Re: [Add] [EXTERNAL] Re: Authentication Sub-topics for Tuesday Interim (homework for Tuesday's meeting)

Tommy Jensen <Jensen.Thomas@microsoft.com> Tue, 15 September 2020 18:03 UTC

Return-Path: <Jensen.Thomas@microsoft.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4DE93A1608 for <add@ietfa.amsl.com>; Tue, 15 Sep 2020 11:03:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.794
X-Spam-Level:
X-Spam-Status: No, score=-3.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.695, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hLDh9MmYLIER for <add@ietfa.amsl.com>; Tue, 15 Sep 2020 11:03:49 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650090.outbound.protection.outlook.com [40.107.65.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0C393A1605 for <add@ietf.org>; Tue, 15 Sep 2020 11:03:48 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Iz50UNuYKgC64vYdYGUPM11TSNpddewXUqd7HKBEJM/s2cMKtYoQPAu824ODfCrAVfpgTPuQseXJyi6qyU9oFXraHuBTVE8YiV95OEj0zPt0MmiCuutZU8DEPy1vrYFB6DAf1UJrTksnCyknNYJ6zRBnvKZo6TtjQm/oCRel1zGkRcjZqe5EWXCB9ht+TbmB+Twz4vUAfINTLRVF4rP5RseT4m2EVD8VXRErljiMGaWg4hftia9TZ5ArkBMXankMJb9XJkq0+KtgvYV81F+bgLs02rTciGLKSOt8pj5e0nVOKKrQ2IFt/ue2Povgoyc6ukRw6xfK4tcfgxL8u4Itpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tI4plh7/kmdE5QlS/DD/UhcoKvfeslpz1W3B/QHKyD8=; b=BfFi++TFjhvQG/poXlhKo/H+Gp1NxhskZAar6iv/c+1fubZgI3JxW8+QTWk+8NdWCKgWPZ/iOw/OIbFyr8+qHp2PzvAHnd5sRVh0aAPor9EQK2n050xoakNt8E6fPwUuFAjsk7ylFP89R/e22DVzPPm6+TnINv2e0Fcnqz106NcnncawpLQjFcbenUy0Yd0Zy/Hs4qy+QEMaqEHjpNYzsC9sYJR6IeN9Tn8DDS6nwb1oJyeuilsbauk3LvEzMWea3HIckZVX3AzlU94A/B9VR09lcna/Q97Tk/yj/V82mNqTQ7RVJ0Ybz4KIjGXk/2J0PvCO7qEfuHBviFD+QL9xXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tI4plh7/kmdE5QlS/DD/UhcoKvfeslpz1W3B/QHKyD8=; b=MSa036aaBf1GwFUM56xJ6anUJsvdIrpTXBHSByqYVnZKCu6c9SuQbelaNfIdBw/jg1C1RVyrD5UnUeta94wx21HvPVbJh2iPhUQ88ZPbhJKQjUMtTXBGmotNQLsVZX7e8KnQhYhRwGeB1OEeRGyTpjofu8nd6DETvRfTpTdgEF8=
Received: from (2603:10b6:610:6c::23) by CH2PR00MB0796.namprd00.prod.outlook.com (2603:10b6:610:6f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3424.0; Tue, 15 Sep 2020 18:03:39 +0000
Received: from CH2PR00MB0778.namprd00.prod.outlook.com ([fe80::64ce:305d:c0f8:98c0]) by CH2PR00MB0778.namprd00.prod.outlook.com ([fe80::64ce:305d:c0f8:98c0%7]) with mapi id 15.20.3429.000; Tue, 15 Sep 2020 18:03:39 +0000
From: Tommy Jensen <Jensen.Thomas@microsoft.com>
To: Vittorio Bertola <vittorio.bertola=40open-xchange.com@dmarc.ietf.org>, Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>, Eric Rescorla <ekr@rtfm.com>
CC: ADD Mailing list <add@ietf.org>, "Deen, Glenn" <Glenn_Deen@comcast.com>
Thread-Topic: [EXTERNAL] Re: [Add] Authentication Sub-topics for Tuesday Interim (homework for Tuesday's meeting)
Thread-Index: AQHWiGyIOTkeORKwEEKNsO+gwa1SOqlnOCgAgAHMRwCAAKZXgIAAMB7M
Date: Tue, 15 Sep 2020 18:03:39 +0000
Message-ID: <BY5PR00MB07731B1505ECFCC3074EF9D0FA201@BY5PR00MB0773.namprd00.prod.outlook.com>
References: <CABcZeBPuq86Fj0VYQ+1j8ZWo+4BT1bDJGfnRmi82oUc8Xns=PQ@mail.gmail.com> <A332081D-69AE-45F8-9E61-6ACA3D071C1E@apple.com>, <1557871922.1625.1600173809868@appsuite-gw2.open-xchange.com>
In-Reply-To: <1557871922.1625.1600173809868@appsuite-gw2.open-xchange.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-09-15T18:03:39.395Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [50.35.64.46]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: ae6224ca-f8dd-46b6-e72a-08d859a1acf5
x-ms-traffictypediagnostic: CH2PR00MB0796:
x-microsoft-antispam-prvs: <CH2PR00MB07964AEE1AA9C3A2938DC89FFA201@CH2PR00MB0796.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: GW7kgUd9q7AGh3uFgfFfXH57b4Ac97wGcSPzePKt9hnbxBmLraKS0s2YqYgM8Ldg03F/kUjwe0g/lC8QkHSRgWl9h7WqNr9jz3gsl/e47tNrHaRBGjk1RwBXu5ZH9tEz9XULXRunENfPoifQYxwabe40RExhScNRgrbA9XrFSRcnqstffO/uDnVTut5V6QaP0B52AJAbxg1WQTfp/AE3V0Z+eqoL1Y1KiYBmRPKUrLy1Xv6UghMQHAT5z4pXa4Mamsez36OO1lLNcMu5XbdPRf6PLa89bysYurG7Y3kiapVre3oVhN6FInEaAk6MC2zYrj52lzYwlfqzUH8NdiHsycxw4S0Rq5JCDyaiAHaJg7pFXWMBF21yWA72cnX1ImF2n3m2UTASkoMpy/GL+q5nrQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR00MB0778.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(366004)(396003)(136003)(346002)(39860400002)(316002)(966005)(6486002)(2906002)(54906003)(33656002)(9686003)(6512007)(110136005)(26005)(478600001)(8990500004)(166002)(82960400001)(6506007)(53546011)(66574015)(86362001)(83380400001)(82950400001)(71200400001)(4326008)(8936002)(76116006)(10290500003)(186003)(5660300002)(8676002)(66946007)(66476007)(66556008)(19627405001)(52536014)(64756008)(66446008); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BY5PR00MB07731B1505ECFCC3074EF9D0FA201BY5PR00MB0773namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR00MB0778.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ae6224ca-f8dd-46b6-e72a-08d859a1acf5
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Sep 2020 18:03:39.7934 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pRnuEw7uW+kmxNR6LQGVC4L79YgV/LAPHRNMKysL6NxjKc4zPSmh9Z/8bxuvr7SidxMHP3t7K72+XqqAdEjzTw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR00MB0796
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/Zx0q-8tf0tWKjg4Tk4LP2rW9wp0>
Subject: Re: [Add] [EXTERNAL] Re: Authentication Sub-topics for Tuesday Interim (homework for Tuesday's meeting)
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Sep 2020 18:03:51 -0000

