Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

BOFH excuse #136: Daemons loose in system.


comp / comp.misc / Re: [LINK] Calling time on DNSSEC?

SubjectAuthor
* [LINK] Calling time on DNSSEC?Computer Nerd Kev
+* Re: [LINK] Calling time on DNSSEC?Grant Taylor
|`* Re: [LINK] Calling time on DNSSEC?Richard Kettlewell
| `* Re: [LINK] Calling time on DNSSEC?Grant Taylor
|  `* Re: [LINK] Calling time on DNSSEC?Richard Kettlewell
|   +* Re: [LINK] Calling time on DNSSEC?Grant Taylor
|   |`- Re: [LINK] Calling time on DNSSEC?Richard Kettlewell
|   `* Re: [LINK] Calling time on DNSSEC?Lawrence D'Oliveiro
|    `* Re: [LINK] Calling time on DNSSEC?Grant Taylor
|     +* Re: [LINK] Calling time on DNSSEC?Lawrence D'Oliveiro
|     |`* Re: [LINK] Calling time on DNSSEC?Grant Taylor
|     | `* Re: [LINK] Calling time on DNSSEC?Lawrence D'Oliveiro
|     |  `* Re: [LINK] Calling time on DNSSEC?Grant Taylor
|     |   +* Re: [LINK] Calling time on DNSSEC?Lawrence D'Oliveiro
|     |   |`- Re: [LINK] Calling time on DNSSEC?Grant Taylor
|     |   `- Re: [LINK] Calling time on DNSSEC?Richard Kettlewell
|     `* Re: [LINK] Calling time on DNSSEC?Richard Kettlewell
|      `- Re: [LINK] Calling time on DNSSEC?Grant Taylor
`- Re: [LINK] Calling time on DNSSEC?Marco Moock

1
Subject: [LINK] Calling time on DNSSEC?
From: Computer Nerd Kev
Newsgroups: comp.misc
Organization: Ausics - https://newsgroups.ausics.net
Date: Tue, 26 Nov 2024 22:44 UTC
Message-ID: <67464f37@news.ausics.net>
From: not@telling.you.invalid (Computer Nerd Kev)
Subject: [LINK] Calling time on DNSSEC?
Newsgroups: comp.misc
Keywords: internet,DNS,encryption,cryptography,security,domains,DNSSEC
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/2.4.31 (i586))
NNTP-Posting-Host: news.ausics.net
Date: 27 Nov 2024 08:44:07 +1000
Organization: Ausics - https://newsgroups.ausics.net
Lines: 55
X-Complaints: abuse@ausics.net
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!csiph.com!news.bbs.nz!news.ausics.net!not-for-mail
View all headers

Calling time on DNSSEC?
By Geoff Huston on 28 May 2024
- https://blog.apnic.net/2024/05/28/calling-time-on-dnssec/

"There have been quite a few Internet technologies that have not
been enthusiastically adopted from the outset. In many cases, the
technology has been quietly discarded in favour of the next
innovation, but in some cases, the technology just refuses to go
away and sits in a protracted state of partial adoption. In some
cases, this has seen a determinate state so protracted that much of
the original rationale for the technology has been overtaken by
events and the case to support adoption needs to be rephrased in
more recent terms.
IPv6 is a good case in point where the basic architecture of the
protocol, namely as an end-to-end address-based datagram
architecture, has become an imperfect fit for a client-server
network that makes extensive use of replicated service delivery
platforms.
Today's network is undertaking a transformation to a name-based
network, and running out of addresses to the extent that it is no
longer possible to uniquely address every attached client, is no
longer the catastrophic event that we once thought it would be. We
appear to have attached some 30B devices in today's Internet, yet
in terms of IPv4 use, we have achieved this using a little over 3B
unique IPv4 addresses visible in the routing system.
In this case, I'm referring to secured DNS, or DNSSEC, which has
been tied up in progressive adoption for some 30 years. Over this
time, we've seen many theories appear as to why the pace of
adoption of DNSSEC has been so lacklustre, including a lack of
awareness, poor tooling, inability to automate operational
management, too much operational complexity and a general inability
to sustain a case that the incremental benefits of adoption of
DNSSEC far outweigh the increased operational costs and added
service fragility. Because of the lack of clear signals of general
adoption of DNSSEC over three decades, is it time to acknowledge
that DNSSEC is just not going anywhere? Is it time to call it a day
for DNSSEC and just move on?
Now admittedly this is an extreme position, and I admit to
deliberately being somewhat provocative in asking this question to
get your attention but there is a grain of an uncomfortable truth
here. As a collection of service operators, we appear not to care
sufficiently to invest in supporting the additional costs to
operate a DNSSEC-secured DNS. After some 30 years of living with a
largely insecure DNS infrastructure, we appear to be comfortable
with this outcome.
How have we got to this point?" ...

