Re: [Add] Draft Posting: CNAME Discovery of Local DoH Resolvers

Eric Rescorla <ekr@rtfm.com> Sat, 27 June 2020 00:48 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B5993A0917 for <add@ietfa.amsl.com>; Fri, 26 Jun 2020 17:48:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RaPEwdGzWi5i for <add@ietfa.amsl.com>; Fri, 26 Jun 2020 17:48:12 -0700 (PDT)
Received: from mail-lj1-x229.google.com (mail-lj1-x229.google.com [IPv6:2a00:1450:4864:20::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E24943A0914 for <add@ietf.org>; Fri, 26 Jun 2020 17:48:11 -0700 (PDT)
Received: by mail-lj1-x229.google.com with SMTP id 9so12118631ljc.8 for <add@ietf.org>; Fri, 26 Jun 2020 17:48:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mW17HAql1VvWf7NleRvv9iTUwlGke4yRCliUU6MdDSA=; b=XRK3jpWvUkJKQe4kEmvwkX4yw5dRCiATLNczAwqbhLsH/1EUvvVQr4TTy76YBBRhpN /C2zqphn69PiK+nHqj/hKfHuBY5tBDVav6+ZaEK031HBddteUmsJFO0H2Wmv3wLkedVj hHu0N6Gje8oGBzBiIFIdgI/JQ/lHwlCJSa1QCrUQyptaLcHvnYdWaZf1cVd9yGv6WrzQ kUsP7O9ZEPejPN9Uaw53cRTemQBeUKZ8dCftaIyalGrRd4dDuJ7SZCwcincWTIBjDRIE siuocJQ7T5QGJSzKEp77MyKomdb7Mf58ET56XTUdIXNKWC11S1SeFuNcAzK1JN6u3oiA EXiw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mW17HAql1VvWf7NleRvv9iTUwlGke4yRCliUU6MdDSA=; b=ZVmFC24e4YO/rOTHcP2NQqLlQ7X+T5+7D/Gjd7nBEgSg3DjcTj+FaLly4m79S9rgOO V4Q8vbZjFZvO4ZoXQImPOlTlygWpx3WPWR9SK1bRPhCnJ5Qz63T3kB2trpIFe3/iovXb T592BC5wyt2HkHSYoYvKgfeC61dAbLZVBrmueIFMKJbHjNmtfkUUZqQVP4iz3d6ndyq4 md8P5r17RgNis9kRlWYR8b9w9RmfJKHCvpj57DeQPShIa+XYDd32wfe+PE3jFE2Eu+6L z62uQELSdJeiTQLvFDmg1f85wzQrO40dTTYSs/nozyF8G0fs259c94Fq4yuuGK2za+2N pTxg==
X-Gm-Message-State: AOAM532kLdqiAQ6kShQEcjRDS17xbphPAQLo2Jyq9ahLjyooZkGyArk3 xPUQVlWQpOF2Mg+BUXYHZfI+GkSgYW4OR9+KgXwDew==
X-Google-Smtp-Source: ABdhPJxSSS907dDpqD2EiQ+qGNA+xSEJLWuHvrnjsAytoJbqe1r4kIP68G79rp4615AWoUwlyVn0yZfJo+7ObY5A+Bw=
X-Received: by 2002:a2e:2a42:: with SMTP id q63mr2870380ljq.265.1593218890020; Fri, 26 Jun 2020 17:48:10 -0700 (PDT)
MIME-Version: 1.0
References: <CABcZeBPTkWeB40wpTowKvEJ-gXA3AL2e-BE+C_FC7Js7-D0DZQ@mail.gmail.com> <1AB2782B-87C0-4991-8703-AE2C98411AFC@apple.com> <CABcZeBOyAb3HrX0ABM2ZFuz-_Vn+0sPk_88e2OwQ5U-DRjAxXQ@mail.gmail.com> <2013869.BjYadG0qc2@linux-9daj>
In-Reply-To: <2013869.BjYadG0qc2@linux-9daj>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 26 Jun 2020 17:47:34 -0700
Message-ID: <CABcZeBOoOQ1drRepe9oHCyFrgnRxomKBkno7b1CDcfRJAZqkHg@mail.gmail.com>
To: Paul Vixie <paul@redbarn.org>
Cc: Tommy Pauly <tpauly@apple.com>, ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000fd4f4005a9062d74"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/AZ-i24_sh1cT619rrKXg0f6lmK8>
Subject: Re: [Add] Draft Posting: CNAME Discovery of Local DoH Resolvers
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Jun 2020 00:48:15 -0000

