alex-nicat / ietf-dprive-phase2-requirements

Repo to work on the DPRIVE phase 2 requirements draft
0 stars 3 forks source link

IETF-106 Discussion Topics #20

Closed jlivingood closed 4 years ago

jlivingood commented 4 years ago

Potential topics authors wish to raise for discussion at IETF-106:

1 - WebPKI (CA) or DANE (TLSA)? Or both options? 2 - Allow fallback to Do53 or not? Or allow the domain owner to signal or user/client to signal whether fallback can occur? 3 - Is support for ADoT on a per nameserver basis or a per domain basis (so some domains on a NS may support while others may not)? 4 - Are the certificates based on NS IP address or name? 5 - DNSSEC support - MUST, SHOULD, or not mentioned?

jlivingood commented 4 years ago

6 - Are there any gaps in section 4, Threat Model and Problem Statement? 7 - Provisioning impacts - operators and vendors say implementation must be zero-provisioning. What does that mean and how should that be articulated as a requirement? 8 - Signaling: Provide some method to signal not just binary support DoT / do not support to allow for certain QTYPES or whatever to use DoT while others may not (e.g. an auth server may want to say in high load that some low risk or low priority queries fallback to unencrypted comms). Is this signaling or negotiation? Perhaps the requirement is ultimately about "Load Shedding" or "Load Management". 9 - Rather than say DNS privacy methods should we specifically say no ECS (or not fine-grained ECS), and to do QNAME minimization? 10 - Is signaling good and/or necessary?

jlivingood commented 4 years ago

On Q 1 - See https://datatracker.ietf.org/meeting/104/materials/slides-104-dprive-dot-for-insecure-delegations-01.pdf - especially the grid in slide 11 (last slide). From https://tools.ietf.org/html/draft-bretelle-dprive-dot-for-insecure-delegations-00

On signaling - See https://tools.ietf.org/html/draft-levine-dprive-signal-01

jlivingood commented 4 years ago

Raw notes from 106:

threat model -

DoT always required?

Trust anchor/authority: Should this depend only on the DNS, such as DANE, or also on Certification Authorities?

Downgrade Prevention & Preferences: Should the user (e.g. stub, app, resolver) be able to say only ever use DoT and never downgrade? Or should the authoritative domain be the only one? Or should both be permitted and let the app/stub decide what to do based on that info?

Discovery: What requirements do we have for a recursive to determine availability of encryption on an authoritative server? (e.g. loose coupling vs. whitelists are okay)

high level