Re: [Add] [Ext] Draft Posting: CNAME Discovery of Local DoH Resolvers

Daniel Migault <mglt.ietf@gmail.com> Tue, 30 June 2020 03:05 UTC

Return-Path: <mglt.ietf@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16E693A0063 for <add@ietfa.amsl.com>; Mon, 29 Jun 2020 20:05:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lDpWBKE-g0E6 for <add@ietfa.amsl.com>; Mon, 29 Jun 2020 20:05:24 -0700 (PDT)
Received: from mail-ua1-x935.google.com (mail-ua1-x935.google.com [IPv6:2607:f8b0:4864:20::935]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0337E3A0A96 for <add@ietf.org>; Mon, 29 Jun 2020 20:05:24 -0700 (PDT)
Received: by mail-ua1-x935.google.com with SMTP id o10so1790479uab.10 for <add@ietf.org>; Mon, 29 Jun 2020 20:05:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8CRy1qXC6YbaBzm2TgkwneL3GPFZW2KpT+tEPBSmDkQ=; b=bnGYriKyohGk4z7nRAr53e9Xs6ha9RtVAbiST9gGoJNBzEbaa+TQP7yrIV4ch5JOK4 zPsmav0i30YuYtgg6YR8vQdNy2TX+lzgyL1+sGCz3Fh1EMPxwBvjV7An8/S9jrrLhJhX PPeCPxywNSmvKYWBpECCGiJFX0O4XCK3ZBcDeGVO2Skx/r2wgx97DMBpxawXok3EadXh FfIJgHGhn5ZNqntLPaH2ANoo6pi1P7lZJj2KL+HoVp0LKANpwLmggCvNJeuOpZP/RE3w 62h+pyhBNbvLn8NDpqHhdxhtmK4xHsMaCLoRMH8u/dDAXst+2S9Xl/hjaR1QZaCz+kv2 Wuyg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8CRy1qXC6YbaBzm2TgkwneL3GPFZW2KpT+tEPBSmDkQ=; b=ieeHAB6Bu4mvQWArjrNO4AOoPGBcZBIeePqomWHonr+oRluLZoNkASRUFrHPu68RRq LoOEqIM+x9jg6knghVpQtGvtxllSlbVMo4BdQIzMEzSalYGRKeq0xHBuk7U3E4QYIY3M 4lof+5AiMqbLHjYtSGl9jkYtxsafavnu137tOr2gC/e+8pGHn+/FCgC8XGU3LL8DmCF0 HyrTrVuIMSQv5T5ybSGgTAv/bNUDW668bOtQ5bKhyVzLMVFnVByxfpX12HU1WUHVOuqJ sAIVt9i6I61p+5IBwBVS6twaax0ssTDK5OAUMKZCnXeYDSZmvwTOwyhvQD+046GGqvim CEfw==
X-Gm-Message-State: AOAM530+T5yvaYOwOXmFjPnRjHyRAWxQEzeB2UcTKEMobYamahRzZspU Q0F3W2/iZnAG1iBWCXLNzb+RpEAUOyrCjNLX0TE=
X-Google-Smtp-Source: ABdhPJzBY4Me3MMZMQ58+o+qAuJs5OC+0HteKvgNgjt2lJaUHyaYqSrJvgSpcLAxFdUpdRGwVBYeEdKONYVS3jUgEbQ=
X-Received: by 2002:ab0:2b08:: with SMTP id e8mr3104700uar.119.1593486323034; Mon, 29 Jun 2020 20:05:23 -0700 (PDT)
MIME-Version: 1.0
References: <CABcZeBPTkWeB40wpTowKvEJ-gXA3AL2e-BE+C_FC7Js7-D0DZQ@mail.gmail.com> <14119.1593367594@localhost> <alpine.OSX.2.22.407.2006281428200.79151@ary.qy> <3615321.ADK9YsXCiF@linux-9daj> <CADZyTkm82y=H48e7TL+wBMN67jrCG2T96kHOdovX0Ds3m_nguw@mail.gmail.com> <CABcZeBMRYRoMVLr937=9T4dyVGzGHYapcrTRZ7nYghdAqzhqOQ@mail.gmail.com> <CADZyTknZTcYXb1JbYANh4uk5xgAedNGnM93y9QORJ2vYR5eJxw@mail.gmail.com> <CABcZeBOqZLpJ1_2-wFae3bM2RvrnA1z++swxfq7xc8E7Ny5ZfQ@mail.gmail.com>
In-Reply-To: <CABcZeBOqZLpJ1_2-wFae3bM2RvrnA1z++swxfq7xc8E7Ny5ZfQ@mail.gmail.com>
From: Daniel Migault <mglt.ietf@gmail.com>
Date: Mon, 29 Jun 2020 23:05:11 -0400
Message-ID: <CADZyTkmD1MYuP0+JB5KS3cLQGe_koo=bu2s2CucHXS098xYAoQ@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: Paul Vixie <paul@redbarn.org>, Michael Richardson <mcr+ietf@sandelman.ca>, ADD Mailing list <add@ietf.org>, John R Levine <johnl@taugh.com>
Content-Type: multipart/alternative; boundary="0000000000003d2de105a9447269"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/LpK8E_Pa07siV15zIcFa0nmboI4>
Subject: Re: [Add] [Ext] Draft Posting: CNAME Discovery of Local DoH Resolvers
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jun 2020 03:05:35 -0000

