Re: [dns-privacy] [Ext] Threat Model

Eric Rescorla <ekr@rtfm.com> Sat, 02 November 2019 13:59 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F736120077 for <dns-privacy@ietfa.amsl.com>; Sat, 2 Nov 2019 06:59:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jf5zPrl8zwVj for <dns-privacy@ietfa.amsl.com>; Sat, 2 Nov 2019 06:59:27 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81788120119 for <dns-privacy@ietf.org>; Sat, 2 Nov 2019 06:59:26 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id y23so2103995ljh.10 for <dns-privacy@ietf.org>; Sat, 02 Nov 2019 06:59:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=SYOShno/uZz4NR5upPPcZi07efK5jZ0/4Ut3rNZDF2k=; b=JjOC/p+aw8f0GqMP9MqtdZKuCNXmduvakXGMl6yaujywQjpPXW1MLEqCNdL7TX8F1q QqmlnIkhuQzw30epyzK+Rpb1tTPFlGJbjqH2CIH0aL2IjBrcK6ZMZVA80VLt/dPDqPGl 9CDmgHynuIfy2knhfBdSTTdD0vM3WEU2aW9MTHuLsbq4JV9DMXRIrKYYk8d4AUFmHWHI WdK6UtfsKkgyY3ZznfsPzOqQ96Y21zZibQoulr43oujjz3hLeJyZ51GMde9pIpyPNXcS fMBYDHMXF0bTorp/8joyOISZXXpqB3hWIBVLmZUZDPfw2yWjdDjeiB+ZVXTQyclCKo+L T2eg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=SYOShno/uZz4NR5upPPcZi07efK5jZ0/4Ut3rNZDF2k=; b=GFH81ALZXZA3fPdxSW7t0xDDku+9JpyMEOFNxJhe2pL5lkaJ9lACaxNefZRF3OCa4u jfaKTmRZEWcWk5x2toaUtBra09sXBsFrA/uZiOdqlOosg1CDlsQeN8JfzgIEm/3xKxia dimjcQHhXzfqePw7frzj1G8J3w1yo/6ciHXlGXOvycwfq9S/x+qnhPuS2rMgiLydIxqi 5JQFUjtGgTR23M74Wh0Z62NhYPkk6kj5Bg6BldCBoZleB4oe4ay/ZzG+TLSYykBovvVr LNKiLXj8TS74QNQyBoEG6tsQhI70UTzF7waRKJmaUL6OfaWd7SKRgeCtV1VFAVgVySqe MV3g==
X-Gm-Message-State: APjAAAWIPXGOgVdwLtve8rB7CbQcunlRpLRqMNqSz9x+6rQRr/DWxbjr HocD3G8Y+3WCZlpxRhUJbhXWXjJOZ53HROZg6ENHww==
X-Google-Smtp-Source: APXvYqw0P+1dAkubto+gkjBhOjK7ps9IQyQNCJprb0rpnMw6kE6xXguUKwabGPLvtFq6vEJAu9chTOJ9Ss6eYphojmo=
X-Received: by 2002:a2e:a303:: with SMTP id l3mr12039424lje.38.1572703164709; Sat, 02 Nov 2019 06:59:24 -0700 (PDT)
MIME-Version: 1.0
References: <CABcZeBMQEJ=LE8ATQYnJj59srsK47hf4HT3BMMg3X2crVfSUXQ@mail.gmail.com> <1a70035e-edef-a3f4-ea91-52409ba37828@icann.org>
In-Reply-To: <1a70035e-edef-a3f4-ea91-52409ba37828@icann.org>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sat, 02 Nov 2019 06:58:48 -0700
Message-ID: <CABcZeBPAtvf3RU2gKWzyTaNwd6NBGsBuxq+n6r0W6-2RCnivSA@mail.gmail.com>
To: Paul Hoffman <paul.hoffman@icann.org>
Cc: "dns-privacy@ietf.org" <dns-privacy@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000078551c05965d7de1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/8bV7fxW8_WW7DAWqTS75b2MAMik>
Subject: Re: [dns-privacy] [Ext] Threat Model
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Nov 2019 13:59:29 -0000

On Sat, Nov 2, 2019 at 6:01 AM Paul Hoffman <paul.hoffman@icann.org> wrote:

> On 11/1/19 2:09 PM, Eric Rescorla wrote:
> > It seemed like it might be a good idea to take a step back and talk
> > about threat model to see if we're all on the same page.
> >
> > The set of threats I am concerned with is primarily about an on-path
> > active attacker who learns the query stream (i.e., the domains being
> > queried) coming out of the recursive resolver. It's of course mostly
> > inevitable that the attacker learns which authoritative servers are
> > being queried, but I think we can all agree there's still plenty of
> > information to leak here [0].
> >
> >
> > In the current DNS, such an attacker can of course just perform a
> > passive attack by listening to the DNS query traffic. It's possible to
> > straightforwardly exclude this attack by opportunistically attempting
> > DoT [1] to the authoritative. However, an active attacker can mount a
> > downgrade attack on the negotiation, forcing you back to
> > cleartext. So, unless you have a secure way of:
> >
> > (1) knowing the expected name of the authoritative for a given query
> >      and that it supports DoT
> > (2) verifying that the server you are connecting to actually has
> >      that name
> >
> > Then the attacker can just mount a MITM attack on your connections and
> > collect this data by proxying the traffic to the true authoritative.
> >
> > Do people agree with this assessment of the situation? Is this form
> > of attack something they agree should be in scope?
>
> This is one threat model, definitely. Another is passive snooping, such by
> someone who is watching at a point on the resolver's upstream connection to
> interesting authoritative servers. Another is passive snooping, such by
> someone who is watching at a point near interesting authoritative servers.
>

Generally, I would expect that a solution which addressed the active threat
model would also address the passive one.



> One small modification I would make to your mode is to change #1 from
> "knowing the expected name of the authoritative" to "knowing an expected
> identifier of the authoritative", and #2 to "...actually has that
> identifier". Given the current landscape of resolvers and authoritative
> servers, using long-lived IP addresses for identification might be better;
> that would need to be hashed out during protocol discussion.
>

Sure. Let's say "identity"

=Ekr


> --Paul Hoffman
>