Re: [dane] Behavior in the face of no answer?

Nicholas Weaver <nweaver@icsi.berkeley.edu> Fri, 04 May 2012 02:13 UTC

Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0C9E11E8089 for <dane@ietfa.amsl.com>; Thu, 3 May 2012 19:13:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.984
X-Spam-Level:
X-Spam-Status: No, score=-1.984 tagged_above=-999 required=5 tests=[AWL=0.615, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j0o1eRKilj51 for <dane@ietfa.amsl.com>; Thu, 3 May 2012 19:13:52 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id 271F611E8073 for <dane@ietf.org>; Thu, 3 May 2012 19:13:52 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 035E82C400D; Thu, 3 May 2012 19:13:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id dB3Q6gus+86f; Thu, 3 May 2012 19:13:51 -0700 (PDT)
Received: from [10.0.1.7] (c-76-103-162-14.hsd1.ca.comcast.net [76.103.162.14]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 502F42C4002; Thu, 3 May 2012 19:13:51 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1257)
Content-Type: text/plain; charset=us-ascii
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <20120504021044.GB4560@mail.yitter.info>
Date: Thu, 3 May 2012 19:14:33 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <B25C977F-6B4E-458C-879D-A36EDB94DA75@icsi.berkeley.edu>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <0526D60A-3F1B-4C55-9796-256BC2556AAB@vpnc.org> <20120503223745.GC1804@mail.yitter.info> <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com> <20120504021044.GB4560@mail.yitter.info>
To: Andrew Sullivan <ajs@anvilwalrusden.com>
X-Mailer: Apple Mail (2.1257)
Cc: dane@ietf.org
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 02:13:52 -0000

On May 3, 2012, at 7:10 PM, Andrew Sullivan wrote:

> On Thu, May 03, 2012 at 03:44:57PM -0700, Eric Rescorla wrote:
>> 
>> Well, I absolutely have a problem.... I'm under active attack :)
>> 
>> However, if you choose option (a) and hard fail, then all the attacker
>> can do is create a failure. However, if you choose option (b) then
>> the attacker is able to cause you to connect to his server even
>> though the domain operator is trying to serve you a DNSSEC-signed
>> DANE record which tells you not to accept that cert (if you
>> could only get that record).
> 
> No, I think I still don't understand.  Under (b), how can the attacker
> get you to connect to "his server"?  The attacker can get you to
> connect to some server and foil your attempt to use the TLSA-provided
> credential, but how do you go to the wrong server?
> 
> You can't get the A or AAAA record if the attacker is fiddling with
> the DNS, because that RRset will fail DNSSEC validation in the first
> place.  Remember, we're already depending on DNSSEC.  If you _can_ get
> the right address, then the problem is that you use the wrong
> certificate (i.e. you fall back to the X.509 chain)?  Unless the X.509
> chain is somehow subverted, though -- but how is that any more of a
> danger than "compromised key in TLSA"?

An IN-path adversary doesn't need to manipulate the A or AAAA records to get you to connect to their server.

Since the adversaries of concern are likely to be in-path, not just on-path, this is a serious concern and DANE when it can't get the record it MUST hard fail lest it be useless in the face on an in-path attacker, which is critical since the goal of all this cryptomagic is to deal with in-path attackers.