On Mon, Jun 29, 2020 at 9:15 PM Eric Rescorla <ekr@rtfm.com> wrote:

>
>
> On Mon, Jun 29, 2020 at 5:43 PM Daniel Migault <mglt.ietf@gmail.com>
> wrote:
>
>>
>>
>> On Mon, Jun 29, 2020 at 7:15 PM Eric Rescorla <ekr@rtfm.com> wrote:
>>
>>>
>>>
>>> On Mon, Jun 29, 2020 at 2:40 PM Daniel Migault <mglt.ietf@gmail.com>
>>> wrote:
>>>
>>>> Hi,
>>>>
>>>> I believe the proposal presents some
>>>> similarities to draft-mglt-drdp [1] that is
>>>> using the DNS to proceed to the
>>>> discovery. I see drdp as more generic,
>>>> and would be happy to improve it.
>>>>
>>>> I would be happy to understand why HTTP
>>>> is a better stack to perform the
>>>> discover as opposed to DNS. I think that
>>>> DNS is better as it is the common
>>>> protocol to DoT DoH and DNS, but I might
>>>> be missing something.
>>>>
>>>
>>> I don't quite follow this, as we do not use HTTP.
>>>
>> I thought you were saying using HTTPSSVC was architecturally better
>> - that was section 5 not 4.
>>
>
> Well, S 5 is an empty IANA Considerations section.
>
that was section 5 of adns

>
> In any case, I don't really have a position on whether HTTPSVC is better.
> The text says it "may be" the right answer eventually.
>
>
> I believe that CNAME is to restrictive
>>>> and would not make possible for example
>>>> to have multiple resolvers
>>>>
>>>
>>> This goes back to use case. In our use case, the multiple resolvers
>>> would be supplied by manual configuration of the client. the CNAME is just
>>> a lookup key.
>>>
>>
>> Unless I am missing something, I do not see how the ISP could respond
>> saying and provide the application a resolver that implements DoH, a
>> resolver that implement DoTs, a resolver that implements DoH and DNSSEC
>> validation and let the application pick the one it prefers.
>>
>
> That's correct. As I said, that's not part of our use case, because we're
> only trying to determine which network you are on and then look up the
> resolvers in our TRR list. If we expected ISPs to have >1 kind of resolver
> we'd probably just have them register them all with us and then incorporate
> the list into the binary. I appreciate that this won't work well for many,
> but as I said, this mechanism is targeted at quite a narrow use case.
>
>
>>
>>>
>>>> CNAME does not provide useful necessary
>>>> parameters that may also be useful for a
>>>> DoH resolver DRDP lists among others:
>>>> alpn, ensiconfig, uri template, user
>>>> display, auth_domain, filtering,
>>>> ip_subnet, dnssec, ....
>>>>
>>>> My understanding is that BCP 17 saw SRV
>>>> as a long term solution for CNAME which
>>>> is now superseded by HTTPSVC/SVCB. I see
>>>> SRV as very common in home networks with
>>>> service discovery.
>>>>
>>>> I believe that using a generic is
>>>> problematic as is prevents its resoltion
>>>> to be secured with DNSSEC.
>>>>
>>>
>>> As I said earlier, this goes back to threat model. Please describe the
>>> thrat model where you think DNSSEC helps.
>>>
>>
>> The threat model seems for Comcast and the end user having the traffic of
>> its end users being redirected to Cloudflare instead of the local resolver.
>> Both resolvers are trusted according to Firefox but the end user and the
>> ISP may have a different view. It also means that any information that is
>> not preconfigured cannot be trusted.
>>
>
> Well, I agree that this attack is possible (and is described in S 4) but I
> don't see how DNSSEC prevents it. It's true that if the user is on a
> network operated by "example.com" DNSSEC could be used to secure the
> information that "example.com" wants you to use a given resolver, but the
> problem is that the user has no secure way of discovering that they are on "
> example.com", and therefore the attacker can just substitute in their own
> domain there.
>
If the lookup takes as input the IP addresses or something provided by the
ISP (like the local resolver IP address), the resulting chain is likely to
be from the ISP. DNSSEC is needed to assert it. Another way would be to be
able to display example.com. The user should be able to see how the domain
is associated to the ISP it has subscribed to or if it is being redirected
to a cloud provider.  DNSSEC would make sur the corresponding IP address -
as well as other information - are bound to the displayed domain.

>
> I could of course be wrong about this. If you believe I am, I would
> encourage you to describe the entire discovery chain and where you believe
> DNSSEC acts to prevent attack.
>
> -Ekr
>
>

-- 
Daniel Migault
Ericsson