--
__ __
#_ < |\| |< _#

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Wed, 27 Nov 2024 04:55 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.omega.home.tnetconsulting.net!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Tue, 26 Nov 2024 22:55:00 -0600
Organization: TNet Consulting
Message-ID: <vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 27 Nov 2024 04:55:00 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="omega.home.tnetconsulting.net:198.18.1.11";
logging-data="20603"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <67464f37@news.ausics.net>
View all headers

On 11/26/24 16:44, Computer Nerd Kev wrote:
> How have we got to this point?" ...

Too many people stop once they achieve what they think is the minimum
viable product. Basic insecure DNS is that MVP when it comes to name
resolution.

People move on to other MVP tasks that demand their attention and never
get back around to DNSSEC.

I've been using DNSSEC for 10-15 years with effectively minimal problems.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Richard Kettlewell
Newsgroups: comp.misc
Organization: terraraq NNTP server
Date: Wed, 27 Nov 2024 08:40 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 27 Nov 2024 08:40:16 +0000
Organization: terraraq NNTP server
Message-ID: <wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="20868"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:wkgTwQFXhvIGKj24UCaUKqEZ0GU=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
View all headers

Grant Taylor <gtaylor@tnetconsulting.net> writes:
> On 11/26/24 16:44, Computer Nerd Kev wrote:
>> How have we got to this point?" ...
>
> Too many people stop once they achieve what they think is the minimum
> viable product. Basic insecure DNS is that MVP when it comes to name
> resolution.
>
> People move on to other MVP tasks that demand their attention and
> never get back around to DNSSEC.
>
> I've been using DNSSEC for 10-15 years with effectively minimal
> problems.

I use it too, a bit.

It’s not enough. It can secure the name-to-address mapping but does
nothing for the security of any data sent or received. You need TLS (or
SSH, or whatever) as well, and those already deal with naming. So it’s
natural to ask why someone would bother with DNSSEC as well, and hardly
surprising that mostly the answer is that people don’t.

--
https://www.greenend.org.uk/rjk/

Subject: Re: [LINK] Calling time on DNSSEC?
From: Marco Moock
Newsgroups: comp.misc
Organization: A noiseless patient Spider
Date: Wed, 27 Nov 2024 16:16 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mm+usenet-es@dorfdsl.de (Marco Moock)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 27 Nov 2024 17:16:44 +0100
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <20241127171644.1816de37@ryz.dorfdsl.de>
References: <67464f37@news.ausics.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 27 Nov 2024 17:16:45 +0100 (CET)
Injection-Info: dont-email.me; posting-host="e88552780129727f8c209f0b6210c3e1";
logging-data="62478"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1834s0AsVPLI/NuJpBXTRgS"
Cancel-Lock: sha1:SWBrSQ1rEGBTaEZEB2jYBEMGABw=
View all headers

On 27.11.2024 08:44 Uhr Computer Nerd Kev wrote:

> IPv6 is a good case in point where the basic architecture of the
> protocol, namely as an end-to-end address-based datagram
> architecture, has become an imperfect fit for a client-server
> network that makes extensive use of replicated service delivery
> platforms.

I don't see where IPv6 has any disadvantage compared to IPv4 in that
case from a technical view.

