Re: [Doh] WG Review: DNS Over HTTPS (doh)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Sep 22, 2017 at 8:12 AM, Tony Finch <dot@xxxxxxxx> wrote:
> Ted Hardie <ted.ietf@xxxxxxxxx> wrote:
>
>> I think you're underestimating the value of a switch to a multiplexing
>> facilitating protocol/transport.  Once this has gotten its legs under it, I
>> suspect that this approach for connecting to caching resolver will perform
>> better than any of traditional upd/tcp connections or the tls/dtls
>> approaches DPRIVE created.
>
> DNS over TCP already supports out-of-order responses. The reason it has
> historically not performed very well is that server implementations have
> handled queries on a TCP connection serially rather than concurrently.
>
> But this is improving. BIND 9.11 (for example) supports concurrent queries
> with out-of-order responses over TCP and TCP fast open, so queries over
> TCP should perform well, and better than UDP for large responses.
>

Yup -- RFC7766, S6.2.1.1 says you should do this, as does RFC7858
("Specification for DNS over Transport Layer Security (TLS)").


So, these are only my personal views / no hats / etc, but to my mind
one of the main reasons that I'd like to see Doh! succeed is for
censorship resistance (in parallel with the dprive work).
Currently plain-text DNS leaks a huge amount of privacy information;
DPRIVE solves much of this, but one weakness is that it is still
clearly DNS traffic[0]. This allows bad, evil, no-good totalitarian
regimes to block it and force you to use resolvers under their control
and so can control what you can reach, or watch where you are going
and send the secret police to "re-educate" you if you are looking at
things you shouldn't be.
.
.
Now, reread the previous sentence with s/ bad, evil, no-good
totalitarian regimes / friendly corporate IT folk / and s/ the secret
police / human resources /.
This allows friendly corporate IT folk to block it and force you to
use resolvers which they control and so can contol what you can reach,
or watch where you are going and send human resources to re-educate
you if you are looking at things you shouldn't be.

This is (I believe) what Elliot was pointing out -- this is important
information for enterprises - it is used to limit liability, ensure
employees are not "wasting time", and corporate security to detect
that they need to re-image Bob's machine *again* because he persists
in clicking questionable links and installing random bits of malware.


Unfortunately you cannot separate case 1 from case 2 -- if you make it
something that enterprise folk can detect / block (on BYOD devices)
then you have provided that facility to everyone. I believe that this
is simply the "encryption should be outlawed / backdoored because it
helps <insert bad guy here>." argument in another guise[1].

If Doh! is done right in my view it should be indistinguishable from
other web traffic and / or the collateral damage from blocking it
would be (hopefully!) politically untenable.

W
[0]: either because it is using the domain-s ports (853) or through
fingerprinting / heuristics of the TLS stream if you do something like
just run it over port 443.
[1]: luckily this isn't at all controversial, and isn't going to suck
this thread down another rat-hole.


> Tony.
> --
> f.anthony.n.finch  <dot@xxxxxxxx>  http://dotat.at/  -  I xn--zr8h punycode
> Faeroes, Southeast Iceland: Southeasterly 4 or 5, increasing 6 to gale 8
> later. Moderate or rough, occasionally very rough later. Showers, rain later.
> Good, becoming moderate or poor later.
>



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]