Apologies for the very late reply. I was out of the office for a longer period of time. The rest is in-line.

On 23. 09. 21 20:17, Ben Schwartz wrote:
> On Thu, Sep 23, 2021 at 12:53 PM Petr Špaček <[email protected]
> <mailto:[email protected]>> wrote:
>
>     On 20. 09. 21 18:12, Ben Schwartz wrote:
>
> ...
>
>      >     2: communication to TLD servers.  I believe we have very
>      >     privacy-interesting data in QNAMEs there already, arguably
>     even the
>      >     most
>      >     sensitive parts.
>      >
>      >
> > In general, I agree. However, there are some cases where the lower
>      > labels are more sensitive (e.g. tumblr.com <http://tumblr.com>
>     <http://tumblr.com <http://tumblr.com>>).
>
>     I do not dispute there are sites that might benefit, but I think we
>     have
>     to keep the big picture in mind.
>
>     1] The second label is very often sensitive. To me, a non-sensitive
>     second label seems more of an exception.
>
>
> I think this clarifies an important requirements question for the
> working group: do we intend to enable authenticated ADoT for names whose
> TLD doesn't do ADoT?  If yes, we need a way to authenticate the NS name
> and a signal for ADoT support.  If no, we can rely on the parent's ADoT
> to authenticate the glue (as suggested in draft-adox).
>
>     2] Keep in mind that changing the domain name of an existing site is
>     next to impossible, so there is a lot of stuff firmly bolted to com.
>     and
>     also other existing TLDs (and domains).
>
> 3] I guess .com itself contains roughly 1/2 of all second-level domains > on this planet. Consequently, if we design something that will not work
>     in com. for any reason (be it fragility, scalability, performance,
>     operational complexity or cost, ...), then we are practically doing
>     useless work.
>
>
> Are you saying that DSGLUE "will not work in com"?  I'm not aware of any
> reason why this would be true.  DSGLUE is designed to work without any
> changes to registries or TLDs.
>
>     All in all, while DSGLUE might offer some protection for some sites,
>     let's not overestimate its impact.

Yes, I claim that right now (as of version -02), DSGLUE cannot protect 80 % of sites in com.

Message
https://mailarchive.ietf.org/arch/msg/dns-privacy/xcc9MnJNlKNz0SDm7fRJkbtagfQ/
describes the problem with sibling glue which currently affects ~ 80 % of com. domains.

For the remaining 20 % of domains, DSGLUE protects only second+ labels, which might or might not be beneficial depending on the domain in question.

Fixing the sibling glue problem requires more thought and solving possible policy questions mentioned in the message linked above.


> Consider this alternative framing: while sensitive-third-label domains
> may be rare overall, they certainly outnumber domains whose TLD supports
> ADoT, and that is likely to be true for at least several years.
> (Wikipedia says "As of May 2019, Tumblr hosts over 465 million blogs".)

Okay, that's a good point. It could even be argued domains that care about DSGLUE might be required to avoid sibling glue. I'm not sure how happy operators would be about that. That would be the next question.


> If you believe that most major TLDs will support authenticated ADoT and
> SVCB glue records within a few years, then we probably have all the
> pieces we need.  Otherwise, I think we should add DSGLUE so we don't
> have to wait forever.

That's right, under the assumption that resolver vendors are happy to implement DSGLUE and that registries are happy to accept DSGLUE RRs into TLDs.

Do you have some indication that this is the case, ideally in comparison with willingness of doing ADoT to TLD?


On a meta-level, I think DSGLUE provides somewhat uncertain benefits while being very complex. For this reason, I'm not going to bet my money on the speed of deployment of this. It might happen that by the time DSGLUE is standardized & implemented & deployed by resolvers and registries, "attackers" will implement the technique from the article https://irtf.org/anrw/2019/anrw2019-final44-acmpaginated.pdf into a turn-key solution. Doing so would render the "encrypt _just_ DNS" approach moot (= huge waste of engineering resources).

Hopefully it clarifies my previous message.

--
Petr Špaček

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to