Re: [dane] Behavior in the face of no answer?

Eric Rescorla <ekr@rtfm.com> Fri, 04 May 2012 03:19 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3725711E8073 for <dane@ietfa.amsl.com>; Thu, 3 May 2012 20:19:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.858
X-Spam-Level:
X-Spam-Status: No, score=-102.858 tagged_above=-999 required=5 tests=[AWL=0.119, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GkocKtTMox9L for <dane@ietfa.amsl.com>; Thu, 3 May 2012 20:19:24 -0700 (PDT)
Received: from mail-vx0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id 76CB821F867A for <dane@ietf.org>; Thu, 3 May 2012 20:19:24 -0700 (PDT)
Received: by vcbfo1 with SMTP id fo1so2119293vcb.31 for <dane@ietf.org>; Thu, 03 May 2012 20:19:24 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-originating-ip:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding :x-gm-message-state; bh=SqKSzJOIahZOAOgLT1S/9FHVdmQL+VjaPlnlG5+O68E=; b=VBtz3qZKfrmLItv6QGLrMw0sNuEe6Un1vLPatckd6SorWgFbOVXHqK03KzZfjJDIn3 v6VbqzCDikBFk7BT8r6Vr0ABvnXomwyRvFiBzfpIOlKW3YjtvJ/z+eNsT6GFm+Z1se// EWUflKi8Hn9Za/TdtcRXq1SQYPXhCaJhSd1v9L5BMm1ScF/K+QgDMNW/lo0LbXZl+rl+ RIJfTeTZI75g+0c99QmBm9TnJoRX08pCym6YoI3GdofRkojGCRYpkihZcSOujpXu3fa9 WfHqGB+pG7FOi/run4z4oGDF7Nv2lVDYg7N8bQoQBZX34kCE3OtwZjW93hEazElHKPPu zcEw==
Received: by 10.52.70.209 with SMTP id o17mr258145vdu.11.1336101563986; Thu, 03 May 2012 20:19:23 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.52.19.233 with HTTP; Thu, 3 May 2012 20:18:41 -0700 (PDT)
X-Originating-IP: [74.95.2.169]
In-Reply-To: <20120504023602.GA4683@mail.yitter.info>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <0526D60A-3F1B-4C55-9796-256BC2556AAB@vpnc.org> <20120503223745.GC1804@mail.yitter.info> <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com> <20120504021044.GB4560@mail.yitter.info> <B25C977F-6B4E-458C-879D-A36EDB94DA75@icsi.berkeley.edu> <20120504023602.GA4683@mail.yitter.info>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 3 May 2012 20:18:41 -0700
Message-ID: <CABcZeBO93n_C5detefBcOjAoswe2inGKDj65gQPDQmREyGnhAw@mail.gmail.com>
To: Andrew Sullivan <ajs@anvilwalrusden.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Gm-Message-State: ALoCoQmffuorQuA2tJBGxRL5Oh/9aLuAWBPuHUcl3V0TsUL8YmKPJgKwlhiB3z+lvecUu4b+9gtR
Cc: dane@ietf.org
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 03:19:25 -0000

On Thu, May 3, 2012 at 7:36 PM, Andrew Sullivan <ajs@anvilwalrusden.com> wrote:
> On Thu, May 03, 2012 at 07:14:33PM -0700, Nicholas Weaver wrote:
>>
>> An IN-path adversary doesn't need to manipulate the A or AAAA records to get you to connect to their server.
>>
>
> Ah, ok, so we're talking about someone who can both intercept and
> redirect your connection to a target address and block DNS responses
> from getting to you but who cannot re-engineer DNS responses for you
> (obviously, because it'd fail at the root trust anchor).  Ok, now I
> get it.

Yes, this seems like the only threat model of real concern here,
since if you are dealing with an attacker who cannot do this,
then there is no need to authenticate their cryptographic keys
at all: you can just use unauthenticated DH (or RSA) key
exchange.



>> Since the adversaries of concern are likely to be in-path, not just
>> on-path, this is a serious concern and DANE when it can't get the
>> record it MUST hard fail lest it be useless in the face on an
>> in-path attacker, which is critical since the goal of all this
>> cryptomagic is to deal with in-path attackers.
>
> Surely this is a matter of local policy?  That is, it's probably a
> pretty good idea if it fails, and if you know what you are doing you
> probably want to say "fail if I can't get a TLSA response at all"; but
> during deployment and roll-out (as someone already argued up-thread)
> this is simply an unrealistic requirement: people are going to be
> behind broken devices for some years now, and a protocol-required hard
> fail requirement will either be ignored or else will delay deployment
> until we complete upgrading the Internet.  I suggest while we are
> waiting for that, we might want to work on DNS2 and TLS2.  If that's
> not enough, I'm sure we can find some more windmills.  Alternatively,
> we could just let people fall back to the infrastructure we have.
>
> Note that there remain _plenty_ of DNS servers deployed in the wild
> which, if you ask them for an RRTYPE they don't know about, spit up
> with NOTIMP, SERVFAIL, and all manner of other crappy nonsense.  (We
> were just having a bunfight about that over in SPFBIS a month or two
> ago.)  Turning off TLS for anyone whose client knows about TLSA, but
> who is trying to go to a service offered by someone employing a broken
> DNS server like this, is not reasonable.
>
> Speaking as an operator, I can tell you that if the protocol says
> "hard fail if I don't get a TLSA answer", I will tell all my customers
> not to use TLSA; the alternative is to make my customers mad at me the
> day someone's connection from some crappy hotel network fails.  I'd
> hate to be put in that position.

While I understand that these operational constraints, I'm having
trouble understanding what security benefit DANE offers if one behaves
as you suggest, since it seems the attacker can simply force you to
ignore any records that DANE provides.

Perhaps it would be useful to go back to first principles and ask
about the threat model. Can you describe a set of capabilities which
would allow successful attack on TLS in the current environment
but would not allow attack with DANE if TLSA nonresponse
for signed domains is treated as if there are verifiably no TLSA
records?

Thanks,
-Ekr