Although, IPv4 is exhausted and new companies can't be created like 20
years ago anymore. This might be a reason for some companies to stay
with it.

> Today's network is undertaking a transformation to a name-based
> network, and running out of addresses to the extent that it is no
> longer possible to uniquely address every attached client, is no
> longer the catastrophic event that we once thought it would be. We
> appear to have attached some 30B devices in today's Internet, yet
> in terms of IPv4 use, we have achieved this using a little over 3B
> unique IPv4 addresses visible in the routing system.

The NAT routers at ISPs are sometimes heavily overloaded, many
companies provide IPv6 to reduce the traffic on the NAT machines.

--
kind regards
Marco

Send spam to 1732693447muell@stinkedores.dorfdsl.de

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Thu, 28 Nov 2024 05:04 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 27 Nov 2024 23:04:16 -0600
Organization: TNet Consulting
Message-ID: <vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Nov 2024 05:04:16 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="8746"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
View all headers

On 11/27/24 02:40, Richard Kettlewell wrote:
> It’s not enough. It can secure the name-to-address mapping but does
> nothing for the security of any data sent or received.

DNS, without security, doesn't have anything to do with security data
sent or received either.

Apples and lug-nuts always have been and always will be completely
different things that do completely different things.

That being said, DNSSEC can be used to authenticate keys published with
DANE (TLSA records) which can be used to encrypt traffic without the
need for traditional public key infrastructure (PKI).

> You need TLS (or SSH, or whatever) as well, and those already deal
> with naming.

None of those actually do / produce the naming. They only use / consume
the naming done / produced by something else; DNS or local hosts entries.

> So it’s natural to ask why someone would bother with DNSSEC as well,
> and hardly surprising that mostly the answer is that people don’t.

See my previous response about MVP.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Richard Kettlewell
Newsgroups: comp.misc
Organization: terraraq NNTP server
Date: Thu, 28 Nov 2024 08:52 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Thu, 28 Nov 2024 08:52:31 +0000
Organization: terraraq NNTP server
Message-ID: <wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="41496"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:a39SMizv3gXCALcl24hbU6hoTYQ=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
View all headers

Grant Taylor <gtaylor@tnetconsulting.net> writes:
> On 11/27/24 02:40, Richard Kettlewell wrote:
>> It’s not enough. It can secure the name-to-address mapping but does
>> nothing for the security of any data sent or received.
>
> DNS, without security, doesn't have anything to do with security data
> sent or received either.
>
> Apples and lug-nuts always have been and always will be completely
> different things that do completely different things.

If you’re writing that then I don’t think you understood my point.

The problem people actually have is exchanging information with websites
without anyone else being able to read or modify that data.

DNSSEC on its own obviously can’t solve that.

DNS + TLS does solve it, sufficiently well. (Using TLS to include
Internet PKI.)

DNSSEC + TLS would also solve it, but why would someone bother with
DNSSEC when DNS+TLS is good enough for their needs?

--
https://www.greenend.org.uk/rjk/

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Thu, 28 Nov 2024 15:37 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Thu, 28 Nov 2024 09:37:30 -0600
Organization: TNet Consulting
Message-ID: <via2nq$4o1$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Nov 2024 15:37:30 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="4865"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk>
View all headers

On 11/28/24 02:52, Richard Kettlewell wrote:
> If you’re writing that then I don’t think you understood my point.

I understood your point.

I disagreed with your point.

> The problem people actually have is exchanging information with
> websites without anyone else being able to read or modify that data.

I feel the need to reiterate that the Internet is far more than just
websites or web hosted content.

> DNSSEC on its own obviously can’t solve that.

TLS on it's own can't do that either.

> DNS + TLS does solve it, sufficiently well. (Using TLS to include
> Internet PKI.)

For some nebulous value of sufficiently well.

The Internet PKI can be -> is an Achilles heal.

> DNSSEC + TLS would also solve it, but why would someone bother with
> DNSSEC when DNS+TLS is good enough for their needs?

DNS w/o DNSSEC is trusting that someone hasn't modified the data between
the authoritative source and you the consumer.

