Re: [Add] fixing coffee shop brokenness with DoH

Eric Rescorla <ekr@rtfm.com> Wed, 24 July 2019 15:10 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A153E1202DC for <add@ietfa.amsl.com>; Wed, 24 Jul 2019 08:10:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FEKVVSjiNWCQ for <add@ietfa.amsl.com>; Wed, 24 Jul 2019 08:10:54 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2794E12027A for <add@ietf.org>; Wed, 24 Jul 2019 08:10:54 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id v18so44821103ljh.6 for <add@ietf.org>; Wed, 24 Jul 2019 08:10:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=4riK5znDxWGWc56MajjG5v4i76G9ApUDUXuMzPouRHg=; b=J/KyTGroojHadcwiFqNO8YnsS23nyZV1W9woTvz5ERO1TX6Kea1Z4inbJEYBsVLTyU iIPCF3c+UU3AJ5tQqWgokDRvG/KTlHBa8Qpw1U+/pbzeWb6II3c598/USt/vtK95xOWU URc8unqUWjvYTJVkHsBW014kIJiaA/9nbVpjrJUOLJKY+RJPHnslq+iJdfiN8lH/iwkc PWDzYd1j5vAJnaUrAJyY+BdPqYqDggDhrjAAq60b9kglR5xUExV7yy4nVxDl0rDThxMC wJC7gDIfZdryKOpRLk0Gu0z3YLdP1pd8qJSrbluQ4YnUokKkSpzdoKXlWlDVy4ilKbhc lchQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=4riK5znDxWGWc56MajjG5v4i76G9ApUDUXuMzPouRHg=; b=ew36D9iR+HaJQfn8FXCNQKtpn/rGO2T5V3uMLjZu6sVUgiWcMIaBzp2o0aF/+0Fomi +zSLDZpdadVN5KpJKglZgyE2jBsyOqFfVEhGhWIajvWfrY+c3404BWuExE5oUG6Qs+iJ dWv+apCyw5qXwaXzxL6g4NKAkVFj77w2U7K5gXhvIB85kaOSGTnCYtA10IFukAZxUSYC JLjaYvIqSLW6x2rjkHBdKuuI81gEEoezNZc1S+HgUjHd2YeLvqc5cBbTfF9lfthdix+9 OSAmgvWxFWm/Th1usjkTSqU3xs5O3Pleqy921F4q8+1lnt0yIzZedu8kwedlpqYah/gL PJow==
X-Gm-Message-State: APjAAAV+34/dedCSdDP4WG9In4nmVJssXCimb6GS57I9A7DBOCOELFeg MzyTQAqTKDudokNaMK+kGMzGYf6cWebAlzXM5rY=
X-Google-Smtp-Source: APXvYqzR14Tu3EllgqyCqndfL40saCuergSnF1HWhp3mJCYf2txiwqFDjNOBdAw4BwpC0Ujsa5ONSrsoO7inWfPSM9g=
X-Received: by 2002:a2e:9b84:: with SMTP id z4mr26657482lji.75.1563981052472; Wed, 24 Jul 2019 08:10:52 -0700 (PDT)
MIME-Version: 1.0
References: <CAChr6Sx9TEt6CMzRRrdb-HwT_k987oW=4yF1FCbDF17zkaE2Vg@mail.gmail.com> <2D09D61DDFA73D4C884805CC7865E6114E23910C@GAALPA1MSGUSRBF.ITServices.sbc.com> <14DF8769-A817-4C06-9140-80198518244F@akamai.com> <CAChr6SzH1EycAr5n+dK5BQcG=0Zsw66qE=8Rptvq7SEoEvQQ=Q@mail.gmail.com> <E5A0DAE2-A718-41EA-B490-58ABD0F31CF2@rfc1035.com> <CABcZeBMqvZivS_Hk_2mSOAOnM+mHy1mtcwnHVFc14v_jdkgU=Q@mail.gmail.com> <4DE9B8B1-36D5-4EB5-BE84-D61C182F7372@fugue.com> <CABcZeBN+4RGWN0+xhtb-bMtSJ1B0FAU4JjRJTOSd1x_9JJZBWg@mail.gmail.com> <D361E72B-3783-4E57-8F08-8B418639BB29@fugue.com> <CABcZeBP2MY3pjeZv4Q+1Kj3_GKOgVq8+OYe7im2gYvBzy=Mz7g@mail.gmail.com> <F8A56D5D-B05E-4E80-880C-60D6B550F107@fugue.com>
In-Reply-To: <F8A56D5D-B05E-4E80-880C-60D6B550F107@fugue.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 24 Jul 2019 08:10:16 -0700
Message-ID: <CABcZeBOO5yvcm=DvDjr-7v4AvVG=13Zy--j362eE0Qqp7hcRaw@mail.gmail.com>
To: Ted Lemon <mellon@fugue.com>
Cc: Jim Reid <jim@rfc1035.com>, "add@ietf.org" <add@ietf.org>, Rob Sayre <sayrer@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000001180bb058e6eb740"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/EvHquVEXfPXWKHX9X_EZ780AIQo>
Subject: Re: [Add] fixing coffee shop brokenness with DoH
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jul 2019 15:10:58 -0000

On Wed, Jul 24, 2019 at 7:39 AM Ted Lemon <mellon@fugue.com> wrote:

> On Jul 24, 2019, at 10:37 AM, Eric Rescorla <ekr@rtfm.com> wrote:
>
> Yes. But that need not be cryptographically verifiable because the client
> really has no option but to abandon the connection at this point, even if
> it is suspicious of the DNSSEC status.
>
>
> I think you reasoned a few steps faster than I am able to here, Eric.
> Can you walk us through this step by step?
>

Sure. The case of interest here is that you have a client which wants to
connect to domain A and the resolver (or a network attacker) wants to stop
them.

In the case where A is not DNSSEC signed, the attacker just sends NXDOMAIN,
which the client accepts and refuses to connect.

In the case where A *is* DNSSEC signed, the attacker can also inject an
NXDOMAIN. DNSSEC of course won't validate, but the client still doesn't
have an IP address to connect to, so it's only recourse is to error out.
Now, it can show the user a different error than it did for NXDOMAIN, but
these errors tend to be fairly generic anyway (Firefox, for instance, shows
"Hmm. We’re having trouble finding that site."), so from the user
perspective these aren't really very different.

That's actually the best case scenario. As a practical matter, endpoint
DNSSEC error rates are high enough that failure to validate DNSSEC records
isn't a reliable indicator of attack, so as a practical matter, you would
very likely just end up treating this as a simple resolution failure and
show the same error

-Ekr