IETF DPRIVE WG: Encrypting DNS
Sara Dickinson Sinodun ICANN 54 - Tech Day October 2015
IETF DPRIVE WG: Encrypting DNS Sara Dickinson Sinodun ICANN 54 - - - PowerPoint PPT Presentation
IETF DPRIVE WG: Encrypting DNS Sara Dickinson Sinodun ICANN 54 - Tech Day October 2015 DPRIVE WG Focus is stub to recursive Group IETF92 IETF91 IETF93 created A ID: problem-statement RFC7626 ID: dns-tls-newport A ID:
Sara Dickinson Sinodun ICANN 54 - Tech Day October 2015
IETF93 IETF92 IETF91
2014 2015 Group created
Q4 Q1 Q2 Q3 Q4
ID: start-tls-for-dns ID:dns-over-tls
Early port allocation
ID: dns-tls-newport ID: start-tls-for-dns
A
ID: problem-statement RFC7626
A
ID: dnsodtls
ID: dnsodtls
A
TIME
STARTTLS & port
Focus is stub to recursive
Pros Cons STARTTLS
TLS (new port)
interference with port 53)
DTLS
aspects
(just like UDP)
➡ Fallback to clear text or TLS
❌ Can’t be standalone solution
domain-s 853 tcp DNS query-response protocol run over TLS/DTLS domain-s 853 udp DNS query-response protocol run over TLS/DTLS
(TC=1 ➡ ‘one-shot’ TCP, Zone transfer)
Client - Query pipelining
q1, q2 q1 a1 q2 a2
connection re-use
q2 delayed waiting for q1 (+1 RTT) q1, q2 q1 a1 q2 a2
pipelining
0 extra RTT (stub) (recursive)
Server - concurrent processing of requests sending of out of order responses
q1, q2 q1 a1 q2 a2
in-order
q2 delayed waiting for q1 (+1 RTT) q1, q2 q1 a1 q2 a2
concurrent, OOOR
0 extra RTT stub
R
A
R A
reply as soon as possible
Strict (Authenticated) TLS only Opportunistic TLS Fallback to TCP, UDP
Software digit LDNS getdns Unbound NSD BIND mode client client (drill) stub
recursive*
server client server server/ client
TLS TFO Conn reuse Pipelining OOOP
Dark Green: Latest stable release supports this Light Green: Patch available Yellow: Patch in progress, or requires building a patched dependancy Grey: Not applicable or not planned
* getdns uses libunbound in recursive mode
RFC7525 this year - “BCP for TLS and DTLS”
DNS-over-TLS is relatively ‘green-field’
Any Questions? sara@sinodun.com
Next release: Hostname verification 1.5.5