Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Fri, 04 May 2012 14:44 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E176921F87BC for <dane@ietfa.amsl.com>; Fri, 4 May 2012 07:44:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.631
X-Spam-Level:
X-Spam-Status: No, score=-2.631 tagged_above=-999 required=5 tests=[AWL=-0.032, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lc4kbxbfMG3r for <dane@ietfa.amsl.com>; Fri, 4 May 2012 07:44:30 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 2877C21F87B5 for <dane@ietf.org>; Fri, 4 May 2012 07:44:30 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 354871ECB41C for <dane@ietf.org>; Fri, 4 May 2012 14:44:29 +0000 (UTC)
Date: Fri, 4 May 2012 10:44:26 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120504144426.GD4929@mail.yitter.info>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <0526D60A-3F1B-4C55-9796-256BC2556AAB@vpnc.org> <20120503223745.GC1804@mail.yitter.info> <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com> <20120504021044.GB4560@mail.yitter.info> <B25C977F-6B4E-458C-879D-A36EDB94DA75@icsi.berkeley.edu> <20120504023602.GA4683@mail.yitter.info> <CABcZeBO93n_C5detefBcOjAoswe2inGKDj65gQPDQmREyGnhAw@mail.gmail.com> <20120504112922.GB4929@mail.yitter.info> <CABcZeBPTTa07iUHo9XL5WrHGMYHwaQzs6xYtiF25O4Jek8E3RQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABcZeBPTTa07iUHo9XL5WrHGMYHwaQzs6xYtiF25O4Jek8E3RQ@mail.gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 14:44:31 -0000

On Fri, May 04, 2012 at 06:48:20AM -0700, Eric Rescorla wrote:
> On Fri, May 4, 2012 at 4:29 AM, Andrew Sullivan <ajs@anvilwalrusden.com> wrote:
> >
> >    1.  The attacker is able to undermine some CA.
> >
> >    2.  The attacker is actually on-path and going to undermine my
> >    connection.
> 
> I'm confused by this answer: DANE (for the two constraints modes)
> only offers security value if *both* of these things are true. If the
> first is not true, then a PKIX certificate is sufficient to distinguish
> between valid users and attackers and in the second is not true,
> then even an attacker with an invalid certificate cannot get
> your packts.

Yes, of course.

Your proposal is that, if I have a TLSA-enabled client, I
automatically lose TLS support _for anything_ in the event I'm in a
network with poor DNS support.  I was trying to argue that there is
another sensible alternative: I could make a decision to allow TLSA
responses not to work in some cases, because I think it is more likely
that the network is broken than that (1) and (2) are both true.  But
I might in general not trust CAs, and think that (1) is more likely
that (2) most of the time, and therefore normally want to prefer
TLSA.  Therefore, I ought to be able to decide to proceed in the face
of the failure to get a TLSA record at all.

Perhaps one would argue, however, that this amounts to saying, "I need
to be able to turn TLSA off."  I could live with that.

I am still opposed to anything that says we have to treat some
reponses that are not DNSSEC-bogus "as bogus", because I think it
muddies the DNSSEC evaluation waters even more than they already are.
Could we come up with another way of saying this?  How about this:

    In the event that all DNS queries for the TLSA record time out, or
    return with RCODE 1 or RCODE 4-15, TLS MUST NOT be started or,
    if the TLS negotiation is already in progress, MUST cause the
    connection to be aborted.  Under these conditions, a user agent
    MUST disable TLSA queries in order to undertage a TLS connection.

Note that this does _not_ cause the connection to fail under the case
we usually call "NODATA".  The case I mentioned yesterday, where AD is
set and the upstream doesn't give you the DNSSEC data and you have a
NODATA response is, AFAICT, just a case where there is no TLSA RRset
and shouldn't result in TLS failure.  FWIW, I think the above is
probaby too strong, but as long as we have something expicitly telling
people that, if they thing DNS is broken where they are they need to
turn of TLSA processing (i.e. a clue to implementers that they need
this knob), I can live with it.

> Again, this is logical, but as far as I can tell it obviates the security
> provided by DANE. I'd like to repeat the question I asked in my
> previous message: can you describe a set of attacker capabilities
> which would be sufficient for an attacker to mount a successful
> attack on TLS pre-DANE but would not post-DANE, provided
> that clients react to TLSA non-response by falling back to pre-DANE
> behavior?

No, and I never thought that was the point of TLSA.  I thought the
point of TLSA was to enable people to use TLS, provably securely
but without the X.509 PKI infrastructure, if they wanted to.
Usability enhancements are security improvements too, IMO.

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com