Re: [Asrg] DNSSEC is NOT secure end to end

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> Mon, 08 June 2009 23:55 UTC

Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: asrg@core3.amsl.com
Delivered-To: asrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5B19B3A6991 for <asrg@core3.amsl.com>; Mon, 8 Jun 2009 16:55:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.76
X-Spam-Level: *
X-Spam-Status: No, score=1.76 tagged_above=-999 required=5 tests=[AWL=0.207, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_NJABL_PROXY=1.643]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NUa4-y1N5ijc for <asrg@core3.amsl.com>; Mon, 8 Jun 2009 16:55:30 -0700 (PDT)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by core3.amsl.com (Postfix) with SMTP id D2BEA3A6820 for <asrg@irtf.org>; Mon, 8 Jun 2009 16:55:29 -0700 (PDT)
Received: (qmail 98066 invoked from network); 9 Jun 2009 01:27:46 -0000
Received: from softbank219001188006.bbtec.net (HELO necom830.hpcl.titech.ac.jp) (219.1.188.6) by necom830.hpcl.titech.ac.jp with SMTP; 9 Jun 2009 01:27:46 -0000
Message-ID: <4A2DA4C8.2000304@necom830.hpcl.titech.ac.jp>
Date: Tue, 09 Jun 2009 08:54:48 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ja-JP; rv:1.4) Gecko/20030624 Netscape/7.1 (ax)
X-Accept-Language: ja, en
MIME-Version: 1.0
To: David Wilson <David.Wilson@isode.com>
References: <200905302032.n4UKVxaZ048822@givry.fdupont.fr> <4A21C0CB.8070409@necom830.hpcl.titech.ac.jp> <8EFB68EAE061884A8517F2A755E8B60A1EF83F8661@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com> <4A252B54.6020508@necom830.hpcl.titech.ac.jp> <1244061519.2778.62.camel@bravo.isode.net> <4A29EC02.6000807@necom830.hpcl.titech.ac.jp> <1244490849.2822.21.camel@bravo.isode.net>
In-Reply-To: <1244490849.2822.21.camel@bravo.isode.net>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Cc: Anti-Spam Research Group - IRTF <asrg@irtf.org>, "ietf@ietf.org" <ietf@ietf.org>
Subject: Re: [Asrg] DNSSEC is NOT secure end to end
X-BeenThere: asrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
List-Id: Anti-Spam Research Group - IRTF <asrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/asrg>
List-Post: <mailto:asrg@irtf.org>
List-Help: <mailto:asrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jun 2009 23:55:31 -0000

David Wilson wrote:

>>According to the terminology of David Clark, PKI including DNSSEC
>>is not secure end to end.

> DNSSEC provides two things. Firstly, it provides the means to digitally
> sign RRsets. This provides data origin authentication and data
> integrity.

The provision is through hops of certificate authorities, which
is what is discussed in latter paper of David Clark published in
2001. Read it.

> As this operates at the DNS application layer, this is
> clearly "end to end" within David Clark's terminology. It does not rely
> on any security services in the lower communication layers (in the way
> that, for instance, relying on TCP would).

If you read the paper, you can find the lower layer of PKI consists
of communication with or between certificate authorities.

Compromising a certificate authority in the lower communication
layer breaks the security of data origin authentication and data
integrity.

> This origin authentication and integrity is precisely what is required
> to avoid the DNS cache poisoning which is the kind of vulnerability
> which prompted this discussion.

As has been discussed in the thread, DNSSEC is NOT a protection
against cache poisoning, because caches poisoned with forged
certificate breaks the security.

> This aspect of DNSSEC does not require the use of any PKI.

Read the 2001 paper on why PKI not end to end and why DNSSEC no
exception. The paper explains why scale breaks the end to end
property.

> I get the impression from you that DNSSEC is to be disregarded because
> it is not "end to end".

Being "end to end" has practical advantages.

See above on how useless DNSSEC is to avoid cache poisoning, which
was the motivation to deploy it.

						Masataka Ohta