Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.

Allison Mankin <allison.mankin@gmail.com> Wed, 31 August 2016 13:53 UTC

Return-Path: <allison.mankin@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F049512DC7C; Wed, 31 Aug 2016 06:53:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oOdLgwhtjAvo; Wed, 31 Aug 2016 06:53:28 -0700 (PDT)
Received: from mail-ua0-x22e.google.com (mail-ua0-x22e.google.com [IPv6:2607:f8b0:400c:c08::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3B7412DC18; Wed, 31 Aug 2016 06:42:42 -0700 (PDT)
Received: by mail-ua0-x22e.google.com with SMTP id m60so88683098uam.3; Wed, 31 Aug 2016 06:42:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=eSo+vHvhYEgVyXOzdcQ8urKqqNzBTa8AtO+6gihGaKs=; b=plbsgptV8nAhJoncYoGQUNXf9oci3rcVUmvn1xT+7vofmkAKfJGLh8lNlRuCFn8hmX zd/ypu3kg7CPhlztYQ7aAvHuvux1XRDxPCtWCHxnSuy3BRhUzx2Vm0aCL5A5ljTD4fZ2 nWr0wSeZyanivFDuUf8JNedwN/5vXBUXysZNhLBsIrI2I4rwlYA8inEcZw4aCxTpKmKM FUh+7+AZhWN1t+m60Nj/ClXdNwBHvO4a2wroUyJ+vzwbxVRAyOfbVw7sFYeuw5mkkTzu /hPU6I72V5uWHk7jjMqHRLJ+GGddN7mPk2qO092sQ/GGlCya9EbdFR27Hg8mx+0dGVEL u43g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=eSo+vHvhYEgVyXOzdcQ8urKqqNzBTa8AtO+6gihGaKs=; b=gCGpmM4llGHgrFMWruAueJZC4BgkRI4GC/J9xEyirFGkVAJnwu6darOdVGFcmYv9b1 Q0WA09XEPUVAgnhP0jfEX+mR6lCrZvf3MxLNYuW/AlIBOwoUVPowI7znMfyd8Q1ato47 8aFrI7j+vKrd20KaoC02m9gITdYN+1s5ffd/FPO88Mu88O4/Tfymy9nP1RvHmvR71OX1 iJTkUBiktw9pddrSuZ9oW2CenQKTh1PQOilpRPrRU9AUOBtpJm9OWTNanb3s8V/b9IJK j1fCQVEcvcZlu/KEmQ6+Bgle7oeiDbeUil79KND6SaxM2R/2phQn90UxuWLh53Rgwslq sRCQ==
X-Gm-Message-State: AE9vXwMlAecotwTaiHaaDjiQiyZpaS7pu81hLW/wIebnJioEzkVCMjuygXnKDOf4Z85AtvnEBkHxijkj+9v2nQ==
X-Received: by 10.31.237.131 with SMTP id l125mr5578906vkh.47.1472650961775; Wed, 31 Aug 2016 06:42:41 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.176.4.39 with HTTP; Wed, 31 Aug 2016 06:42:40 -0700 (PDT)
In-Reply-To: <026a1e754895459186a5164f960e1b3c@XCH-RCD-017.cisco.com>
References: <CAHw9_iLWW-e_de9ieq_oe_eR=RBWg9swG7EiAPTp93825Vm=pw@mail.gmail.com> <20160822151229.k5wms6k6kktrut4o@nic.fr> <d21a5081c7614e5bbeef371d83501693@XCH-RCD-017.cisco.com> <CAP8yD=s+cD_-=AVs8NU0ZxjxwKCY81xEm_JzBO7vu80P6DXysw@mail.gmail.com> <026a1e754895459186a5164f960e1b3c@XCH-RCD-017.cisco.com>
From: Allison Mankin <allison.mankin@gmail.com>
Date: Wed, 31 Aug 2016 09:42:40 -0400
Message-ID: <CAP8yD=tm5pkCZdGKGjyNz4YrO8c=RxnwM5mkhr3004g4B46F7A@mail.gmail.com>
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
Content-Type: multipart/alternative; boundary="94eb2c0912967473ea053b5e4547"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/BRATNfO56NwkEoEzpWQUr9LG2mk>
Cc: "DPRIVE-chairs@tools.ietf.org" <DPRIVE-chairs@tools.ietf.org>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>, Warren Kumari <warren@kumari.net>, "draft-ietf-dprive-dnsodtls@ietf.org" <draft-ietf-dprive-dnsodtls@ietf.org>, John Heidemann <johnh@isi.edu>
Subject: Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Aug 2016 13:53:32 -0000

Tiru,

Thanks for your response.  I guess the Chairs and ADs will make the call
about whether there's a note motivating the Experimental status.