DNSSEC cryptographically authenticates the data, thus making it possible
to validate or detect modification.

Do you trust that your DNS server is giving you validated information?
Or would you like some proof that what it's giving you is validated?

There are all sorts of ways to modify DNS data in flight between clients
and authoritative servers. As previously established, TLS (et al.) by
its self isn't sufficient. TLS needs a remote endpoint to communicate
with. Name resolution is required to be able to resolve the name you
want to communicate with to an IP address to connect to. DNS is the
biggest and most common way that name resolution happens. Local hosts
files are also contenders, but they are way behind DNS.

I like to have my local DNS recursive resolver cryptographically
validate information whenever possible.

I use DNSSEC protected DNS to host things like TLS certificate public
keys with DANE and SSH fingerprints and other similar information that
allows me to function without the PKI.

It comes down to people care if the information they get from DNS is
cryptographically verifiable or not. I personally care. Many people
don't know and most of them wouldn't care.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Richard Kettlewell
Newsgroups: comp.misc
Organization: terraraq NNTP server
Date: Fri, 29 Nov 2024 10:41 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Fri, 29 Nov 2024 10:41:33 +0000
Organization: terraraq NNTP server
Message-ID: <wwvy112qq3m.fsf@LkoBDZeT.terraraq.uk>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk>
<via2nq$4o1$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="63263"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:AjQPC0AXkzmIg2b+qcfnrA6gU7w=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
View all headers

Grant Taylor <gtaylor@tnetconsulting.net> writes:
> On 11/28/24 02:52, Richard Kettlewell wrote:
>> If you’re writing that then I don’t think you understood my point.
>
> I understood your point.
>
> I disagreed with your point.

You don’t seem to be engaging with it. The question is, basically, “why
does almost nobody both with DNSSEC?” The answer is, in short, because
the other tools they have available meet their needs without it. No
amount of discussion of what you can do with DNSSEC, or how it could fit
into any particular use case, or the weaknesses or otherwise of the
Internet PKI changes that.

>> The problem people actually have is exchanging information with
>> websites without anyone else being able to read or modify that data.
>
> I feel the need to reiterate that the Internet is far more than just
> websites or web hosted content.

Yes, and I covered that two or three posts ago.

--
https://www.greenend.org.uk/rjk/

Subject: Re: [LINK] Calling time on DNSSEC?
From: Lawrence D'Oliv
Newsgroups: comp.misc
Organization: A noiseless patient Spider
Date: Tue, 3 Dec 2024 06:14 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Tue, 3 Dec 2024 06:14:06 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <vim7jd$3t1l3$1@dont-email.me>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 03 Dec 2024 07:14:06 +0100 (CET)
Injection-Info: dont-email.me; posting-host="c96be26192a45ce8d8c08f341d719685";
logging-data="4097699"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/y1wgebCCL+VkQednJMDsm"
User-Agent: Pan/0.161 (Chasiv Yar; )
Cancel-Lock: sha1:rxwzAAqAkYYr2LC5xijzEiXSQSw=
View all headers

On Thu, 28 Nov 2024 08:52:31 +0000, Richard Kettlewell wrote:

> DNS + TLS does solve it, sufficiently well. (Using TLS to include
> Internet PKI.)

Nobody uses PKI. TLS has a hole in it, in that the SNI, “Server Name
Indication” (the “Host:” line in the HTTP request header) has to be sent
unencrypted. This allows eavesdroppers, like authoritarian Government
regimes, to determine when you are trying to access a prohibited service,
and block it before the encrypted connection can be set up.

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Wed, 4 Dec 2024 01:37 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Tue, 3 Dec 2024 19:37:46 -0600
Organization: TNet Consulting
Message-ID: <viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 4 Dec 2024 01:37:46 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="28905"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <vim7jd$3t1l3$1@dont-email.me>
View all headers

On 12/3/24 00:14, Lawrence D'Oliveiro wrote:
> Nobody uses PKI.

Um.... I think I'm one of many, Many, MANY people that will have to
disagree with you on hat one.

