Re: [Add] data integrity and DNSSEC or DoH/DoT

Paul Wouters <paul@nohats.ca> Tue, 03 September 2019 17:04 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CAD312006F for <add@ietfa.amsl.com>; Tue, 3 Sep 2019 10:04:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level:
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mJ0Zdr76zeGV for <add@ietfa.amsl.com>; Tue, 3 Sep 2019 10:04:10 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03FE5120045 for <add@ietf.org>; Tue, 3 Sep 2019 10:04:10 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 46NCwR5Xzmzcx; Tue, 3 Sep 2019 19:04:07 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1567530247; bh=u3NZ9iunqpEVRvBJwTwVT22aNedqrXq8x5mSt6GOHJw=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=Mx5w8NZFiBFA941Zrs+cASn6IoaDQDxbBzLFi0l+y/LvYcBj3krX1flumzHdsXHsk 2bqKBwuyjknZUQnbuLFvnorpfywB++DblpVOKLKZze75nwpbNfaUQglUs4lzfVC5nZ QFARKjPhbqXGwLczK2zGNmnuIjMv/DPijHQk+Rpc=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id ynnRJWJdEPfF; Tue, 3 Sep 2019 19:04:05 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 3 Sep 2019 19:04:04 +0200 (CEST)
Received: from [192.168.1.110] (104-195-254-115.cpe.teksavvy.com [104.195.254.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bofh.nohats.ca (Postfix) with ESMTPSA id 4A22B3159DC; Tue, 3 Sep 2019 13:04:03 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 bofh.nohats.ca 4A22B3159DC
Content-Type: multipart/alternative; boundary="Apple-Mail-8E06E9EB-98CA-45DE-BEA5-99D7FF7C4D61"
Mime-Version: 1.0 (1.0)
From: Paul Wouters <paul@nohats.ca>
X-Mailer: iPhone Mail (16G102)
In-Reply-To: <06613304-C325-4BA4-AB6F-32D79DFCECA0@open-xchange.com>
Date: Tue, 03 Sep 2019 13:04:01 -0400
Cc: Eric Rescorla <ekr@rtfm.com>, Jim Reid <jim@rfc1035.com>, ADD Mailing list <add@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <7CE383E7-C55E-47E3-AD9E-02FED497EEA4@nohats.ca>
References: <A1128702-1E19-4657-9740-E84AE09992F2@piuha.net> <CABcZeBMfOTjq-8hDDoKMtJvfHUA5nC8o60zuk-2Xe-ZhfwriJQ@mail.gmail.com> <766112E1-F532-4C6B-8CA8-A096671E02EE@piuha.net> <CA+9kkMAfuOwJu8_qJTuhAY4mUwR+tVUxr+k3QFHBk3byV672Ow@mail.gmail.com> <A7EA862E-8E80-40E3-834D-E628988C0A24@virtualized.org> <CAFWeb9KT=2JL0oHUgJ2WMcduR3na+hP2QncvRR4YurmqsAWxTA@mail.gmail.com> <59E0EC53-0E30-431C-8376-52C7BFC121A8@virtualized.org> <CAFWeb9+Z7RmXEr46qx5PaUcxh2R3+HXhrZeW-8QEMX4HLt7a-w@mail.gmail.com> <589DAFCB-1BDC-4156-A2CA-179C4559A6B2@virtualized.org> <cf2152d7-8618-7ad2-b8f9-7a259ab5df19@cs.tcd.ie> <683A176C-3CE6-4866-A736-F2A7465FA5B5@rfc1035.com> <CABcZeBPmWYBKcKhjTUBLw62xJT=OXbp3v6MZ+8Gtr=gFmQ-g6A@mail.gmail.com> <E40CC478-BBA1-4DA9-8F6A-FE1782E0F27E@rfc1035.com> <CABcZeBMnG_HJHYrGpQD1LWWNi8zuhAm=0Uy2HNRRmhYS9PsCtg@mail.gmail.com> <06613304-C325-4BA4-AB6F-32D79DFCECA0@open-xchange.com>
To: Neil Cook <neil.cook=40open-xchange.com@dmarc.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/r6Hrx8TwTCCoB5D0nc_EPS-wkzA>
X-Mailman-Approved-At: Wed, 04 Sep 2019 09:05:34 -0700
Subject: Re: [Add] data integrity and DNSSEC or DoH/DoT
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Sep 2019 17:04:14 -0000

That’s why you move the censored Answer Section: data to the Authoritative Section.

