Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-17 Thread Tony Finch
Martin Hoffmann wrote: > > Downgrade seems to be an issue with all proposals. The tradeoffs seem to revolve around how much you leak before you work out whether you can use strict DoT, and how much added latency that costs. If you are talking to a nameserver via its canonical name, then asking

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-17 Thread Martin Hoffmann
Tony Finch wrote: > > I think signalling in the hostname has to be a hint rather than an > assertion, since it's vulnerable to a downgrade attack because delegation > NS records are unsigned (as Robert pointed out). Downgrade seems to be an issue with all proposals. To solve them, there may

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-17 Thread Tony Finch
Warren Kumari wrote: > > If the NS records / labels were _ta.a.iana-servers.net and _ > ta.b.iana-servers.net, that could be used as a positive signal that the > resolver (or if the underscore freaks people out, > dns-o-tls.a.iana-servers.net) is listening on 853 and that an inability > to

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-14 Thread Robert Edmonds
Warren Kumari wrote: > I'd also like to point out another option -- I threw up a little when first > suggesting it, but it may be worth considering again (and please feel free > to point me at the list if it already was). > An opportunistic solution is vulnerable to intentional (or accidental) >

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-14 Thread Warren Kumari
On Mon, Sep 10, 2018 at 10:48 AM Tony Finch wrote: > In the most general terms, when upgrading a protocol from cleartext to > TLS, there are a couple of questions the client has to answer: > > 1. Does this server support TLS? > 2. How can I authenticate it? > > And there are a couple of

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-13 Thread A. Schulze
Am 13.09.18 um 14:14 schrieb Willem Toorop: > An alternative for TLSA glue could be a label in the NS name indicating > DoT support perhaps? It's not pretty, but at least it would work right now. Hello, yes, a special authoritative server name was also the mechanism, DJB choose to publish a

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-13 Thread Willem Toorop
Op 12-09-18 om 17:10 schreef Paul Wouters: > On Wed, 12 Sep 2018, Willem Toorop wrote: > >> Op 12-09-18 om 13:57 schreef Ilari Liusvaara: >>> On Wed, Sep 12, 2018 at 12:02:56PM +0100, Tony Finch wrote: The reason for wanting to include the NS targets' TLSA records in the glue

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-13 Thread Tony Finch
Paul Wouters wrote: > On Wed, 12 Sep 2018, Tony Finch wrote: > > > > RFC 7901 doesn't work when asking authoritative servers because they > > don't have a copy of the chain. > > You can set the start of the chain to the zone, so as long as any > chaining would remain within the zone or

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-13 Thread Willem Toorop
Op 12-09-18 om 17:22 schreef Tony Finch: > Paul Wouters wrote: >> >> Then use RFC 7901 DNS chain queries (or the hopefully soon >> tls-dnssec-chain TLS extension) > > RFC 7901 doesn't work when asking authoritative servers because they > don't have a copy of the chain. > > tls-dnssec-chain will

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-12 Thread Paul Wouters
On Wed, 12 Sep 2018, Tony Finch wrote: Then use RFC 7901 DNS chain queries (or the hopefully soon tls-dnssec-chain TLS extension) RFC 7901 doesn't work when asking authoritative servers because they don't have a copy of the chain. You can set the start of the chain to the zone, so as long

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-12 Thread Tony Finch
Paul Wouters wrote: > > Then use RFC 7901 DNS chain queries (or the hopefully soon > tls-dnssec-chain TLS extension) RFC 7901 doesn't work when asking authoritative servers because they don't have a copy of the chain. tls-dnssec-chain will not help iterative resolvers because they will already

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-12 Thread Paul Wouters
On Wed, 12 Sep 2018, Willem Toorop wrote: Op 12-09-18 om 13:57 schreef Ilari Liusvaara: On Wed, Sep 12, 2018 at 12:02:56PM +0100, Tony Finch wrote: The reason for wanting to include the NS targets' TLSA records in the glue is so that the resolver can immediately connect over DoT with

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-12 Thread Willem Toorop
Op 12-09-18 om 13:57 schreef Ilari Liusvaara: > On Wed, Sep 12, 2018 at 12:02:56PM +0100, Tony Finch wrote: >> >> The reason for wanting to include the NS targets' TLSA records in the glue >> is so that the resolver can immediately connect over DoT with >> authentication, without having to spend

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-12 Thread Tony Finch
Erik Kline wrote: > On Wed, 12 Sep 2018 at 15:38, Shane Kerr wrote: > > > > Note that we can also use the RTT of this query to set a reasonable > > timeout for our port 853 traffic. A DNS server administrator may have > > configured port 853 support, but the network administrator may block > >

Re: [dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-12 Thread Shane Kerr
Tony, On 2018-09-10 16:48, Tony Finch wrote: Opportunistic TLS - The only mechanism we have is to probe port 853 and fall back to 53 if TLS isn't available. This is fraught with problems since in many cases firewalls will drop packets to port 853 rather than promptly

[dns-privacy] Sketchy notes on DNS-over-TLS to authoritative servers

2018-09-10 Thread Tony Finch
In the most general terms, when upgrading a protocol from cleartext to TLS, there are a couple of questions the client has to answer: 1. Does this server support TLS? 2. How can I authenticate it? And there are a couple of approaches to answering them: A. opportunistic B. explicit