How have we got to this point?" ...
On 11/26/24 16:44, Computer Nerd Kev wrote:
How have we got to this point?" ...
Too many people stop once they achieve what they think is the minimum
viable product. Basic insecure DNS is that MVP when it comes to name resolution.
People move on to other MVP tasks that demand their attention and
never get back around to DNSSEC.
I've been using DNSSEC for 10-15 years with effectively minimal
problems.
IPv6 is a good case in point where the basic architecture of the
protocol, namely as an end-to-end address-based datagram
architecture, has become an imperfect fit for a client-server
network that makes extensive use of replicated service delivery
platforms.
Today's network is undertaking a transformation to a name-based
network, and running out of addresses to the extent that it is no
longer possible to uniquely address every attached client, is no
longer the catastrophic event that we once thought it would be. We
appear to have attached some 30B devices in today's Internet, yet
in terms of IPv4 use, we have achieved this using a little over 3B
unique IPv4 addresses visible in the routing system.
It’s not enough. It can secure the name-to-address mapping but does
nothing for the security of any data sent or received.
You need TLS (or SSH, or whatever) as well, and those already deal
with naming.
So it’s natural to ask why someone would bother with DNSSEC as well,
and hardly surprising that mostly the answer is that people don’t.
On 11/27/24 02:40, Richard Kettlewell wrote:
It’s not enough. It can secure the name-to-address mapping but does
nothing for the security of any data sent or received.
DNS, without security, doesn't have anything to do with security data
sent or received either.
Apples and lug-nuts always have been and always will be completely
different things that do completely different things.
If you’re writing that then I don’t think you understood my point.
The problem people actually have is exchanging information with
websites without anyone else being able to read or modify that data.
DNSSEC on its own obviously can’t solve that.
DNS + TLS does solve it, sufficiently well. (Using TLS to include
Internet PKI.)
DNSSEC + TLS would also solve it, but why would someone bother with
DNSSEC when DNS+TLS is good enough for their needs?
On 11/28/24 02:52, Richard Kettlewell wrote:
If you’re writing that then I don’t think you understood my point.
I understood your point.
I disagreed with your point.
The problem people actually have is exchanging information with
websites without anyone else being able to read or modify that data.
I feel the need to reiterate that the Internet is far more than just
websites or web hosted content.
DNS + TLS does solve it, sufficiently well. (Using TLS to include
Internet PKI.)
Nobody uses PKI.
TLS has a hole in it, in that the SNI, “Server Name Indication”
(the “Host:” line in the HTTP request header) has to be sent
unencrypted.
This allows eavesdroppers, like authoritarian Government regimes,
to determine when you are trying to access a prohibited service,
and block it before the encrypted connection can be set up.
1) Encrypted SNI is a thing.
That requires a separate protocol on top of TLS.
On 12/3/24 20:02, Lawrence D'Oliveiro wrote:
That requires a separate protocol on top of TLS.
My understanding is that ESNI is part of TLS.
On 12/3/24 00:14, Lawrence D'Oliveiro wrote:
Nobody uses PKI.
Um.... I think I'm one of many, Many, MANY people that will have to
disagree with you on hat one.
TLS has a hole in it, in that the SNI, “Server Name Indication” (the
“Host:” line in the HTTP request header) has to be sent unencrypted.
Two flags on the play:
1) Encrypted SNI is a thing.
2) "the "Host:" line in the HTTP request header" is *NOT* the SNI.
The Host: header is part of the HTTP request that's inside of the TLS connection.
The SNI hello message does include something similar, but it's not the
Host: header. And there's also ESNI to protect it.
This allows eavesdroppers, like authoritarian Government regimes, to
determine when you are trying to access a prohibited service, and
block it before the encrypted connection can be set up.
Those are examples of the very things that ESNI is designed to defend against.
It can’t be.
TLS cannot start encryption on HTTP until it gets a cert that
identifies the server.
That cert depends on the domain name.
Which comes from the “Host:” header line from the client.
Which is why that cannot be sent encrypted.
Better than nothing, although in many cases I’d expect that traffic analysis could be used to narrow down which site was being visited
even without name information being available.
If there’s multiple sites served by a single IP address then the
attack can just indiscriminately block all of them. Encrypting name information can’t prevent that.
On 12/3/24 23:49, Lawrence D'Oliveiro wrote:
That cert depends on the domain name.
No, not quite.
The domain name can be used to inform which cert the server should use,
and that's EXACTLY what Server Name Indication (a.k.a. SNI) is. SNI is
part of TLS.
Also, consider protocols that don't send a Host: header (as HTTP does)
still using SNI to indicate which domain name is being connected to.
Which part of “depends on” are you having trouble with?
Which cannot be sent encrypted over HTTP because HTTP encryption
hasn’t been set up yet.
They don’t do “virtual hosting”, where multiple domains share
the same IP address, and is an important feature of HTTP. That’s
why there is a specific problem with that.
There are two rival specs for solving this: DNS-over-TLS, and
DNS-over-HTTPS.
DNS-over-TLS (DoT) is a separate protocol that can be identified
as such by firewalls, while DNS-over-HTTPS (DoH) is essentially indistinguishable from any other HTTPS traffic.
DoH has become quite controversial.
On 12/3/24 23:49, Lawrence D'Oliveiro wrote:
It can’t be.
Sure it can.
TLS cannot start encryption on HTTP until it gets a cert that
identifies the server.
The TLS connection is fully established and fully encrypted *BEFORE*
any HTTP is sent /through/ /the/ /inside/ /of/ /said/ /TLS/
connection.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 491 |
Nodes: | 16 (3 / 13) |
Uptime: | 98:34:38 |
Calls: | 9,680 |
Calls today: | 1 |
Files: | 13,725 |
Messages: | 6,174,630 |