Re: [CDNi] Jon's commet on draft-ietf-cdni-redirection

Ben Niven-Jenkins <ben@niven-jenkins.co.uk> Wed, 30 December 2015 13:33 UTC

Return-Path: <ben@niven-jenkins.co.uk>
X-Original-To: cdni@ietfa.amsl.com
Delivered-To: cdni@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6434F1ACCEE for <cdni@ietfa.amsl.com>; Wed, 30 Dec 2015 05:33:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.801
X-Spam-Level:
X-Spam-Status: No, score=0.801 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PrSH6k_I4G4x for <cdni@ietfa.amsl.com>; Wed, 30 Dec 2015 05:33:51 -0800 (PST)
Received: from mailex.mailcore.me (mailex.mailcore.me [94.136.40.144]) by ietfa.amsl.com (Postfix) with ESMTP id 5B9361A0019 for <cdni@ietf.org>; Wed, 30 Dec 2015 05:33:51 -0800 (PST)
Received: from dab-ell1-h-74-10.dab.02.net ([82.132.239.239] helo=[10.8.156.89]) by smtp04.mailcore.me with esmtpa (Exim 4.80.1) (envelope-from <ben@niven-jenkins.co.uk>) id 1aEGst-0004MD-9s; Wed, 30 Dec 2015 13:33:50 +0000
Content-Type: multipart/alternative; boundary="Apple-Mail-489BDB28-4CEC-433E-8853-0061F608CA5D"
Mime-Version: 1.0 (1.0)
From: Ben Niven-Jenkins <ben@niven-jenkins.co.uk>
X-Mailer: iPhone Mail (13C75)
In-Reply-To: <A419F67F880AB2468214E154CB8A556206C0E082@eusaamb103.ericsson.se>
Date: Wed, 30 Dec 2015 13:33:40 +0000
Content-Transfer-Encoding: 7bit
Message-Id: <B4738F3D-F9BA-415C-8215-5DE3B8B88095@niven-jenkins.co.uk>
References: <73F3A4F6-FC5D-4BC8-BEEC-82F27BA3641F@tno.nl> <102272CE-9EF0-4959-B9E2-8A2F10147BF7@cisco.com> <853CC284-D147-4A1F-8C47-213775F47768@cisco.com> <D24513A6.162A5C%jon.peterson@neustar.biz> <437C224B-1C0E-4705-8D52-98E139DDD75E@niven-jenkins.co.uk> <D246687E.164DFF%jon.peterson@neustar.biz> <CF0138DC-609E-4A1D-993A-5CC022450CE2@niven-jenkins.co.uk> <D2468554.16520D%jon.peterson@neustar.biz> <46A08C98-7B12-4F98-8826-8E9FE904B83C@niven-jenkins.co.uk> <D247D7A3.168019%jon.peterson@neustar.biz> <EAE2DE25-7D4B-4495-A360-9B2CEEE92B04@niven-jenkins.co.uk> <B76799A9-6DB0-4FD7-A422-43174B0D095F@niven-jenkins.co.uk> <6DF9C32E-A750-4CF6-A613-489225FC5042@cisco.com> <A419F67F880AB2468214E154CB8A556206BEBA0C@eusaamb103.ericsson.se> <D28DAF8A.1753CF%jon.peterson@neustar.biz> <A419F67F880AB2468214E154CB8A556206C0D76E@eusaamb103.ericsson.se> <D28DD340.1754C7%jon.peterson@neustar.biz> <A419F67F880AB2468214E154CB8A556206C0D9C6@eusaamb103.ericsson.se> <F84FB219-2F2A-4276-89CB-36DA36BC2B9B@eric sson.com> <D28DE286.1754D9%jon.peterson@neustar.biz> <A419F67F880AB2468214E154CB8A556206C0DD8A@eusaamb103.ericsson.se> <D28DFCD6.1754F5%jon.peterson@neustar.biz> <A419F67F880AB2468214E154CB8A556206C0E082@eusaamb103.ericsson.se>
To: Kevin Ma J <kevin.j.ma@ericsson.com>
X-Mailcore-Auth: 9600544
X-Mailcore-Domain: 172912
Archived-At: <http://mailarchive.ietf.org/arch/msg/cdni/pKKLedCfsghhaa_SZ3K-Pd0-j44>
Cc: "cdni@ietf.org" <cdni@ietf.org>
Subject: Re: [CDNi] Jon's commet on draft-ietf-cdni-redirection
X-BeenThere: cdni@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This list is to discuss issues associated with the Interconnection of Content Delivery Networks \(CDNs\)" <cdni.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cdni>, <mailto:cdni-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cdni/>
List-Post: <mailto:cdni@ietf.org>
List-Help: <mailto:cdni-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cdni>, <mailto:cdni-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Dec 2015 13:33:54 -0000

