Re: [Asrg] DNSSEC is NOT secure end to end

Doug Otis <doug.mtview@gmail.com> Fri, 05 June 2009 03:32 UTC

Return-Path: <doug.mtview@gmail.com>
X-Original-To: asrg@core3.amsl.com
Delivered-To: asrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A7AC53A6975 for <asrg@core3.amsl.com>; Thu, 4 Jun 2009 20:32:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.546
X-Spam-Level:
X-Spam-Status: No, score=-2.546 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AUaMBaD6Jv6u for <asrg@core3.amsl.com>; Thu, 4 Jun 2009 20:32:11 -0700 (PDT)
Received: from mail-pz0-f186.google.com (mail-pz0-f186.google.com [209.85.222.186]) by core3.amsl.com (Postfix) with ESMTP id B1EBB3A67F7 for <asrg@irtf.org>; Thu, 4 Jun 2009 20:32:11 -0700 (PDT)
Received: by pzk16 with SMTP id 16so837334pzk.15 for <asrg@irtf.org>; Thu, 04 Jun 2009 20:32:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:cc:message-id:from:to :in-reply-to:content-type:content-transfer-encoding:mime-version :subject:date:references:x-mailer; bh=QERlvAtt3Lc98xkWHAJvAzPMnbJAF+UfU3Q7BCOAwCM=; b=XSFfovRIIXkAR783FLXbbeJEntF3uuZzJK899ZelHflYMmegAm6Qc1rfdUMCB3SsCS 1LHYFZisVu5lTWi5YVL+G7oc1lB2ZsmIA1bB2GDFpe9oin33KhlcWjkW8cIk4jUmXPG2 0G6jshobSKC4BnkncgBK29A2UCnS5fXVNZtaE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=cc:message-id:from:to:in-reply-to:content-type :content-transfer-encoding:mime-version:subject:date:references :x-mailer; b=VgB37okiZETcsfIEAZxIxMjfr2bmc2F1uOpmbec7qReFlEmHr40caFsM+/fe/QJHAM 41ZeVEMqW0oAA/5mylrh8oPsCNJgXSQSRwcGahoyVpgvTWZpGKsLER43oGaAi5zgcxiU cXuX3eDntf17DfwUN4E33m+mur7U3UfbnzwB4=
Received: by 10.114.58.15 with SMTP id g15mr4542013waa.186.1244172733336; Thu, 04 Jun 2009 20:32:13 -0700 (PDT)
Received: from SJC-Office-NAT-219.mail-abuse.org (SJC-Office-NAT-219.mail-abuse.org [168.61.10.219]) by mx.google.com with ESMTPS id d20sm12032760waa.12.2009.06.04.20.32.12 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 04 Jun 2009 20:32:12 -0700 (PDT)
Message-Id: <96A485DD-13FD-4966-ADC3-17BB00F6DF14@gmail.com>
From: Doug Otis <doug.mtview@gmail.com>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
In-Reply-To: <4A2740E6.3060601@necom830.hpcl.titech.ac.jp>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v935.3)
Date: Thu, 04 Jun 2009 20:32:11 -0700
References: <200905302032.n4UKVxaZ048822@givry.fdupont.fr> <4A21C0CB.8070409@necom830.hpcl.titech.ac.jp> <8EFB68EAE061884A8517F2A755E8B60A1EF83F8661@NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com> <4A252B54.6020508@necom830.hpcl.titech.ac.jp> <20090603075602.GA3945@boreas.isi.edu> <4A2740E6.3060601@necom830.hpcl.titech.ac.jp>
X-Mailer: Apple Mail (2.935.3)
X-Mailman-Approved-At: Fri, 05 Jun 2009 11:31:06 -0700
Cc: Christian Huitema <huitema@windows.microsoft.com>, Francis Dupont <Francis.Dupont@fdupont.fr>, "ietf@ietf.org" <ietf@ietf.org>, Bill Manning <bmanning@ISI.EDU>, Anti-Spam Research Group - IRTF <asrg@irtf.org>
Subject: Re: [Asrg] DNSSEC is NOT secure end to end
X-BeenThere: asrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Anti-Spam Research Group - IRTF <asrg@irtf.org>
List-Id: Anti-Spam Research Group - IRTF <asrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/asrg>
List-Post: <mailto:asrg@irtf.org>
List-Help: <mailto:asrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/asrg>, <mailto:asrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2009 03:32:12 -0000

On Jun 3, 2009, at 8:35 PM, Masataka Ohta wrote:

> The problem is that the accuracy and integrity of DNSSEC is not  
> cryptographically, but socially secure.

DNS over UDP is prone to port/transaction-id guessing,  where  
cryptography could play a protective role.  The risk of these values  
being guessed increases whenever NATs reduce port diversity, or  
operate in a predictable manner.  Protocols such as SPF that embed  
macros into DNS, allow hundreds of transactions to be chained.  The  
entire chain might result from the local-parts of a single email.  
These transactions can target otherwise uninvolved victims or evil  
domains.  When an evil domain is the target of SPF transactions,  
attackers can discover the nature of the resolver.  Afterwords, with  
only one transaction targeting the evil domain, and others targeting  
their victim, the guesswork for injecting poison is reduced, where  
even ACLs offer no protection.  The growing speed of today's Internet  
makes this an ever growing concern.

While DNSSEC might prevent caches from being poisoned, EDNS0 creates  
new concerns also aggravated by SPF.  Since the 512 byte DNS message  
size did not accommodate RSA signatures, EDNS0 is required to adjust  
message limits.  EDNS0 allows bad actors to further leverage DNS  
transactions, such as those that might emanate from cached SPF records  
to initiate more than 20 TXT record transactions when a recipient  
evaluates a single email.  The TXT records might be policy documents  
not intended for machine consumption or wildcard SPF records  
enumerating address authorizations for outbound MTAs.  The flexibility  
sought by SPF has created a sizable list of concerns, where caution  
was often countered with distain for DNS.

It might have been better to have specified limits for EDNS0, such as  
a minimum message size of 1280 and a maximum at 1424, where  
transactions that don't comply are refused.  UDP allows source  
spoofing, which could allow bad actors a means to create packet  
fragmentation by incorrectly setting message.  If addition, when  
fragmentation does occur, DNS transactional-ids offer little  
protection for packet fragments that may contained unsigned  
information.  DNS will need to be become pedantic about confirming  
information, perhaps also enforcing the use of checksums and message  
size.

While DNSSEC may not require channel security at some point when a  
trust anchor can be safely found, DNS over UDP remains a brute.  When  
an SPF process sequence prematurely times out, rather than waiting for  
exponential back-off, SPF simply begins another sequence, ignoring  
congestion avoidance.

SCTP carrying either DNS or DNSEC packets would ensure DNS remains  
tame despite much of the abuse.  Unlike TCP, SCTP does not commit  
resources without return of a cookie, but can start data exchanges  
sooner.  SCTP can carry simultaneous DNS messages and can can keep a  
large number of sparse connections per port active.  Perhaps recursive  
resolvers might be more responsive with SCTP than with UDP.   
Importantly, the source of abusive DNS behavior can be identified and  
thereby avoided.  This is not true for either TCP or UDP.

-Doug