mTLS might be the most pragmatic approach today in many situations, but I don't 
think we can recommend it in the way that this draft would.  It has some 
significant downsides, especially when compared against something like OAuth 
(which might integrate better with user account systems) or Privacy Pass* 
(which has much better privacy properties).  It's true that these mechanisms 
can't be used with DoT and DoQ today, but it is within our power to fix that if 
we care to.

If the only significance of this draft is today "mTLS works as you would expect 
for DoT, DoQ, and DoH", then I don't think we need a draft to tell us that.

--Ben

*I am a co-chair of PRIVACYPASS but I am speaking only as an individual 
participant..
________________________________
From: Tommy Jensen <Jensen.Thomas=40microsoft....@dmarc.ietf.org>
Sent: Thursday, June 27, 2024 2:41 PM
To: dnsop <dnsop@ietf.org>
Cc: Damick, Jeffrey <jdam...@amazon.com>; Jessica Krynitsky 
<jess.krynit...@microsoft.com>; Engskow, Matt <mengs...@amazon.com>
Subject: [DNSOP] Re: [EXTERNAL] New Version Notification for 
draft-tjjk-cared-00.txt

Hello dnsop, Not to distract from the "should we deprecate DNS64" discussion I 
started after proposing updates to 7050, but this is the second draft (last 
one, I promise) I'll be proposing to this group as interesting work ahead of

Hello dnsop,

Not to distract from the "should we deprecate DNS64" discussion I started after 
proposing updates to 7050, but this is the second draft (last one, I promise) 
I'll be proposing to this group as interesting work ahead of IETF 120. Joining 
me are co-authors Jessica from Microsoft and Jeff and Matt from Amazon.

In light of enterprises increasingly using encrypted DNS for their own 
"Protective DNS" resolvers, we are proposing best practices for when and how to 
use client authentication with encrypted DNS. Since this is a Good Thing for 
enterprises who control both peers (stronger security for client policy 
application and security auditing post-attack) and a Bad Thing otherwise 
(privacy violations for the non-enterprises cases common to consumers), we feel 
there is a need to specify when implementors should or should not use it.

Spoiler alert: we prefer mTLS as the ideal authentication mechanism. I'll let 
the draft speak for itself as to why. Feedback and discussion is welcome.

Thanks,
Tommy

________________________________
From: internet-dra...@ietf.org <internet-dra...@ietf.org>
Sent: Thursday, June 27, 2024 11:32 AM
To: Jeffrey Damick <jdam...@amazon.com>; Jessica Krynitsky 
<jess.krynit...@microsoft.com>; Matt Engskow <mengs...@amazon.com>; Tommy 
Jensen <jensen.tho...@microsoft.com>
Subject: [EXTERNAL] New Version Notification for draft-tjjk-cared-00.txt

A new version of Internet-Draft draft-tjjk-cared-00.txt has been successfully
submitted by Tommy Jensen and posted to the
IETF repository.

Name:     draft-tjjk-cared
Revision: 00
Title:    Client Authentication Recommendations for Encrypted DNS
Date:     2024-06-27
Group:    Individual Submission
Pages:    11
URL:      
https://www.ietf.org/archive/id/draft-tjjk-cared-00.txt<https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-tjjk-cared-00.txt__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78MhYiKeo$>
Status:   
https://datatracker.ietf.org/doc/draft-tjjk-cared/<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-tjjk-cared/__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78334FWQc$>
HTML:     
https://www.ietf.org/archive/id/draft-tjjk-cared-00.html<https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-tjjk-cared-00.html__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78WQDEe_U$>
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-tjjk-cared<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-tjjk-cared__;!!Bt8RZUm9aw!_8-BG_G6wHMcs_UVkwXqP0aVV9tQKSxtFZUsEClBxt2Mdmibw_KPRkiy1Bwe1ic3RrtchGlsJQRm-doecb78MUDB5QU$>


Abstract:

   For privacy reasons, encrypted DNS clients need to be anonymous to
   their encrypted DNS servers to prevent third parties from correlating
   client DNS queries with other data for surveillance or data mining
   purposes.  However, there are cases where the client and server have
   a pre-existing relationship and each peer wants to prove its identity
   to the other.  For example, an encrypted DNS server may only wish to
   accept resolutions from encrypted DNS clients that are managed by the
   same enterprise.  This requires mutual authentication.

   This document defines when using client authentication with encrypted
   DNS is appropriate, the benefits and limitations of doing so, and the
   recommended authentication mechanism(s) when communicating with TLS-
   based encrypted DNS protocols.



The IETF Secretariat


_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to