Wrt to your change about anycast, once the Alert is fatal, do you have the
client give up the association versus trying to resume a past association?

Allison



On 31 August 2016 at 01:54, Tirumaleswar Reddy (tireddy) <tireddy@cisco.com>
wrote:

> Hi Allison,
>
>
>
> Thanks for the review. Please see inline [TR]
>
>
>
> *From:* Allison Mankin [mailto:allison.mankin@gmail.com]
> *Sent:* Wednesday, August 31, 2016 5:36 AM
> *To:* Tirumaleswar Reddy (tireddy) <tireddy@cisco.com>
> *Cc:* Warren Kumari <warren@kumari.net>; dns-privacy@ietf.org;
> DPRIVE-chairs@tools.ietf.org; draft-ietf-dprive-dnsodtls@ietf.org;
> Allison Mankin <allison.mankin@gmail.com>; John Heidemann <johnh@isi.edu>
> *Subject:* Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.
>
>
>
> My calendar reminds me this is the last day of this WGLC.
>
> Overall comments:
>
> This is a well-written spec.  I'm especially appreciative of how much the
> draft has gotten aligned with RFC 7858.  I support its publication soon as
> an Experimental.
>
>
>
> Three suggestions/concerns:
>
>
>
> Abstract and Section 1 -
>
> I'd like to see a note added that the Experiment will be concluded when
> the spec is evaluated through an implementation and some testing of the
> details.
>
>
>
> [TR] I am not sure if this line is required, I don’t see other drafts with
> Experimental status adding this line !
>
>
>
> Section 1
>
> > However TCP Fast Open [RFC7413 <https://tools.ietf.org/html/rfc7413>]
> can eliminate 1-RTT in the latter case.
>
> If the TLS Resume and the TCP Fast Open are pipelined, there is no extra
> RTT in comparison with DTLS. So I think it would be better to say that with
> TCP Fast Open, the implementation can achieve the same RTT efficiency as
> DTLS.
>
> [TR] Updated.
>
> Section 6
>
> I don't recall recent WG discussion of this section on Anycast (JohnH
> reviewed an earlier approach in https://www.ietf.org/mail-
> archive/web/dns-privacy/current/msg00989.html).
>
> The section states that a server receiving a DTLS message for which it
> doesn't have cryptographic context SHOULD generate a DTLS Alert message to
> encourage the client to try to recover.  But it acknowledges that the Alert
> can't be authenticated, and so it advise the client receiving this Alert to
> try two things:
>
>    upon receipt
>
>    of an in-window DTLS Alert, the client SHOULD continue re-
>
>    transmitting the DTLS packet (in the event the Alert was spoofed),
>
>    and at the same time it SHOULD initiate DTLS session resumption.
>
>    When the DTLS client receives an authenticated DNS response from one
>
>    of those DTLS sessions, the other DTLS session should be terminated.
>
> Why do we think that the server is allowed to send a non-fatal Alert
> message for this case?  See the MUST in RFC 6347 4.1.2.7[*].
>
>
>
> [TR] Good point, changed to fatal alert.
>
>
>
> -Tiru
>
>
>
> And if it is OK to send a non-fatal Alert message, under what conditions
> might the client's two attempts have success?  The assumption seems to be a
> very transient Anycast routing change (for the retransmit) or an Anycast
> routing change that cycled to a previous server within the time window for
> the valid resume.  One of John Heidemann's points in the message I linked
> to is that there's a lack of data on Anycast impacts on transport in DNS.
>
> Does others think that a server must send a fatal Alert (or else
> contradict RFC 6347)?
>
> In general, is the complexity of this recovery worthwhile compared with
> fault-tolerantly giving up and starting over?   Is the assumed rapid and/or
> cycling Anycast change common enough to justify the proposed behavior ?
>
>
>
> Suggestion: let the client give up.  Or else add language about the