Colleagues,

I like Jon's text. We'll include & publish a new version. 

Ben

> On 10 Dec 2015, at 00:54, Kevin Ma J <kevin.j.ma@ericsson.com> wrote:
> 
> Hi Jon,
>  
>   Fair enough.  I'm ok with the text below.  I'm torn between being more explicit about the issues and maybe adding a few SHOULDs/MUSTs, and coming up with the least controversial text; I agree with deferring the discussion to draft-fieau.
>  
> thanx!
>  
> --  Kevin J. Ma
>  
> From: Peterson, Jon [mailto:jon.peterson@neustar.biz] 
> Sent: Wednesday, December 09, 2015 7:09 PM
> To: Kevin Ma J; Francois Le Faucheur (flefauch); Niven-Jenkins Ben
> Cc: cdni@ietf.org
> Subject: Re: [CDNi] Jon's commet on draft-ietf-cdni-redirection
>  
> No, we really cannot say in our specification text that we assume the UA will (or even should) continue despite the presence of security warnings - my email was just being snarky by pointing out that users in fact tend to do that, but that is a bad thing, and it is our job as spec authors to prevent them from being in that position. I think we're shifting the focus here too much to the warnings themselves and not to the problem that is causing the warnings. The problem causing the warnings is that in this HTTPS case, the DNS redirect insecurely directs you to another domain, and that HTTPS should fail when that happens, if the domain does not hold the keying material that the UA expects.
>  
> The proper, long-term way to actually fix this is either to use DNSSEC, or to give up DNS redirection entirely and just use HTTPS. In that case the UA securely learns that it should negotiate TLS with the RT's domain instead of the original domain. But we're not going to tell people they have to do that.
>  
> The immediate solution (i.e. workaround) is "operational mechanisms" that we assume here, but do not detail - that is, the uCDN giving away its private key to all relevant devices in all dCDNs that could conceivably be RTs. All of your partners/competitors can now impersonate you: enjoy! That is why this is just a workaround.
>  
> The mid-term way to address this is the problem space that draft-fieau is trying (I think, anyway) to shape.
>  
> Are we home yet? Here's some proposed edits:
>  
>   In all three of the above cases, either HTTP or HTTPS could be used to connect to the Redirection Target. When HTTPS is used to connect to the uCDN, if the uCDN uses DNS redirection to identify the RT to the User Agent, then the new target domain name may not match the domain in the URL dereferenced to reach the uCDN: without operational precautions, and in the absence of DNSSEC, this can make a legitimate redirection look like a DNS-based attack to a User Agent and trigger false-negative security warnings. When DNS-based redirection with HTTPS is used, this specification assumes that any RT can complete the necessary TLS handshake with the User Agent. Any operational mechanisms this requires, e.g., private key distribution to surrogates and request routers in dCDNs, are outside the scope of this document. Further mechanisms to notify User Agents of trusted redirection are also outside the scope of this document.
>  
> Jon Peterson
> Neustar, Inc.
>