> TLS has a hole in it, in that the SNI, “Server Name Indication”
> (the “Host:” line in the HTTP request header) has to be sent
> unencrypted.

Two flags on the play:

1) Encrypted SNI is a thing.

2) "the "Host:" line in the HTTP request header" is *NOT* the SNI. The
Host: header is part of the HTTP request that's inside of the TLS
connection.

The SNI hello message does include something similar, but it's not the
Host: header. And there's also ESNI to protect it.

> This allows eavesdroppers, like authoritarian Government regimes,
> to determine when you are trying to access a prohibited service,
> and block it before the encrypted connection can be set up.

Those are examples of the very things that ESNI is designed to defend
against.

Link - What is encrypted SNI? | How ESNI works | Cloudflare
- https://www.cloudflare.com/learning/ssl/what-is-encrypted-sni/

ECH also looks promising.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Lawrence D'Oliv
Newsgroups: comp.misc
Organization: A noiseless patient Spider
Date: Wed, 4 Dec 2024 02:02 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 4 Dec 2024 02:02:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 5
Message-ID: <viod8c$fp5p$1@dont-email.me>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 04 Dec 2024 03:02:53 +0100 (CET)
Injection-Info: dont-email.me; posting-host="49d5f9553a2964b815f257dd85f9d35a";
logging-data="517305"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+IJlXo9qv2sgEE4ZUJdb2P"
User-Agent: Pan/0.161 (Chasiv Yar; )
Cancel-Lock: sha1:GSBtpXC9Qub+Z00suU/i4BGxd+s=
View all headers

On Tue, 3 Dec 2024 19:37:46 -0600, Grant Taylor wrote:

> 1) Encrypted SNI is a thing.

That requires a separate protocol on top of TLS.

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Wed, 4 Dec 2024 04:51 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Tue, 3 Dec 2024 22:51:00 -0600
Organization: TNet Consulting
Message-ID: <vion3k$fau$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net> <viod8c$fp5p$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 4 Dec 2024 04:51:00 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="15710"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <viod8c$fp5p$1@dont-email.me>
View all headers

On 12/3/24 20:02, Lawrence D'Oliveiro wrote:
> That requires a separate protocol on top of TLS.

My understanding is that ESNI is part of TLS.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Lawrence D'Oliv
Newsgroups: comp.misc
Organization: A noiseless patient Spider
Date: Wed, 4 Dec 2024 05:49 UTC
References: 1 2 3 4 5 6 7 8 9
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 4 Dec 2024 05:49:44 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <vioqhn$mcr7$1@dont-email.me>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
<viod8c$fp5p$1@dont-email.me>
<vion3k$fau$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 04 Dec 2024 06:49:44 +0100 (CET)
Injection-Info: dont-email.me; posting-host="49d5f9553a2964b815f257dd85f9d35a";
logging-data="734055"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19w41UoMXX4MQNsDmKsbkS4"
User-Agent: Pan/0.161 (Chasiv Yar; )
Cancel-Lock: sha1:PX72l8lTnbRW6J6tEXvzLu4sOeQ=
View all headers

On Tue, 3 Dec 2024 22:51:00 -0600, Grant Taylor wrote:

> On 12/3/24 20:02, Lawrence D'Oliveiro wrote:
>
>> That requires a separate protocol on top of TLS.
>
> My understanding is that ESNI is part of TLS.

It can’t be. TLS cannot start encryption on HTTP until it gets a cert that
identifies the server. That cert depends on the domain name. Which comes
from the “Host:” header line from the client. Which is why that cannot be
sent encrypted.

Subject: Re: [LINK] Calling time on DNSSEC?
From: Richard Kettlewell
Newsgroups: comp.misc
Organization: terraraq NNTP server
Date: Wed, 4 Dec 2024 08:39 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 04 Dec 2024 08:39:37 +0000
Organization: terraraq NNTP server
Message-ID: <wwvjzcf6dva.fsf@LkoBDZeT.terraraq.uk>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="55887"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:e7l1TySW3w0lVdamUu1DsEWzmNo=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
View all headers

Grant Taylor <gtaylor@tnetconsulting.net> writes:
> On 12/3/24 00:14, Lawrence D'Oliveiro wrote:
>> Nobody uses PKI.
>
> Um.... I think I'm one of many, Many, MANY people that will have to
> disagree with you on hat one.

