Re: [certid] What DNS-ID if also using a DNS-SRV?

Peter Saint-Andre <stpeter@stpeter.im> Wed, 30 June 2010 18:43 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB1403A68A4 for <certid@core3.amsl.com>; Wed, 30 Jun 2010 11:43:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.491
X-Spam-Level:
X-Spam-Status: No, score=-2.491 tagged_above=-999 required=5 tests=[AWL=0.108, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V7Z7B0qCWGE4 for <certid@core3.amsl.com>; Wed, 30 Jun 2010 11:43:24 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 98B963A67F5 for <certid@ietf.org>; Wed, 30 Jun 2010 11:43:24 -0700 (PDT)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 8470C40E4D; Wed, 30 Jun 2010 12:43:34 -0600 (MDT)
Message-ID: <4C2B9054.40703@stpeter.im>
Date: Wed, 30 Jun 2010 12:43:32 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.9) Gecko/20100317 Thunderbird/3.0.4
MIME-Version: 1.0
To: Shumon Huque <shuque@isc.upenn.edu>
References: <p062408bbc8388055fb6d@[10.20.30.158]> <4C1CABA1.2050205@isode.com> <p0624082bc8427e79bd60@[10.20.30.158]> <4C2A6A72.5000109@stpeter.im> <20100630040935.GA26880@isc.upenn.edu>
In-Reply-To: <20100630040935.GA26880@isc.upenn.edu>
X-Enigmail-Version: 1.0.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000004030804090403050904"
Cc: Richard Barnes <rbarnes@bbn.com>, certid@ietf.org
Subject: Re: [certid] What DNS-ID if also using a DNS-SRV?
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Jun 2010 18:43:25 -0000

Warning: tangent.

On 6/29/10 10:09 PM, Shumon Huque wrote:
> On Tue, Jun 29, 2010 at 03:49:38PM -0600, Peter Saint-Andre wrote:
>
>> It's unfortunate that RFC 4985 glosses over the difference between (1)
>> the use of SRVName extensions to restrict deployment to a particular
>> application type and (2) the use of DNS SRV records to redirect a source
>> domain to a target domain that might be outside the trust boundary of
>> the source domain.
> 
> I'm not sure I see a problem here. So what if the domain name of 
> the SRV owner (LHS) is in a different administrative domain than 
> the domain name in the rdata of the SRV record (RHS)? The TLS certificate
> matching function should only be considering the first one. It
> can't trust the resolved name unless the lookup was authenticated
> anyway (with DNSSEC), or the resolved name was explicitly trusted by
> static local configuration. I assume the use case is hosting
> providers, eg.
> 
>   _imap._tcp.example.com  IN SRV 10 10 143  mail.hostingprovider.com
> 
> All the client needs to do is authenticate the certificate associated 
> with the identity on the left side (eg. SRVName of _imap.example.com 
> or dNSName of example.com etc). mail.hostingprovider would have to be 
> configured with that certificate (with the co-operation of example.com). 
> If the client gets redirected to connect to mail.evil.com by a DNS attack, 
> the client will fail to authenticate the name on the left side (unless 
> the attacker has also stolen the cert and key).

Correct. Here's the rub:

   mail.hostingprovider would have to be configured with that
   certificate (with the co-operation of example.com).

In most cases, the admins of example.com don't want to trust
hostingprovider.com with their private keys, and the admins of
hostingprovider.com don't want the legal liability of holding private
keys for example.com either. In the XMPP community we have been working
on a solution to this problem (see draft-ietf-xmpp-dna), but the problem
applies more generally (IMAP, etc.) and is becoming more urgent with the
spread of hosted applications. Richard Barnes has coined the term "High
Assurance Re-Direction" ("HARD") for this problem. He and I have been
planning to write an I-D that describes this "HARD problem", but it's
becoming increasingly unlikely that we'll meet the I-D cutoff before
Maastricht.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/