ietf-wg-add / draft-ietf-add-requirements

Other
6 stars 7 forks source link

Define what is meant by “authenticated” #8

Open chris-box opened 4 years ago

chris-box commented 4 years ago

I’m suggesting that the aspect of “authenticated” be expanded, discussed, and explained as it does potentially have different notions in different readers perspectives.

For example some may say doing a DNSSEC validation of some sort is what is needed, or perhaps some form of PKI, or is it a TLS certificate validation, or mutual exchange? It might even be something as basic as asking special DNS queries and validating the answers received against expectations.

Another slice would be authenticating the actual resolver chosen or is it authenticated at the more abstract “service” provided by the operator of the resolver?

There is also the consideration of does the authentication means/level vary depending on different environmental threat levels?

The bottom line is there is a lot of meanings behind “authentication” and what is being authenticated to declare and discuss as a requirement.

-glenn

Originally posted by @gitnnelg in https://github.com/ietf-wg-add/draft-add-requirements/pull/2#issuecomment-680215555

chris-box commented 4 years ago

Tiru also commented "Several possible ways of authenticating the encrypted DNS server are already discussed in our spec https://tools.ietf.org/html/rfc8310#section-8. I don't think the requirements draft should discuss the possible modes of authenticating the server."

magicalo commented 4 years ago

agree - authentication can include mutual authentication

JoGSal commented 4 years ago

+1 to different means/level depending on environment. I think mandatory should be validation of resolver designation through any of the 4 methods described in draft-pauly-add-resolver-discovery (validation using DNSSEC / PvD file / file on a well-known HTTPS URI based on zone apex / TLS certificates). Then the actual resolver chosen and their ownership over the encrypted services, similar to what's on Google's policy , then client authentication for use-cases like the enterprise network