Quite.

>> TLS has a hole in it, in that the SNI, “Server Name Indication” (the
>> “Host:” line in the HTTP request header) has to be sent unencrypted.
>
> Two flags on the play:
>
> 1) Encrypted SNI is a thing.
>
> 2) "the "Host:" line in the HTTP request header" is *NOT* the SNI.
> The Host: header is part of the HTTP request that's inside of the TLS
> connection.

Quite.

> The SNI hello message does include something similar, but it's not the
> Host: header. And there's also ESNI to protect it.

Better than nothing, although in many cases I’d expect that traffic
analysis could be used to narrow down which site was being visited even
without name information being available.

>> This allows eavesdroppers, like authoritarian Government regimes, to
>> determine when you are trying to access a prohibited service, and
>> block it before the encrypted connection can be set up.
>
> Those are examples of the very things that ESNI is designed to defend
> against.

If there’s multiple sites served by a single IP address then the attack
can just indiscriminately block all of them. Encrypting name information
can’t prevent that.

--
https://www.greenend.org.uk/rjk/

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Thu, 5 Dec 2024 01:17 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 4 Dec 2024 19:17:08 -0600
Organization: TNet Consulting
Message-ID: <viquuk$l6k$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net> <viod8c$fp5p$1@dont-email.me>
<vion3k$fau$1@tncsrv09.home.tnetconsulting.net> <vioqhn$mcr7$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 5 Dec 2024 01:17:08 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="21716"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <vioqhn$mcr7$1@dont-email.me>
View all headers

On 12/3/24 23:49, Lawrence D'Oliveiro wrote:
> It can’t be.

Sure it can.

> TLS cannot start encryption on HTTP until it gets a cert that
> identifies the server.

The TLS connection is fully established and fully encrypted *BEFORE* any
HTTP is sent /through/ /the/ /inside/ /of/ /said/ /TLS/ connection.

> That cert depends on the domain name.

No, not quite.

The domain name can be used to inform which cert the server should use,
and that's EXACTLY what Server Name Indication (a.k.a. SNI) is. SNI is
part of TLS.

> Which comes from the “Host:” header line from the client.

Nope.

TLS can optionally send the domain name that it's going to connect to as
part of the TLS session establishment using SNI.

After the TLS session is established, then the web client sends the
Host: header.

> Which is why that cannot be sent encrypted.

Do some reading on SNI, and then ESNI. The links that I shared
previously have a decent write up.

Also, consider protocols that don't send a Host: header (as HTTP does)
still using SNI to indicate which domain name is being connected to.

You can also take a look at TLS traffic inside of Wireshark and see that
the destination name is sent very early in the connection as part of SNI.

If you have your client (Firefox) save the ephemeral keys, you can
decrypt the TLS session and see that the Host: header comes much later,
/AFTER/ the TLS connection is fully established.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Thu, 5 Dec 2024 01:19 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 4 Dec 2024 19:19:55 -0600
Organization: TNet Consulting
Message-ID: <viqv3r$l6j$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
<wwvjzcf6dva.fsf@LkoBDZeT.terraraq.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 5 Dec 2024 01:19:55 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="21715"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <wwvjzcf6dva.fsf@LkoBDZeT.terraraq.uk>
View all headers

On 12/4/24 02:39, Richard Kettlewell wrote:
> Better than nothing, although in many cases I’d expect that traffic
> analysis could be used to narrow down which site was being visited
> even without name information being available.

Yes, traffic analysis can infer and / or interfere with things.

There's also domain fronting. }:-)

> If there’s multiple sites served by a single IP address then the
> attack can just indiscriminately block all of them. Encrypting name
> information can’t prevent that.