On Fri, Jun 26, 2020 at 5:04 PM Paul Vixie <paul@redbarn.org> wrote:

> On Friday, 26 June 2020 22:08:05 UTC Eric Rescorla wrote:
> > ... Other than inelegance, what's problematic about the CNAME approach?
>
> inelegance is permanent, accretive, and earns compound interest. we ought
> not
> dismiss inelegance as the basis for reluctance. inelegance is not
> inevitable
> nor is it automatically acceptable.
>
> > ...
> >
> > The scenario you seem to be interested in is one in which the user joins
> > the network and then learns that the associated Do53 resolver supports
> DoH
> > and then connects to it with whatever coordinates that resolver (or DHCP
> or
> > whatever) provides. That clearly is not useful in the 3552 threat model
> > which assumes that the attacker entirely controls the network because the
> > attacker can just send their own resolver coordinates. That isn't to say
> > that there aren't more limited but still realistic threat models where
> this
> > would be useful, but I think you should start by describing those.
>
> as we describe them, we should also describe their scale, their age, and
> their
> likely lifespan. the 3552 threat model, while it does use the term
> 'pervasive', is nowhere near as common as the SASE (secure access service
> edge) operations model, nor will it ever be. if apps who want to do their
> own
> DNS treat any DoH failure as an attack, and start an arms race of
> spy-vs-spy
> bypass along the lines of Tor, that's going to feel problematic to any of
> us
> whose privately owned securely operated edge networks have a local-only
> DNS
> policy.
>
> RESINFO could probably get better results by using TXT, because of long
> tail
> problems. but ultimately we have to pick a default assumption that we can
> act
> on when secure resolver discovery fails. "OMG it's a 3552 attack" is not
> the
> only interpretation we could think of for this. it's entirely possible
> that
> the most engineering solution to the discovery problem is to fail hard
> when
> the middlebox prevents authenticated policy negotiation, to force
> middlebox
> upgrades. i know that "tough love" is a hard sell, but "assume 3552
> attack" is
> also a form of tough love.
>

Hi Paul,

I think this response perhaps conflates two somewhat different issues,
namely CNAME versus authenticated policy propagation.

Ignoring the question of CNAME for the moment, if a device joins a
network and gets its configuration from that network (e.g., via DHCP),
then it is trusting that network to provide the configuration. So, the
question then becomes what benefit is obtained if that network
supplies a Do[TH] server rather than a Do53 server. In the 3552 model,
we assume the attacker has complete control of the network and can
therefore supply its own server, so it's not clear what the security
benefit is. Conversely, if the network is totally secure and trusted,
then it's *also* not clear what the security benefit is.

So, if we are to have unauthenticated discovery of Do[TH] servers,
then we must have some other threat model. For instance we might
think that the attacker can read all packets but for some reason
can't impersonate the DHCP server. What I'm saying is that we should
start by laying out what that threat model is and then we can define
what, if any, technical measures add security benefit in that threat
model. That would be true even if we knew that there weren't
middleboxes which tampered with new record types.


Two more points, if I may:

1. Where this interfaces with the question of CNAME versus RESINFO
is that RESINFO is much more flexible, but (as above) it's not
clear we can securely make use of this flexibility.

2. It's worth nothing that there are scenarios where the device
can get authenticated network configuration (for instance, if
the device is managed and has had some sort of authentication key
installed). The comments above do not apply to this scenario
but rather to the scenario where you have a naive device joining
a network.

-Ekr