Submitted new revision:

 https://datatracker.ietf.org/doc/html/draft-ietf-tls-svcb-ech-02

Only change is adding the text to Security Considerations as discussed
above.

   Erik

On Wed, Apr 10, 2024 at 9:14 AM Sean Turner <s...@sn3rd.com> wrote:

> Ted & ErikN,
>
> So it looks like ErikN submitted the following PR and ekr approved:
> https://github.com/tlswg/draft-ietf-tls-svcb-ech/pull/1
>
> If we have resolved your comments, can I ask on of the authors to spin a
> new version and we can look to move this I-D.
>
> Also, could I kindly ask you to revise your review to change to “ready”
> and maybe refer to thread:
> https://mailarchive.ietf.org/arch/msg/tls/VQcqUuOXSE8sgcp4_CHa6Jlc394/
>
> spt
>
> > On Mar 30, 2024, at 19:17, Eric Rescorla <e...@rtfm.com> wrote:
> >
> >
> >
> > On Sat, Mar 30, 2024 at 11:09 AM Ted Lemon <mel...@fugue.com> wrote:
> > Encrypted dns transport works if you can trust the provider you are
> talking to. DNSSEC works even if you can’t. And if your provider is
> trustworthy, DNSSEC validation of results acquired through this tunnel
> should work. So it’s silly in this case to trust the tunnel—there’s no
> upside to doing so other than avoiding a few signature verifications.
> >
> > I don't object to people doing DNSSEC validation of ECH records (though
> AFAIK no major browser does so), but...
> >
> > 1. The resolver only gains a limited amount by forging the SVCB response
> because the resolver already knows the domain name you are going to. This
> does conceal (say) the ALPN, but that's usually less interesting than the
> SNI.
> > 2. If the authoritative domain is misconfigured, which is not unheard
> of, then this can create resolution failures (this is true for A/AAAA, of
> course). Probably not much of an issue for the big public recursives, but
> can definitely be an issue if you are just talking to some locally-supplied
> resolver.
> >
> > -Ekr
> >
> >
> > Op za 30 mrt 2024 om 14:02 schreef Rob Sayre <say...@gmail.com>
> > On Sat, Mar 30, 2024 at 10:47 AM Erik Nygren <erik+i...@nygren.org>
> wrote:
> >
> > An attacker who can prevent SVCB resolution can deny clients any
> associated security benefits.
> >
> > Yes.
> >
> > A hostile recursive resolver can always deny service to SVCB queries,
> but network intermediaries can often prevent resolution as well, even when
> the client and recursive resolver validate DNSSEC and use a secure
> transport. These downgrade attacks can prevent a client from being aware
> that "ech" is configured which would result in the client sending the
> ClientHello in cleartext.
> >
> > I think s/would/could/ here.
> >
> > I don't know if we want to write it, but doesn't using encrypted
> transport DNS to an IP address avoid this problem? Like using 1.1.1.1 or
> 8.8.8.8 etc. I know that raises centralization issues, but it does help
> with this issue.
> >
> > thanks,
> > Rob
> >
>
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to