Re: [dbound] [EXTERNAL] Re: RDBD 01 Comments

"John R Levine" <johnl@taugh.com> Fri, 22 March 2019 15:35 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dbound@ietfa.amsl.com
Delivered-To: dbound@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C65BD13103C for <dbound@ietfa.amsl.com>; Fri, 22 Mar 2019 08:35:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=GS4UYObk; dkim=pass (1536-bit key) header.d=taugh.com header.b=m8/Een+/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7gYZWY6mKMoA for <dbound@ietfa.amsl.com>; Fri, 22 Mar 2019 08:35:37 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A283F130FF4 for <dbound@ietf.org>; Fri, 22 Mar 2019 08:35:37 -0700 (PDT)
Received: (qmail 53430 invoked from network); 22 Mar 2019 15:35:33 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=d0b4.5c9500c5.k1903; bh=RXc8imgmTC56g5WJhBVViFnzjekL8wDMb4GNzAdMDXM=; b=GS4UYObkbD6woUcaZw5Rj2LU47FtneMY6rJYZhHhjkcdEZAgbg0guFwF/mFpmBPvMEwJ9xYE067Uyr5q5AdwgV+KWb7DDHa7NT4LltAsM8/E3JYe/d42iXLhz5XwgN9eADsgyNqspVaco4I18XQ8ieEsXjFNEXj8c5GWUkH/+cw8MLg95NaLtGwgqtlV7vlzCGlcsRrx6dOlMcezdAWIG9b+nEO5RMLQq+rFGp241v0ak7J3EUgIfRe0cyPnyDtU
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=d0b4.5c9500c5.k1903; bh=RXc8imgmTC56g5WJhBVViFnzjekL8wDMb4GNzAdMDXM=; b=m8/Een+/1za3NhDlNRV9IpG855rVqmI6ipbVTHBc2DJf+soD7iDgNxavFCe5imeK6kntfyR7MvQoo/ukL1ugSIGHrnOuBNe1THMPX6hLypJ2ZpR8NS6e/K0uRuQ6gAP3eLJejk8UL/SbNIFLsBgUnZ3JAbjr7MK7HldbaRaTSOmUW40GAkQXJBaXHhjeNNNtDbtaTlf82hCd2ZGMfAII9KWQrap925obOgc8PXli90EY4rbtFHv58icn5lRllmz9
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.2 ECDHE-RSA AES-256-GCM AEAD) via TCP6; 22 Mar 2019 15:35:33 -0000
Date: Fri, 22 Mar 2019 11:35:32 -0400
Message-ID: <alpine.OSX.2.21.1903221131060.86205@ary.qy>
From: John R Levine <johnl@taugh.com>
To: "Brotman, Alexander" <Alexander_Brotman@comcast.com>
Cc: "dbound@ietf.org" <dbound@ietf.org>
In-Reply-To: <69eefc3fb8244b529ba9dcfea6c01489@COPDCEX19.cable.comcast.com>
References: <ac159edaa05641ffa59e7358209ea0a4@COPDCEX19.cable.comcast.com> <20190320180341.9885A20104BD45@ary.qy> <69eefc3fb8244b529ba9dcfea6c01489@COPDCEX19.cable.comcast.com>
User-Agent: Alpine 2.21 (OSX 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dbound/gOSa6Yqd9KmNyGF0-3Lqnymn08Y>
Subject: Re: [dbound] [EXTERNAL] Re: RDBD 01 Comments
X-BeenThere: dbound@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DNS tree bounds <dbound.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dbound>, <mailto:dbound-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dbound/>
List-Post: <mailto:dbound@ietf.org>
List-Help: <mailto:dbound-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dbound>, <mailto:dbound-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Mar 2019 15:35:40 -0000

> The original intent was a providing a bit more of a hurdle to falsifying 
> responses.  I didn't think we could realistically rely on DNSSEC as a 
> requirement (I'm imagining a situation where we have DNSSEC, and someone 
> goes off to Route53 to host a domain where DNSSEC is not supported last 
> I knew), so was hoping this would provide a bit more of a loose 
> assurance that this relationship is intentional.

I still don't get it.  If you're the primary and you have DNSSEC, you can 
with great security publish pointers to all of the secondaries, no extra 
crypto required.  If you're a primary and you don't have DNSSEC, a bad guy 
can with some effort fake a key record and you lose anyway.  Faking a 
primary->secondary pointer or faking a key record are equally hard or 
easy.

Perhaps it would be helpful to make a chart for situations where the 
primary or secondary are and aren't signed, and are and aren't attacked 
and see which (if any) boxes have interesting different outcomes.

R's,
John

>> -----Original Message-----
>> From: John Levine <johnl@taugh.com>
>> Sent: Wednesday, March 20, 2019 2:04 PM
>> To: dbound@ietf.org
>> Cc: Brotman, Alexander <Alexander_Brotman@cable.comcast.com>
>> Subject: [EXTERNAL] Re: [dbound] RDBD 01 Comments
>>
>> In article
>> <ac159edaa05641ffa59e7358209ea0a4@COPDCEX19.cable.comcast.com> you
>> write:
>>> Hello folks,
>>>
>>> Stephen and I are still looking for additional comments on the newer
>>> revision of RDBD [1].  We'd really like to work with everyone to move
>>> this forward if possible.  Additionally, he and I should both be in Prague next
>> week if you'd like to have some in-person discussions.
>>>
>>> Thank you for your time
>>>
>>> [1] https://tools.ietf.org/html/draft-brotman-rdbd-01
>>
>> Hm.  I see that instead of DKIM-like signatures, now it's DNSSEC-like
>> signatures.
>>
>> But I still have the same question: what advantage does all of this crypto stuff
>> provide compared to a much simpler design where the two domains just
>> have records that point at each other, like a cut down version of Andrew's
>> SOPA?
>>
>> One difference is that you can't tell by looking at the primary/relating domain
>> what its secondary/related domains are.  I can't tell if that's a bug or a
>> feature.
>

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly