[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] 219-expanded-dns: Isolate the references to DNSSEC
commit 0e39d9e3b953a55e9ee57d454c8d8c1ae6bcf5bd
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Fri Aug 2 11:55:19 2013 -0400
219-expanded-dns: Isolate the references to DNSSEC
This was originally a DNSSEC proposal, but the round trip issue makes
it look as though this proposal is not sufficient to implement DNSSEC
for practical use.
---
proposals/219-expanded-dns.txt | 42 ++++++++++++++++++++++++++++++----------
1 file changed, 32 insertions(+), 10 deletions(-)
diff --git a/proposals/219-expanded-dns.txt b/proposals/219-expanded-dns.txt
index c291984..dd015a6 100644
--- a/proposals/219-expanded-dns.txt
+++ b/proposals/219-expanded-dns.txt
@@ -1,13 +1,13 @@
-Filename: xxx-dns-dnssec.txt
+Filename: 219-expanded-dns.txt
Title: Support for full DNS and DNSSEC resolution in Tor
Authors: Ondrej Mikle
Created: 4 February 2012
-Modified: 19 August 2012
+Modified: 2 August 2013
Status: Draft
0. Overview
- Adding support for any DNS query type to Tor, as well as DNSSEC support.
+ Adding support for any DNS query type to Tor.
0.1. Motivation
@@ -17,13 +17,23 @@ Status: Draft
XMPP). TLS connections will benefit from planned TLSA record that provides
certificate pinning to avoid another Diginotar-like fiasco.
- DNSSEC is part of the DNS protocol and the most appropriate place for DNSSEC
- API would be probably in OS libraries (e.g. libc). However that will
- probably take time until it becomes widespread.
+0.2. What about DNSSEC?
- On the Tor's side (as opposed to application's side), DNSSEC will provide
- protection against DNS cache-poisoning attacks (provided that exit is not
- malicious itself, but still reduces attack surface).
+ Routine DNSSEC resolution is not practical with this proposal alone,
+ because of round-trip issues: a single name lookup can require
+ dozens of round trips across a circuit, rendering it very slow. (We
+ don't want to add minutes to every webpage load time!)
+
+ For records like TLSA that need extra signing, this might not be an
+ unacceptable amount of overhead, but routine hostname lookup, it's
+ probably overkill.
+
+ [Further, thanks to the changes of proposal 205, DNSSEC for routine
+ hostname lookup is less useful in Tor than it might have been back
+ when we cached IPv4 and IPv6 addresses and used them across multiple
+ circuits and exit nodes.]
+
+ See section 8 below for more discussion of DNSSEC issues.
1. Design
@@ -162,7 +172,19 @@ Status: Draft
- does not pose "ghost-cache-attack", since once RR is flushed from
libunbound's cache, it must be fetched anew
-8. Round trips and serialization
+8. DNSSEC notes
+
+8.1. Where to do the resolution?
+
+ DNSSEC is part of the DNS protocol and the most appropriate place for DNSSEC
+ API would be probably in OS libraries (e.g. libc). However that will
+ probably take time until it becomes widespread.
+
+ On the Tor's side (as opposed to application's side), DNSSEC will provide
+ protection against DNS cache-poisoning attacks (provided that exit is not
+ malicious itself, but still reduces attack surface).
+
+8.2. Round trips and serialization
Following are two examples of resolving two A records. The one for
addons.mozila.org is an example of a "common" RR without CNAME/DNAME, the
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits