Nottingham: Internet protocols are changing
Nottingham: Internet protocols are changing
Posted Dec 12, 2017 17:58 UTC (Tue) by flussence (guest, #85566)Parent article: Nottingham: Internet protocols are changing
      Posted Dec 12, 2017 18:07 UTC (Tue)
                               by epa (subscriber, #39769)
                              [Link] (4 responses)
       
    https://{google.com:172.217.23.46:ZLgE36lVHk}/ 
where the last bit is some cryptographic signature from the original nameserver (so if you trust that nameserver with DNSSEC, you will trust that the new name/address pair seen in the URI is correct).  That would reduce round trips still further. 
     
    
      Posted Dec 13, 2017 10:59 UTC (Wed)
                               by buchanmilne (guest, #42315)
                              [Link] (3 responses)
       
     
    
      Posted Dec 13, 2017 14:21 UTC (Wed)
                               by epa (subscriber, #39769)
                              [Link] 
       
I envisaged that if your machine already has a cached IP address for that hostname, you use that as normal.  Only if you don't currently have the hostname resolved would you have the option of saving a round trip (or bypassing hostile DNS blocking) by using the address embedded in the URI. 
     
      Posted Jan 8, 2018 0:55 UTC (Mon)
                               by immibis (subscriber, #105511)
                              [Link] (1 responses)
       
     
    
      Posted Jan 18, 2018 2:32 UTC (Thu)
                               by flussence (guest, #85566)
                              [Link] 
       
     
      Posted Dec 13, 2017 9:53 UTC (Wed)
                               by tialaramex (subscriber, #21167)
                              [Link] 
       
With OCSP stapling when I connect to a server, and it is going to show me the certificate saying "I'm server A" it can staple the OCSP response which says "I, the OCSP server, promise this certificate for server A is still good". It is trivially able to obtain this response because it has the certificate already, and the response is signed, so it doesn't matter how it is delivered [Yet despite this two of the world's most popular web servers can't get this right...] 
With CT stapling when I connect to an OCSP server to ask about server A and it's going to provide an OCSP response "I, the OCSP server, promise this certificate for server A is still good" it can also staple the SCT which says "I, a CT log server promise this certificate was logged at a specific moment of time T", it knows the full set of certificates it cares about [that's what OCSP is for] and so it also has all the SCTs for them if it wants. This too is signed and so it doesn't matter how it's delivered [Although details of how exactly we ensure that bogus proofs are detected are still up in the air] 
But with "Flussence DNS Stapling" how does this work? What's signed? Who am I connecting to that knows I need this? 
The user just typed bimble.example.com into my browser. I want to use "Flussence DNS Stapling" which I've heard is great and will speed things up. What do I do now? I need to start sending a packet immediately. I don't know where to send it, what should I put in it - the "Flussence DNS Stapling" needs to have fast, reliable answers for both those things or it's useless, because in just a few milliseconds a traditional DNS would probably have an answer. 
 
 
     
    Nottingham: Internet protocols are changing
      
Nottingham: Internet protocols are changing
      The URI specification should allow the hostname to be given as both IP address and name at the same time.
https://{google.com:172.217.23.46:ZLgE36lVHk}/
where the last bit is some cryptographic signature from the original nameserver (so if you trust that nameserver with DNSSEC, you will trust that the new name/address pair seen in the URI is correct). That would reduce round trips still further.
But now you've made the experience worse for everyone for whom the best Google PoP or Edge PoP (and of course any other CDN) isn't the same as yours.
For example, for me, google.com is one of 6 addresses in 108.177.119/24, but from home it's a totally different range.
For people who live 500ms away from you on a slow-ish link (e.g < 1Mbps), this could be the difference between the internet working, and not working (e.g. Youtube doesn't play, Netflix doesn't work, Google images take forever to load, Android App Updates fail).
      
          Nottingham: Internet protocols are changing
      
Nottingham: Internet protocols are changing
      
Nottingham: Internet protocols are changing
      
Nottingham: Internet protocols are changing
      
 
           