Re: [CDNi] Jon's commet on draft-ietf-cdni-redirection

"Peterson, Jon" <jon.peterson@neustar.biz> Fri, 16 October 2015 16:06 UTC

Return-Path: <jon.peterson@neustar.biz>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B82311B331F for <cdni@ietfa.amsl.com>; Fri, 16 Oct 2015 09:06:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.667
X-Spam-Level:
X-Spam-Status: No, score=-101.667 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hwW24Y-2Egx3 for <cdni@ietfa.amsl.com>; Fri, 16 Oct 2015 09:06:31 -0700 (PDT)
Received: from mx0b-0018ba01.pphosted.com (mx0a-0018ba01.pphosted.com [67.231.149.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98B851B330A for <cdni@ietf.org>; Fri, 16 Oct 2015 09:06:31 -0700 (PDT)
Received: from pps.filterd (m0078666.ppops.net [127.0.0.1]) by mx0a-0018ba01.pphosted.com (8.15.0.59/8.15.0.59) with SMTP id t9GG3bWb018126; Fri, 16 Oct 2015 12:06:29 -0400
Received: from stntexhc12.cis.neustar.com ([156.154.17.216]) by mx0a-0018ba01.pphosted.com with ESMTP id 1xjss2ru7p-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Fri, 16 Oct 2015 12:06:29 -0400
Received: from STNTEXMB10.cis.neustar.com ([169.254.5.189]) by stntexhc12.cis.neustar.com ([::1]) with mapi id 14.03.0158.001; Fri, 16 Oct 2015 12:06:27 -0400
From: "Peterson, Jon" <jon.peterson@neustar.biz>
To: Ben Niven-Jenkins <ben@niven-jenkins.co.uk>
Thread-Topic: [CDNi] Jon's commet on draft-ietf-cdni-redirection
Thread-Index: AQHRB0Sd6BAt8jKfVkKtIgZAGUcIrZ5tCBuAgAD6vYCAABV5AA==
Date: Fri, 16 Oct 2015 16:06:27 +0000
Message-ID: <D246687E.164DFF%jon.peterson@neustar.biz>
References: <73F3A4F6-FC5D-4BC8-BEEC-82F27BA3641F@tno.nl> <102272CE-9EF0-4959-B9E2-8A2F10147BF7@cisco.com> <853CC284-D147-4A1F-8C47-213775F47768@cisco.com> <D24513A6.162A5C%jon.peterson@neustar.biz> <437C224B-1C0E-4705-8D52-98E139DDD75E@niven-jenkins.co.uk>
In-Reply-To: <437C224B-1C0E-4705-8D52-98E139DDD75E@niven-jenkins.co.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.9.150325
x-originating-ip: [192.168.128.89]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <7432CD60B81FF3448CE9B9C1EE5B10E8@neustar.biz>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.14.151, 1.0.33, 0.0.0000 definitions=2015-10-16_11:2015-10-15,2015-10-16,1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 kscore.is_bulkscore=0 kscore.compositescore=1 compositescore=0.9 suspectscore=0 phishscore=0 bulkscore=0 kscore.is_spamscore=0 rbsscore=0.9 spamscore=0 urlsuspectscore=0.9 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1508030000 definitions=main-1510160284
Archived-At: <http://mailarchive.ietf.org/arch/msg/cdni/4zD4euV1dblboqz9ifobBcmRnUM>
Cc: "cdni@ietf.org" <cdni@ietf.org>
Subject: Re: [CDNi] Jon's commet on draft-ietf-cdni-redirection
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Oct 2015 16:06:33 -0000

>How DNS redirection works is that the User Agent does a resolution for
>foo.example and it gets a response for foo.example. The fact a CNAME is
>present & resolved by the DNS resolver is invisible to the User Agent
>(evidenced by the fact the URL bar in the browser doesn¹t change domain
>name/hostname when DNS redirection is performed).

It is certainly invisible to the browser when every dCDN holds the private
key of every uCDN that might redirect to it, as you stipulate below. If
that is an operational requirement of the DNS redirection mechanism in
cdni-redirection, it needs to be made explicit. The proposed text just
says that "any surrogate or request router to which the User Agent is
redirected needs to be able to successfully complete the TLS handshake"
etc., which could be read to imply that as a solution, but not if you
don't understand what the problem is in the first place. I was asking that
this acknowledge the problem, not specify a solution.

Moreover, the substance of my comment was that the problem is different
for DNS redirection than it is for HTTPS redirection. HTTPS redirection
shouldn't require every dCDN to have every uCDNs private keying material.
The proposed text treats this like the two methods have the same
properties.

> Therefore as long as the IP address(es) in the DNS response presents the
>correct certificate for foo.example and has the correct credentials (e.g.
>Private key for foo.example) to complete the TLS handshake &
>encrypt/decrypt traffic on that TLS session the User Agent will not
>complain. This is how DNS-based HTTPS redirection is done in CDNs today
>where typically a CSP will provide their certificate & private key to the
>CDN so the CDN can terminate TLS sessions successfully on the CSP¹s
>behalf. which means if HTTPS redirection is insecure for CDNI then HTTPS
>redirection used by CDNs in the wild today (without CDNI) is also
>insecure (which it isn¹t).

Identifying a known workaround does not mean there isn't a problem. That
there is a workaround is proof there is a problem.

>IMO I think the real problem is a different thing that
>draft-slovetskiy-cdni-https-delegation-approaches hints at without
>stating explicitly. That is how far will a CSP trust delegating its
>credentials (e.g. Private key) given that the consequences of leakage of
>those credentials are very bad. There are possible solutions to avoid the
>CSP having to distribute their credentials (e.g. Keyless SSL) but from
>the perspective of the redirection draft they¹re out of scope IMO.

The fact that there are two drafts trying to improve the workaround does
not convince me that the problem isn't worth noting.

Jon Peterson
Neustar, Inc.