Hey Vittorio,

To follow up on this and from our conversation on Jabber for the same proposal:

> What would be the security problem if 10.0.0.1 via Do53 received a "resolver discovery" query, forwarded it to the main resolver, received a DNSSEC-signed response, forwarded you the response, and the response included both a DoH URI and a TLSA record that the DoH resolver's certificate has to match?

The problem is there's no name associated with the original Do53 server. The client, in order to trust the DNSSEC claim, needs to know the name being signed in advance. Otherwise, an attacker can intercept and replace the DNSSEC-signed DoH URI and TLSA record with their own DoH server information, correctly DNSSEC signed.

A client in this scenario can't distinguish between valid signed data for "doh.exmaple-isp.com" and "doh.example-attacker.com". Realistically, this will complicate any attempt to validate ownership between a non-public Do53 IP address and a DoH server. Until the network authentication problem is more generally solved, I don't think authenticating local DNS servers is a good use of the WG's time.

Thanks,
Tommy

================================================

The latest in Windows Internet Protocols:

  Native gRPC support: https://aka.ms/grpcblogpost

  DNS over HTTPS: https://aka.ms/dohblogpost

________________________________
From: Add <add-bounces@ietf.org> on behalf of Vittorio Bertola <vittorio.bertola=40open-xchange.com@dmarc.ietf.org>
Sent: Tuesday, September 15, 2020 5:43 AM
To: Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>; Eric Rescorla <ekr@rtfm.com>
Cc: ADD Mailing list <add@ietf.org>; Deen, Glenn <Glenn_Deen@comcast.com>
Subject: [EXTERNAL] Re: [Add] Authentication Sub-topics for Tuesday Interim (homework for Tuesday's meeting)


Il 15/09/2020 04:48 Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org> ha scritto:

What might not be possible, on the other hand, is to usefully authenticate a deployment model where the resolver or forwarder is some private/local address that’s running on a router itself–unless this is a managed network or managed device that has some out of band mechanism to trust or configure resolvers (at which point we don’t need discovery mechanisms). I think the case of trying to find an equivalent and trusted resolver to the one running on 10.0.0.1 on my router ends up being indistinguishable from an attack scenario.
What would be the security problem if 10.0.0.1 via Do53 received a "resolver discovery" query, forwarded it to the main resolver, received a DNSSEC-signed response, forwarded you the response, and the response included both a DoH URI and a TLSA record that the DoH resolver's certificate has to match?
But these scenarios likely aren’t worth solving this way anyhow—if the DoH server isn’t on my router itself, but hosted in the ISP network, the network would do better to provision the address of that ISP server instead of a local address;
It has been explained that this would as a minimum require firmware/configuration upgrades on millions of CPEs, and as a maximum be impossible because CPEs have the forwarding configuration hardwired or are out of support by the manufacturer. Perhaps in 5-10 years, not now.
and if I really have a DoH server running locally, the router would presumably be able to upgrade to be able to provision the DoH information directly in DHCP/RA/PvD.
A DHCP extension to advertise a DoH URI was proposed at an IETF meeting over a year ago. It was rejected as too insecure, but if that assessment changes, of course it could be considered.

--

Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bertola@open-xchange.com<mailto:vittorio.bertola@open-xchange.com>
Office @ Via Treviso 12, 10144 Torino, Italy