public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [Fwd: Re: request for info: unbound via https / tls]
Date: Mon, 10 Dec 2018 13:37:20 +0000	[thread overview]
Message-ID: <E401C678-D1E4-4C9D-93F8-67ECF47F45FE@ipfire.org> (raw)
In-Reply-To: <d69e046565e67ec198962be291cf4577484cd401.camel@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 4706 bytes --]

Hey,

> On 10 Dec 2018, at 12:14, ummeegge <ummeegge(a)ipfire.org> wrote:
> 
> Hi Michael,
> 
> Am Montag, den 10.12.2018, 00:21 +0000 schrieb Michael Tremer:
> 
>> I am not sure what you are looking for. 
> Mainly for testing people which take also a look over the changes in 
> unbound initscript. Since the 'update_forwarders()' function from
> unbound init will currently not be used if custom forwarders are in
> usage.
> 'update_forwarders()' includes really a lot of other functions and it
> was/is not that easy to check for all possible side affects if this
> function will be bypassed and substituded by another one (cue: DNSSEC,
> EDNS, ...). All changes causing the unbound initscript can be found in
> here -->
> https://gitlab.com/ummeegge/dot-for-ipfire/commits/master/unbound
> .
> 
> Another point i am currently looking for is the question, if unbound is
> the best possibility for DoT ? If you take look into the current
> implementation status -->
> https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Implementation+Status
> unbound misses also some other DoT related features.
> Am building currently GetDNS and Stubby just to get there also a better 
> inside of the differences.

Those are just stub resolvers and no proxies. Out of the proxies unbound might not have the most ticks looking at the TLS features, but I do not see that as a problem. None of them are a must and unbound is under development. I am sure those will come.

> Also, integrating DoT into webuserinterface is, as before mentioned in
> here, a point. Should DoT become it´s own one, or is it a complete new
> WUI menu point worth ?

This is essential.

I do not think that it should add another CGI, because we already have a DNS CGI script that we can use and extend.

> In my humble opinion this DoT topic is still pretty much in a testing
> phase not only speaking for myself but also looking around and finding
> only two (may three) stable DoT providers speaks, i think, also a
> little for itself.

Yes, I agree. It is a new “feature” that was used to market Cloudflare’s DNS. Showing that they “care" about privacy.

However, I think that this is not beta software any more, we can run this on larger scale and it solves a problem that existed before and is a nice solution to it, too.

If IPFire wants to be bleeding-edge that we have to have this feature at some point.

>> But I just wanted to say that I am following this conversation.
> 
> That´s great.
> 
>> 
>> So far I think that there are indeed many people interested in DoT.
>> However, I have not received any feedback on what I was mailing
>> before.
>> 
> I hope some feedback comes around also since i am currently testing it 
> for a couple of weeks now and posted the results/code_changes in the
> forum and some also in here.

Yeah, I am not sure what I should be testing now. There is a bunch of software packages and there is a bunch of changes to scripts. This isn’t really ready for testing yet is it?

I guess we should think about a strategy about which features we want to have in a first alpha stage and then have those agreed, implemented and then sent out in one package for testing. That makes it a lot easier.

So I am thinking about this:

* Make unbound ready for DNS-over-TLS (I believe that that is almost the case)

* Change the scripts that write forwarders.conf. I do not think that we should perform DNSSEC checks on the DNS-over-TLS resolvers.

* Extend the CGI that we can enter the IP addresses and host names

What else do we need?

> 
>> I think what is best now is to get this into small patches. What
>> needs to be done to get this UI ready so that people can add those
>> DNS servers? What will the default behaviour be? How will we make
>> sure that the system does not fall back (to unauthenticated DNS)?
>> 
> That´s the fundamental question, please see the above statements.
> 
> 
>> I think that we can leave OpenSSL 1.1.1 aside for this for now,
>> because it works perfectly fine with TLS 1.2. We should not mix
>> multiple things together when they have no strict dependency
>> (although I am really looking forward to see TLS 1.3 in IPFire soon).
>> 
> OpenSSL-1.1.1 and TLS 1.3 fits perfectly into this topic and i hope i
> can install today the new OpenSSL and to test it in my productive
> environment.

So far we don’t have OpenSSL 1.1.1. I think focussing on one at a time allows to develop this quicker.

I am not even sure if any of the resolvers support TLS 1.3 today.

Best,
-Michael

> 
> 
>> Best,
>> -Michael
>> 
>>> Best,
>>> 
>>> Erik
>>> 
>> 
>> 
> 


  parent reply	other threads:[~2018-12-10 13:37 UTC|newest]

Thread overview: 28+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <1525184928.3530.13.camel@gmail.com>
2018-05-01 14:33 ` Paul Simmons
2018-05-01 14:40   ` Peter Müller
2018-05-01 17:16     ` Paul Simmons
2018-05-03 16:03       ` Michael Tremer
2018-12-02 19:10     ` ummeegge
2018-12-02 20:23       ` Paul Simmons
2018-12-04 14:01         ` ummeegge
2018-12-04 16:19           ` Peter Müller
2018-12-05  7:35             ` ummeegge
2018-12-09 20:08               ` ummeegge
2018-12-10  0:21                 ` Michael Tremer
2018-12-10 11:30                   ` ummeegge
2018-12-10  0:21               ` Michael Tremer
2018-12-10 12:14                 ` ummeegge
2018-12-10 12:32                   ` ummeegge
2018-12-10 13:26                     ` Michael Tremer
2018-12-10 14:37                       ` ummeegge
2018-12-11 19:22                         ` Michael Tremer
2018-12-11 19:43                           ` ummeegge
2018-12-11 19:54                             ` Michael Tremer
2018-12-12 13:42                               ` ummeegge
2018-12-12 15:25                                 ` Michael Tremer
2018-12-12 17:44                                   ` ummeegge
2018-12-13  6:52                                     ` ummeegge
2018-12-13 16:26                                       ` Michael Tremer
2018-12-10 13:37                   ` Michael Tremer [this message]
2018-12-11  2:01                   ` Paul Simmons
2018-12-11 20:09                     ` ummeegge

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=E401C678-D1E4-4C9D-93F8-67ECF47F45FE@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox