-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add security considerations on potentially unencyrypted upstream DNS #37
base: main
Are you sure you want to change the base?
Conversation
@miri64 I think there could be also confidentiality and integrity without a shared security context? I have some trouble understanding "unless the security context is with yet another party": if this refers to an OSCORE context, then it's unclear how a DNS server would use OSCORE given it's not CoAP. So that seem unpractical. In general besides confidentiality, integrity could also be mentioned. (With DNS over UDP the response may get modified by an on-path attacker.) Do we also need to say that the security of the 2nd leg is out of scope of this document? (Although we could recommend that it's always enabled by default?) |
True, that's why I used the wording "may communicate unencrypted with the upstream DNS infrastructure". If this needs more emphasis, I can reword.
It was referring to OSCORE, in the sense that the DoC server acts as a proxy in this case.
Yes, but since there is also DNSSEC, integrity is a little bit tricky to word here. In general, I would not recommend DNSSEC in constrained environments, but it could be used to ensure at least integrity from client to upstream. I agree, we should mention integrity, but we should be careful how we do it and what we recommend to ensure it.
It is certainly not in the control of a DoC deployment. Recommendations always help, but I would make that non-normative. |
…am DNS Co-authored-by: chrysn <[email protected]>
…eam DNS ... and DNSSEC
…am DNS Co-authored-by: chrysn <[email protected]>
@EskoDijk I added some words on DNSSEC and integrity. Can you have another look? |
This fixes #35. See also https://mailarchive.ietf.org/arch/msg/core/warTSPRBXE4OrOam_TeIvRZFHUc/ ff.
@EskoDijk does this fit what you had in mind?