Quite ;-)

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Lawrence D'Oliv
Newsgroups: comp.misc
Organization: A noiseless patient Spider
Date: Thu, 5 Dec 2024 02:02 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Thu, 5 Dec 2024 02:02:39 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 39
Message-ID: <vir1jv$17csf$4@dont-email.me>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
<viod8c$fp5p$1@dont-email.me>
<vion3k$fau$1@tncsrv09.home.tnetconsulting.net>
<vioqhn$mcr7$1@dont-email.me>
<viquuk$l6k$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 05 Dec 2024 03:02:39 +0100 (CET)
Injection-Info: dont-email.me; posting-host="b8ada25e4317f2ac3fdfff6f2c3be1a9";
logging-data="1291151"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+mO/nGQo37gC/KacT8PjJp"
User-Agent: Pan/0.161 (Chasiv Yar; )
Cancel-Lock: sha1:qRBMQcOBQ5+LP+USuxnEdPKSBG0=
View all headers

On Wed, 4 Dec 2024 19:17:08 -0600, Grant Taylor wrote:

> On 12/3/24 23:49, Lawrence D'Oliveiro wrote:
>
>> That cert depends on the domain name.
>
> No, not quite.
>
> The domain name can be used to inform which cert the server should use,

Which part of “depends on” are you having trouble with?

> and that's EXACTLY what Server Name Indication (a.k.a. SNI) is. SNI is
> part of TLS.

Which cannot be sent encrypted over HTTP because HTTP encryption
hasn’t been set up yet.

> Also, consider protocols that don't send a Host: header (as HTTP does)
> still using SNI to indicate which domain name is being connected to.

They don’t do “virtual hosting”, where multiple domains share the same
IP address, and is an important feature of HTTP. That’s why there is a
specific problem with that.

There are two rival specs for solving this: DNS-over-TLS, and
DNS-over-HTTPS. DNS-over-TLS (DoT) is a separate protocol that can be
identified as such by firewalls, while DNS-over-HTTPS (DoH) is
essentially indistinguishable from any other HTTPS traffic.

DoH has become quite controversial. On the one hand, corporates who
want to control traffic on their networks for security reasons hate
it. But on the other hand, it can be useful to bypass restrictions for
those who live under certain authoritarian regimes. You can’t have
it both ways.

Mozilla decided to go for DoH, for which a British association of ISPs
called them a “villain”
<https://www.theregister.com/2019/07/10/ispa_clears_mozilla/>.

Subject: Re: [LINK] Calling time on DNSSEC?
From: Grant Taylor
Newsgroups: comp.misc
Organization: TNet Consulting
Date: Thu, 5 Dec 2024 02:57 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Wed, 4 Dec 2024 20:57:47 -0600
Organization: TNet Consulting
Message-ID: <vir4rb$kfq$1@tncsrv09.home.tnetconsulting.net>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net> <viod8c$fp5p$1@dont-email.me>
<vion3k$fau$1@tncsrv09.home.tnetconsulting.net> <vioqhn$mcr7$1@dont-email.me>
<viquuk$l6k$1@tncsrv09.home.tnetconsulting.net>
<vir1jv$17csf$4@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 5 Dec 2024 02:57:47 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11";
logging-data="20986"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <vir1jv$17csf$4@dont-email.me>
View all headers

On 12/4/24 20:02, Lawrence D'Oliveiro wrote:
> Which part of “depends on” are you having trouble with?

TLS doesn't /depend/ /on/ any domain information from the client.

It's perfectly possible to use a certificate that has nothing to do with
the domain name the client was connected to.

N.B. that's entirely independent of if the client will continue using
the connection after seeing that the name in the certificate (CN and /
or SAN) doesn't match the domain name that the client thought it was
connecting to.

But the server can use whatever certificate it wants to completely
independently of the domain name that the client uses. Hence there is
no dependency.

There is correlation and usually mutual agreement. But that's not a
requirement.

> Which cannot be sent encrypted over HTTP because HTTP encryption
> hasn’t been set up yet.

Server Name Indication is part of TLS, not HTTP. HTTP comes /after/ SNI.