Paul

Sent from mobile device

> On Sep 3, 2019, at 09:15, Neil Cook <neil.cook=40open-xchange.com@dmarc.ietf.org> wrote:
> 
> 
> 
>> On 23 Aug 2019, at 06:39, Eric Rescorla <ekr@rtfm.com> wrote:
>> 
>> 
>> 
>> On Thu, Aug 22, 2019 at 1:41 PM Jim Reid <jim@rfc1035.com> wrote:
>>> 
>>> 
>>> > On 22 Aug 2019, at 08:00, Eric Rescorla <ekr@rtfm.com> wrote:
>>> > 
>>> > Suppose that I receive a bogus response to my A record query, how am I to usefully distinguish "this is malware blocking" from "this resolver is malicious”?
> 
> ...
> 
>>> To be slightly less glib, the dnsop WG has an I-D on extended error codes. [And FWIW lack of a discrete error code(s) for validation failure is one of the things I think DNSSEC got wrong.] draft-ietf-dnsop-extended-error already goes some way to answering your question:
>>> 
>>> 4.16.  Extended DNS Error Code 15 - Blocked
>>> 
>>>    The resolver attempted to perfom a DNS query but the domain is
>>>    blacklisted due to a security policy implemented on the server being
>>>    directly talked to.
>>> 
>>> 4.17.  Extended DNS Error Code 16 - Censored
>>> 
>>>    The resolver attempted to perfom a DNS query but the domain was
>>>    blacklisted by a security policy imposed upon the server being talked
>>>    to.  Note that how the imposed policy is applied is irrelevant (in-
>>>    band DNS somehow, court order, etc).
>>> 
>>> 4.18.  Extended DNS Error Code 17 - Prohibited
>>> 
>>>    An authoritative or recursive resolver that receives a query from an
>>>    "unauthorized" client can annotate its REFUSED message with this
>>>    code.  Examples of "unauthorized" clients are recursive queries from
>>>    IP addresses outside the network, blacklisted IP addresses, local
>>>    policy, etc.
>>> 
>>> I suppose draft-ietf-dnsop-extended-error could add another error code for the specific case of a malicious resolver. Whatever that might mean. Though I doubt the operators of such servers will choose to set that evil bit on their responses.
>>> 
>>> PS A potential problem with this I-D is these extended error codes won’t be signed. So they can be spoofed by bad actors.
>> 
> 
> I don’t see why malicious resolvers would tell clients they are returning bogus results. 
> 
>> Yes, and for this reason I don't see how this solves the problem. It's just "resolver blocked it and claims reason X".
>> 
> 
> It’s not entirely  useless. The problem it does solve is giving the user a better experience when a site is blocked for resolvers that support this extended Error Code. Currently for HTTPS the user will end up with a TLS connection error of some kind (or a blank page in some browsers). If a resolver returns a “blocked/censored/prohibited” response, then the browser can tell the user that the web page was blocked with an informative message. Assuming this becomes the default behaviour for non-malicious resolvers then I think it will a good signal for distinguishing  "this is malware blocking" from "this resolver is malicious”.
> 
> 
> Neil Cook
> neil.cook@open-xchange.com
> 
> -------------------------------------------------------------------------------------
> Open-Xchange AG, Rollnerstr. 14, 90408 Nuremberg, District Court Nuremberg HRB 24738
> Managing Board: Rafael Laguna de la Vera, Carsten Dirks, Michael Knapstein, Stephan Martin 
> Chairman of the Board: Richard Seibt
> 
> European Office: 
> Open-Xchange GmbH, Olper Huette 5f, D-57462 Olpe, Germany, District Court Siegen, HRB 8718 
> Managing Director: Frank Hoberg
> 
> US Office: 
> Open-Xchange. Inc., 530 Lytton Avenue, Palo Alto, CA 94301, USA 
> -------------------------------------------------------------------------------------
> 
> -- 
> Add mailing list
> Add@ietf.org
> https://www.ietf.org/mailman/listinfo/add