Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt

Andrew Sullivan <ajs@anvilwalrusden.com> Wed, 20 August 2014 15:55 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 909B41A06FE for <dns-privacy@ietfa.amsl.com>; Wed, 20 Aug 2014 08:55:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.141
X-Spam-Level:
X-Spam-Status: No, score=-0.141 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_INFO=1.448, HOST_MISMATCH_NET=0.311] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MdAdUYEo9t7d for <dns-privacy@ietfa.amsl.com>; Wed, 20 Aug 2014 08:55:25 -0700 (PDT)
Received: from mx1.yitter.info (ow5p.x.rootbsd.net [208.79.81.114]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C47731A06B3 for <dns-privacy@ietf.org>; Wed, 20 Aug 2014 08:55:25 -0700 (PDT)
Received: from mx1.yitter.info (nat-08-mht.dyndns.com [216.146.45.247]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.yitter.info (Postfix) with ESMTPSA id 990808A031 for <dns-privacy@ietf.org>; Wed, 20 Aug 2014 15:55:24 +0000 (UTC)
Date: Wed, 20 Aug 2014 11:55:23 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dns-privacy@ietf.org
Message-ID: <20140820155522.GJ1065@mx1.yitter.info>
References: <00ba01cfbbf9$d561f010$8025d030$@rozanak.com> <20140820143453.GD1065@mx1.yitter.info> <814D0BFB77D95844A01CA29B44CBF8A7A28554@lhreml513-mbb.china.huawei.com> <20140820152343.GH1065@mx1.yitter.info> <814D0BFB77D95844A01CA29B44CBF8A7A285FA@lhreml513-mbb.china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <814D0BFB77D95844A01CA29B44CBF8A7A285FA@lhreml513-mbb.china.huawei.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: http://mailarchive.ietf.org/arch/msg/dns-privacy/3v2msMFDPM9ea78viVObIulOAtw
Subject: Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 15:55:30 -0000

On Wed, Aug 20, 2014 at 03:38:41PM +0000, Hosnieh Rafiee wrote:
> 
> So in long term there is no benefit to use encryption without authentication in resolver scenario.  

Let us be concrete.  There are four cases:

1.  A stub that connects to whatever resolver it gets by magic from
DHCP.  

2.  A stub that connects to a specific resolver on the same network as
itself.  This is like your ISP's resolver, when you specifically
configure the resolver.  

3.  A stub that connects to a specific resolver over the public
Internet.  This is like using Google's public DNS service.

4.  A full-service resolver.

In (1), othing can help, because DHCP is kind of trivial to subvert,
so you could be talking to anything.  In (2), your arguments sort of
work, because the attack is localized attempting to snarf _particular_
traffic.  In (3), however, your arguments don't work: the threat is
not actually to particular traffic, but to _all_ traffic; and any
attack that would actually depend on spoofing addresses or the like
would be observable by the service provider, which foils the attack.
In (4), of course, we don't have the problem.  I include it because
the validating stub in effect ends up having to chase most things
itself, so it devolves to this.

Your argument works if one is trying to prevent someone getting
particular traffic.  If the threat, however, is the general snarfing
up of all the traffic towards a particular resolver with the goal of
learning about all of its traffic, then even if some of it leaks
that's not a big deal.  In this case, failing to authenticate the
resolver presents no real additional vulnerability.

Best regards,
 
A
-- 
Andrew Sullivan
ajs@anvilwalrusden.com