On Tue, May 20, 2014 at 12:06 AM, joel jaeggli <joe...@bogus.com> wrote:
> On 5/19/14, 1:09 PM, John Heidemann wrote:
>>
>> Folks,
>>
>> I believe consensus was that dnsop needs a problem statement about DNS
>> privacy before we explore possible solutions.
>
> If I were to speculate on the basis of the dicussion here and in the
> DNSE bof the solution space involves signficant if maybe not dramatic
> architecture changes.

Absolutely not.

I can't see any possibility of a change to the communicating parties
or the DNS record formats.

My proposal is 17 pages and that is with some pretty extensive
examples from the code:

http://tools.ietf.org/html/draft-hallambaker-privatedns-00


> I would be happy to support exploration of the problem here and
> documents of an according nature, but I imagine us chartering it as a
> standalone activity.

It is definitely not operations so it has to be a separate activity.


Looking at the alternatives on offer I see three approaches:

1) Build on an existing framework e.g. DTLS.
2) Build on a new framework, e.g. SXS-Connect +UYFM that is very similar to DTLS
3) Design a new crypto protocol, e.g. DNS Curve.

Now I did start on this three years ago so I have gone through the
search space. The reason I chose option 2 is that I didn't find
working on top of DTLS saved any time but it introduced a lot of
problems.

One of the biggest mistakes in TLS and DTLS is that they are built
around the assumption that there is a public key handshake at the
start of each connection and efficient restart is an afterthought. We
have managed to add in Kerberos ticket like options to TLS over the
years but they are extensions rather than the core.


That said, my current proposal is intended as a starting point, not a
definitive edition. SXS-Connect is built on TLS which I believe is the
right approach for the client-resolver connection which I see as a one
time device initialization step. If we decide that label minimization
is not sufficient for the resolver-authoritative step then it would be
logical to anchor the trust chain for that exchange in DNSSEC
authenticated keys.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to