Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Define what is meant by “authenticated” #8

Open
chris-box opened this issue Sep 3, 2020 · 3 comments
Open

Define what is meant by “authenticated” #8

chris-box opened this issue Sep 3, 2020 · 3 comments
Labels

Comments

@chris-box
Copy link
Contributor

I’m suggesting that the aspect of “authenticated” be expanded, discussed, and explained as it does potentially have different notions in different readers perspectives.

For example some may say doing a DNSSEC validation of some sort is what is needed, or perhaps some form of PKI, or is it a TLS certificate validation, or mutual exchange? It might even be something as basic as asking special DNS queries and validating the answers received against expectations.

Another slice would be authenticating the actual resolver chosen or is it authenticated at the more abstract “service” provided by the operator of the resolver?

There is also the consideration of does the authentication means/level vary depending on different environmental threat levels?

The bottom line is there is a lot of meanings behind “authentication” and what is being authenticated to declare and discuss as a requirement.

-glenn

Originally posted by @gitnnelg in #2 (comment)

@chris-box
Copy link
Contributor Author

Tiru also commented "Several possible ways of authenticating the encrypted DNS server are already discussed in our spec https://tools.ietf.org/html/rfc8310#section-8. I don't think the requirements draft should discuss the possible modes of authenticating the server."

@magicalo
Copy link

agree - authentication can include mutual authentication

@JoGSal
Copy link

JoGSal commented Oct 16, 2020

+1 to different means/level depending on environment.
I think mandatory should be validation of resolver designation through any of the 4 methods described in draft-pauly-add-resolver-discovery (validation using DNSSEC / PvD file / file on a well-known HTTPS URI based on zone apex / TLS certificates).
Then the actual resolver chosen and their ownership over the encrypted services, similar to what's on Google's policy , then client authentication for use-cases like the enterprise network

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants