging mechanism)? They are 
orthogonal.

Because if not…. are you saying that a fully validating stub using 
Opportunistic privacy mode shouldn’t DNSSEC validation anything, ever? Or it 
can validate all answers except the one for it’s DNS resolver? :-)

> 
>>> Choice 0 is the same outcome as the non-DNSSEC-validating scenario for
>>> strict clients (no mitigation),
>> 
>> Agreed - DNSSEC validation just provides earlier detection for Strict clients
> 
> or, converts success to failure in the case of DNSSEC misconfiguration
> (because the connection would otherwise have succeeded) :(

Ok, but … If the DNSSEC is misconfigured for a privacy server then DANE 
authentication won’t work either…

> 
>> So one way to look at the trade-off seems to be is it worse that an
>> attacker can block your DNS service or gets an extra chance to control
>> all your DNS answers? I think you are arguing that for opportunistic
>> the latter is preferable because a principle of Opportunistic is that
>> it shouldn’t fail? If the WG decided that to be the case then it needs
>> to be clear in the document this choice comes with an additional risk
>> (and yet still not guarantee of privacy).
> 
> it is "an extra chance only" in the scenario where points outlined above
> hold.  An attacker who can also race and beat the DHCP server has the
> exact same chance already, right?

I don’t buy the ‘if DHCP is already vulnerable we shouldn’t worry about 
securing the meta-query’ argument. I'd like to think we are designing 
Opportunistic such that the meta-query is at least as secure as whatever 
mechanism is or might be used in future to obtain the default DNS server so 
that opportunistic is no weaker than ’no privacy’.

I hear the case that requiring DNSSEC validation could block deployment for the 
specific case of ADN only + Opportunistic. So ti sounds like it boils down to 
two alternatives in section 7.2:

“ Such records SHOULD be validated when using Opportunistic Privacy.”

“ Such records MAY be validated when using Opportunistic Privacy.”

I’d obviously favour SHOULD.

Sara

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to