Hi tommy, all,
Apologies for the duplicate mail, Yes this was discussed and got clarified.

Thanks,
Ravi Mantha
________________________________
From: dns-privacy <[email protected]> on behalf of Tommy Pauly 
<[email protected]>
Sent: Friday, August 12, 2022 8:41:54 PM
To: Ravi sankar MANTHA <[email protected]>
Cc: [email protected] <[email protected]>
Subject: Re: [dns-privacy] ODoH RFC SetupBaseS clarification


EXTERNAL MAIL: [email protected]


Hi Ravi,

Seems like this was stuck in your outbox and sent a duplicate email to the one 
from August 10?

Tommy

On Aug 10, 2022, at 1:40 AM, Ravi sankar MANTHA 
<[email protected]> wrote:

Hi,


In Section 6.2 of RFC 9230, its mentioned that SetupBaseS takes only 2 
parameters  (pkR, "odoh query")

However, reference implementations are indeed using a randomiser from client 
side.

enc, ctxI, err := hpke.SetupBaseS(suite, rand.Reader, pkR, 
[]byte(ODOH_LABEL_QUERY))

(https://github.com/cloudflare/odoh-go/blob/7c6d9ff448c53e0e546f2afe915ad9608e11f7bd/odoh.go#L471<https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcloudflare%2Fodoh-go%2Fblob%2F7c6d9ff448c53e0e546f2afe915ad9608e11f7bd%2Fodoh.go%23L471&data=05%7C01%7Cr.mantha%40f5.com%7C694f7bacfa6247298d4508da7c7566f4%7Cdd3dfd2f6a3b40d19be0bf8327d81c50%7C0%7C0%7C637959140947124907%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=C11E3u8gNDMTJ9rEc1BMRspPv82AoSGvXGnd2jio7mU%3D&reserved=0>)

This has an implication on target implementations,

If Targets assume the randomizer is not present in shared secret derivation, 
then Context is unique for Target Public Key and they may choose not to 
store/derive it per message per Public Key.

If random seed is present, then contexts are unique only per message (DSN 
Query).

So, this has an interoperability impact as Encrypt/Decrypt fails for Query 
Responses if wrong shared key/Context is used on Target side.

 IMHO, we might need to clarify this in RFC either by updating pseudocode for 
SetupBaseS or add a note that Target should derive shared secret/Context with 
every oblivious DNS query. Or its implicit somewhere in the RFC ?

Regards,

Ravi Mantha




_______________________________________________
dns-privacy mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/dns-privacy<https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fdns-privacy&data=05%7C01%7Cr.mantha%40f5.com%7C694f7bacfa6247298d4508da7c7566f4%7Cdd3dfd2f6a3b40d19be0bf8327d81c50%7C0%7C0%7C637959140947124907%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Q7IkRtWtX%2BppWg9T47WRemPtBtKHmjAC%2BriX1%2B91bhM%3D&reserved=0>

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to