> assumptions and about the section being pretty theoretical/untested.
>
> Thanks,
>
> Allison
>
>
>
> [*] RFC 6347 4.1.2.7:
>
>    Unlike TLS, DTLS is resilient in the face of invalid records (e.g.,
>
>    invalid formatting, length, MAC, etc.).  In general, invalid records
>
>    SHOULD be silently discarded, thus preserving the association;
>
>    however, an error MAY be logged for diagnostic purposes.
>
>    Implementations which choose to generate an alert instead, MUST
>
>    generate fatal level alerts to avoid attacks where the attacker
>
>    repeatedly probes the implementation to see how it responds to
>
>    various types of error.  Note that if DTLS is run over UDP, then any
>
>    implementation which does this will be extremely susceptible to
>
>    denial-of-service (DoS) attacks because UDP forgery is so easy.
>
>    Thus, this practice is NOT RECOMMENDED for such transports.
>
>
>
>
>
>
>
> On 22 August 2016 at 21:44, Tirumaleswar Reddy (tireddy) <
> tireddy@cisco.com> wrote:
>
> > -----Original Message-----
> > From: dns-privacy [mailto:dns-privacy-bounces@ietf.org] On Behalf Of
> > Stephane Bortzmeyer
> > Sent: Monday, August 22, 2016 8:42 PM
> > To: Warren Kumari <warren@kumari.net>
> > Cc: dns-privacy@ietf.org; DPRIVE-chairs@tools.ietf.org;
> draft-ietf-dprive-
> > dnsodtls@ietf.org
> > Subject: Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.
> >
> > On Tue, Aug 16, 2016 at 01:05:40PM -0400,  Warren Kumari
> > <warren@kumari.net> wrote  a message of 38 lines which said:
> >
> > > https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsodtls/
> >
> > I've read it (the last version, -10) and, for me, it is OK, and ready to
> be sent to
> > the next step.
> >
> > I would like to make it a bit shorter by deleting two sentences, "An
> active
> > attacker can send bogus responses causing misdirection of the subsequent
> > connection" in the abstract and "Active attackers have long been
> successful at
> > injecting bogus responses, causing cache poisoning and causing
> misdirection
> > of the subsequent connection (if attacking A or AAAA records).  A popular
> > mitigation against that attack is to use ephemeral and random source
> ports
> > for DNS queries [RFC5452]." in section 1. Both are about an attack which
> is
> > *not* mitigated by DNS-over-DTLS and these two sentences are clearly out
> of
> > scope. (The relationship with DNSSEC, which solves these attacks, is
> already
> > handled in section 1.1.)
>
> Done.
>
> >
> > Otherwise, now that the well-knon port is not absolutely mandatory, I
> suggest
> > to change "Once the DNS client succeeds in receiving HelloVerifyRequest
> from
> > the server via UDP on the well-known port for DNS-over-DTLS" to "Once the
> > DNS client succeeds in receiving HelloVerifyRequest from the server via
> UDP
> > from the port used for DNS-over-DTLS".
>
> Based on feedback from Christian that HelloVerifyRequest is optional from
> the server, removed the above line and replaced with the following lines:
>
>    DNS client initiates DTLS handshake as described in [RFC6347],
>    following the best practices specified in [RFC7525].  After DTLS
>    negotiation completes, if the DTLS handshake succeeds according to
>    [RFC6347] the connection will be encrypted and is now protected from
>    eavesdropping.
>
> >
> > RFC 2119 mandatory flame war: "the DNS client may want to probe the
> server
> > using DTLS heartbeat" May or MAY?
>
> Changed to "MAY".
>
> -Tiru
>
>
> >
> >
> > _______________________________________________
> > dns-privacy mailing list
> > dns-privacy@ietf.org
> > https://www.ietf.org/mailman/listinfo/dns-privacy
>
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy
>
>
>