Thanks again to Mr. Paul Hoffman for putting together the draft minutes of
the meeting.
Because of the Phase 2 discussion had several useful points, I plan on
going back
and listening to the audio and confirm with the authors on that portion to
make sure we picked up everything.
The minutes are here.
https://datatracker.ietf.org/doc/minutes-106-dprive/
If you see anything that looks incorrect please drop a note to the chairs,
or send a pull request:
https://github.com/DPRIVE/wg-materials/blob/master/dprive-ietf106/dprive-ietf106-minutes.txt
Thanks for a productive meeting
Tim/Brian
DPRIVE WG
IETF 106, Singapore
Chairs: Tim Wicinski, Brian Haberman (remote)
Minutes taken by Paul Hoffman
Text from slides not given here
Admiistrivia
Adaptive DNS: Improving Privacy of Name Resolution
draft-pauly-dprive-adaptive-dns-privacy
Tommy Pauly
Tim: Which list for discussion?
Tommy: Both
Brian Dickson: GoDaddy will turn on DNSSEC signing for all customers
Alex Mayrhofer: Get into a grey area of what is recursive and what is
authoritative
We should be careful
Could instead use a URI RR
Tommy: URI RR doesn't let you say what the semantics of the
value is
Do we want to put DoH in front of main authoritative
servers?
Alex: Maybe like hosts.txt made modern
Petr Špaček: Custom made Tor network with DNS on top
Tommy: It is possible to build to deploy with bad privacy
prolicies
Stephen Farrel: Maybe being too optimistic
How will a client choose the oblivious feature?
Tommy: Looking for an assertion between two zones
Stephen: Needs a lot more specification
Lawrence Colitti: Duplicated information from the HTTPSVC record
Tommy: It is a hint where to go look
Gives a way to know which additional domains to look
Pushing over HTTP2 at the same time
Lawrence: Why tie oblivious with the other parts?
Ben Schwartz: We should be thinking more about architecture
Likes the idea of mixing recursive and authitative
Mode-switching resolver
Ralf Weber: Encourage to look into other transports
Vittorio Bertola: Does this actually give more privacy?
Wants to see more analysis on this
Thinks it reduces privacy
Tommy: Definitely has a relationship with the name that they
are going to
Is about to connect to the same address
Tim: Part of this falls into DPRIVE charter
Move this here instead of ADD
Oblivious DNS Over HTTPS
draft-pauly-dprive-oblivious-doh
Chris Wood
Paul Hoffman: Make this oblivious HTTP, do it somewhere else
RalfW: Gets scared of network of open proxies
Could be abused to kill DoH servers
Chris: Doesn't make this worse
Tiru Reddy: Why not just use a VPN instead
Chris: That is another type of proxy
Petr: ?
Stephen: Of two minds; maybe just do a Tor-ish thing, maybe a purely
DNS thing
Mike Bishop: If you proxy is far from the client, you will get worse
location information
Tor uses consistent node
Lawrence: Bear in mind latency
DNS is lightweight at the moment, could get overwhelmed by size
of TLS
Brian: Have you looked at three-way party encryption?
DNS server privacy policy with assertion token
draft-reddy-dprive-dprive-privacy-policy
Tiru Reddy
Paul Wouters: Seem reinvention of EV certs for DNS
Mark Nottingham: Explore why P3P efforts failed
Why should need to learn new kinds of consent model
Ben: Supportive of idea of geting opaque human-readable information
about a DNS server
Statiing as a privacy policy takes it into difficult domain
Machine-readable formatting is not going to work
Trying to reduce legal language to machine-readable language is
hard
Need exceptions
Is happy to have just a URL
Tiru: Wants to have both
Vitorrio: Finds it useful
Will needs to merge with user provisioning
Eric Rescorla: How will this work in practice?
(Walks through scenario)
Web PKI is based on mechanical comparision of domain names, not
user comparison
Browsers are moving away from this
Alissa Cooper: This has been tried in many places
Invokes GEOPRIV
Need to look elsewhere
DNS Privacy Requirements for Exchanges between Recursive Resolvers and
Authoritative Servers
draft-lmo-dprive-phase2-requirements
Alex Mayrhofer and Jason Livingood
Section 4:
Eric: Needs to discuss downgrade
Petr: Maybe say that attacker that has access to all traffic
should be out of scope
Ben: Think about CAA, ACME, and DV certificates
Don't create circular dependency
Is DoT always required?
Ben: Should define protocol and compare to other protocols
We can't tell you to do DoT
Eric: We encourage if you know that there is encryption
available
QNAME is not in the same equivalence class
Alex: Rephrase to "secure transport" instead of DoT
Wes Hardaker: Not about requirements, but about solutions
Is encryption required? If so, how do we bootstrap?
RalfW: Secure from bootstrapping all the way down
Brian: Break out distinct aspects of this
Delegation chain signed or not
Use of DANE needs secure delegation all the way down
Mandatory-to-implement
Trust anchors and security
Eric: Please don't get into this
Ben: This is not the right level of requirements
This gets into the solution space
Use comparisons for requirements
Eric: Many types of settings
Out-of-band settings
Discover keys during chain exploration
Opportunistic discovery: it is what it is
Christian Huitema: Scared about circular dependencies between
parties
Should be in requirements to not have loops
Brian: This is what is agreed on between resolver and
authoritative
Daniel Kahn Gilmore: Might want hybridized DANE + Web PKI +
third parties
Solution needs to be simple enough to be analyzable
Likes Eric's three-levels
There are time limits on all of these
Happy eyeballs might give you something more verifiable
in time
Tim: We are staying away from Web PKI completely
Paul: Disagrees
Eric: Something like HSTS with time bounding
Daniel: Thinks line is hard to determine
Brian: Pinned things needs to honor what's in the DNS itself or
it breaks the security model
Downgrade prevention and preferences
Eric: Doesn't think client specification works
Only thing that can be plasusibly say is here is DoT
and here is not-DoT, need to pick
"I speak DoT all the time" vs. "I speak DoT some of the
time"
Ben: Stub should be able to require anything of the recursive
If the stub can't prove this, don't ask it
Gets strange very quicky
What does this mean for recursive cache
If the roots don't do DoT
If the resolver got the root zone some way
RalfW: If the client wants to make an assertion, do it itself
Don't make it more complicated
Patrick McManus: One more +1
Daniel: Like "require TLS" in SMTP
Think about deployment history
Wes: RFC 7672
Has good fallback logic
Brian: +1 to what Wes just said
Maybe give guidance for happy eyeballs
Patrick: Put more emphasis on secure discovery
Discovery
Brian: Has to be in the DNS, has to be DNSSEC signed
Linked to the name server
Wes: We have a distributed hierarchical data model: why use
anything else
Eric: In the DNS
Tim: Do some updates, then the WG will adopt it
Brian: From a high level, make a distinction what the value proposition
of mandatory vs. good
Stephen: When do you want people put in proposals
Brian: If anyone is interested in testing, see him
Tim: Open to having another interim in February
Patrick: Is this is an interal document
Would look differently
Paul: NSs that have different operations, some with DoT some without
Eric: Don't publish this document as an RFC
Brian: Get names from delegation, not from glue
_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy