Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Fri, 04 May 2012 02:10 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28CBC11E8089 for <dane@ietfa.amsl.com>; Thu, 3 May 2012 19:10:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.634
X-Spam-Level:
X-Spam-Status: No, score=-2.634 tagged_above=-999 required=5 tests=[AWL=-0.035, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oKSsGfBWAcbG for <dane@ietfa.amsl.com>; Thu, 3 May 2012 19:10:47 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 3636911E808D for <dane@ietf.org>; Thu, 3 May 2012 19:10:46 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id E7DA21ECB41C for <dane@ietf.org>; Fri, 4 May 2012 02:10:45 +0000 (UTC)
Date: Thu, 3 May 2012 22:10:44 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120504021044.GB4560@mail.yitter.info>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <0526D60A-3F1B-4C55-9796-256BC2556AAB@vpnc.org> <20120503223745.GC1804@mail.yitter.info> <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <CABcZeBMFV8oiZJfAY1fZ_0bBQWa=q6aBL65AS+W5gBuKmPnwOg@mail.gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 02:10:48 -0000

On Thu, May 03, 2012 at 03:44:57PM -0700, Eric Rescorla wrote:
> 
> Well, I absolutely have a problem.... I'm under active attack :)
> 
> However, if you choose option (a) and hard fail, then all the attacker
> can do is create a failure. However, if you choose option (b) then
> the attacker is able to cause you to connect to his server even
> though the domain operator is trying to serve you a DNSSEC-signed
> DANE record which tells you not to accept that cert (if you
> could only get that record).

No, I think I still don't understand.  Under (b), how can the attacker
get you to connect to "his server"?  The attacker can get you to
connect to some server and foil your attempt to use the TLSA-provided
credential, but how do you go to the wrong server?

You can't get the A or AAAA record if the attacker is fiddling with
the DNS, because that RRset will fail DNSSEC validation in the first
place.  Remember, we're already depending on DNSSEC.  If you _can_ get
the right address, then the problem is that you use the wrong
certificate (i.e. you fall back to the X.509 chain)?  Unless the X.509
chain is somehow subverted, though -- but how is that any more of a
danger than "compromised key in TLSA"?

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com