> They don’t do “virtual hosting”, where multiple domains share
> the same IP address, and is an important feature of HTTP. That’s
> why there is a specific problem with that.

Link - Postfix — Multiple domain SSL certificates | by Dave Teu | Better
Coder | Medium
-
https://medium.com/better-coder/postfix-multiple-domain-ssl-certificates-89c9f186ed73

Link - Dovecot SSL configuration — Dovecot documentation
-
https://doc.dovecot.org/2.3/configuration_manual/dovecot_ssl_configuration/#with-client-tls-sni-server-name-indication-support

> There are two rival specs for solving this: DNS-over-TLS, and
> DNS-over-HTTPS.

DoT & DoH are about encrypted communications with a DNS server. The are
completely independent of of TLS & SNI. What's more is that neither
DoT, nor DoH can do shit about ensuring that the data sent through the
DoT / DoH channel is valid. It's trivial to lie through DoT & DoH.
Unless client's use DNSSEC through DoT & DoH to catch the lie.

You can even use SNI while establishing a DoH session.

> DNS-over-TLS (DoT) is a separate protocol that can be identified
> as such by firewalls, while DNS-over-HTTPS (DoH) is essentially
> indistinguishable from any other HTTPS traffic.

DoH is still subject to the SNI exposure and can be filtered that way.

It's also possible to do traffic analysis to identify & block likely DoH
traffic.

> DoH has become quite controversial.

This doesn't have anything to do with TLS / SNI, so I'm not responding
to it.

--
Grant. . . .

Subject: Re: [LINK] Calling time on DNSSEC?
From: Richard Kettlewell
Newsgroups: comp.misc
Organization: terraraq NNTP server
Date: Thu, 5 Dec 2024 08:46 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.misc
Subject: Re: [LINK] Calling time on DNSSEC?
Date: Thu, 05 Dec 2024 08:46:37 +0000
Organization: terraraq NNTP server
Message-ID: <wwvfrn2y0sy.fsf@LkoBDZeT.terraraq.uk>
References: <67464f37@news.ausics.net>
<vi68n4$k3r$1@tncsrv09.home.tnetconsulting.net>
<wwva5dlul1r.fsf@LkoBDZeT.terraraq.uk>
<vi8tkg$8ha$1@tncsrv09.home.tnetconsulting.net>
<wwva5dj91v4.fsf@LkoBDZeT.terraraq.uk> <vim7jd$3t1l3$1@dont-email.me>
<viobpa$s79$2@tncsrv09.home.tnetconsulting.net>
<viod8c$fp5p$1@dont-email.me>
<vion3k$fau$1@tncsrv09.home.tnetconsulting.net>
<vioqhn$mcr7$1@dont-email.me>
<viquuk$l6k$1@tncsrv09.home.tnetconsulting.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="78793"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:5O+P9V+nxwaHazP3BwikGrDp1NE=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
View all headers

Grant Taylor <gtaylor@tnetconsulting.net> writes:
> On 12/3/24 23:49, Lawrence D'Oliveiro wrote:
>> It can’t be.
>
> Sure it can.
>
>> TLS cannot start encryption on HTTP until it gets a cert that
>> identifies the server.
>
> The TLS connection is fully established and fully encrypted *BEFORE*
> any HTTP is sent /through/ /the/ /inside/ /of/ /said/ /TLS/
> connection.

ESNI and ECH seem to work by publishing a separate provider key. There
might be good reasons for that design in the context of TLS though it’s
not how I’d have done it, given a clean sheet.

In the abstract the purpose of a certificate in TLS-like protocols is to
provide the key used to sign the key exchange process. With (EC)DH or
ML-KEM there’s no inherent reason that has to be delivered in the
unencrypted part of the protocol; it might add another round trip to
session setup but so would gathering completely separate keys as in
ESNI/ECH, if I’ve understood them correctly.

With RSA key exchange that wouldn’t be true, but that’s out of favor for
TLS these days anyway.

--
https://www.greenend.org.uk/rjk/

1

rocksolid light 0.9.8
clearnet tor