Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.
Allison Mankin <allison.mankin@gmail.com> Wed, 31 August 2016 13:53 UTC
Return-Path: <allison.mankin@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F049512DC7C; Wed, 31 Aug 2016 06:53:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oOdLgwhtjAvo; Wed, 31 Aug 2016 06:53:28 -0700 (PDT)
Received: from mail-ua0-x22e.google.com (mail-ua0-x22e.google.com [IPv6:2607:f8b0:400c:c08::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3B7412DC18; Wed, 31 Aug 2016 06:42:42 -0700 (PDT)
Received: by mail-ua0-x22e.google.com with SMTP id m60so88683098uam.3; Wed, 31 Aug 2016 06:42:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=eSo+vHvhYEgVyXOzdcQ8urKqqNzBTa8AtO+6gihGaKs=; b=plbsgptV8nAhJoncYoGQUNXf9oci3rcVUmvn1xT+7vofmkAKfJGLh8lNlRuCFn8hmX zd/ypu3kg7CPhlztYQ7aAvHuvux1XRDxPCtWCHxnSuy3BRhUzx2Vm0aCL5A5ljTD4fZ2 nWr0wSeZyanivFDuUf8JNedwN/5vXBUXysZNhLBsIrI2I4rwlYA8inEcZw4aCxTpKmKM FUh+7+AZhWN1t+m60Nj/ClXdNwBHvO4a2wroUyJ+vzwbxVRAyOfbVw7sFYeuw5mkkTzu /hPU6I72V5uWHk7jjMqHRLJ+GGddN7mPk2qO092sQ/GGlCya9EbdFR27Hg8mx+0dGVEL u43g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=eSo+vHvhYEgVyXOzdcQ8urKqqNzBTa8AtO+6gihGaKs=; b=gCGpmM4llGHgrFMWruAueJZC4BgkRI4GC/J9xEyirFGkVAJnwu6darOdVGFcmYv9b1 Q0WA09XEPUVAgnhP0jfEX+mR6lCrZvf3MxLNYuW/AlIBOwoUVPowI7znMfyd8Q1ato47 8aFrI7j+vKrd20KaoC02m9gITdYN+1s5ffd/FPO88Mu88O4/Tfymy9nP1RvHmvR71OX1 iJTkUBiktw9pddrSuZ9oW2CenQKTh1PQOilpRPrRU9AUOBtpJm9OWTNanb3s8V/b9IJK j1fCQVEcvcZlu/KEmQ6+Bgle7oeiDbeUil79KND6SaxM2R/2phQn90UxuWLh53Rgwslq sRCQ==
X-Gm-Message-State: AE9vXwMlAecotwTaiHaaDjiQiyZpaS7pu81hLW/wIebnJioEzkVCMjuygXnKDOf4Z85AtvnEBkHxijkj+9v2nQ==
X-Received: by 10.31.237.131 with SMTP id l125mr5578906vkh.47.1472650961775; Wed, 31 Aug 2016 06:42:41 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.176.4.39 with HTTP; Wed, 31 Aug 2016 06:42:40 -0700 (PDT)
In-Reply-To: <026a1e754895459186a5164f960e1b3c@XCH-RCD-017.cisco.com>
References: <CAHw9_iLWW-e_de9ieq_oe_eR=RBWg9swG7EiAPTp93825Vm=pw@mail.gmail.com> <20160822151229.k5wms6k6kktrut4o@nic.fr> <d21a5081c7614e5bbeef371d83501693@XCH-RCD-017.cisco.com> <CAP8yD=s+cD_-=AVs8NU0ZxjxwKCY81xEm_JzBO7vu80P6DXysw@mail.gmail.com> <026a1e754895459186a5164f960e1b3c@XCH-RCD-017.cisco.com>
From: Allison Mankin <allison.mankin@gmail.com>
Date: Wed, 31 Aug 2016 09:42:40 -0400
Message-ID: <CAP8yD=tm5pkCZdGKGjyNz4YrO8c=RxnwM5mkhr3004g4B46F7A@mail.gmail.com>
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
Content-Type: multipart/alternative; boundary="94eb2c0912967473ea053b5e4547"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/BRATNfO56NwkEoEzpWQUr9LG2mk>
Cc: "DPRIVE-chairs@tools.ietf.org" <DPRIVE-chairs@tools.ietf.org>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>, Warren Kumari <warren@kumari.net>, "draft-ietf-dprive-dnsodtls@ietf.org" <draft-ietf-dprive-dnsodtls@ietf.org>, John Heidemann <johnh@isi.edu>
Subject: Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls.
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Aug 2016 13:53:32 -0000
Tiru, Thanks for your response. I guess the Chairs and ADs will make the call about whether there's a note motivating the Experimental status. Wrt to your change about anycast, once the Alert is fatal, do you have the client give up the association versus trying to resume a past association? Allison On 31 August 2016 at 01:54, Tirumaleswar Reddy (tireddy) <tireddy@cisco.com> wrote: > Hi Allison, > > > > Thanks for the review. Please see inline [TR] > > > > *From:* Allison Mankin [mailto:allison.mankin@gmail.com] > *Sent:* Wednesday, August 31, 2016 5:36 AM > *To:* Tirumaleswar Reddy (tireddy) <tireddy@cisco.com> > *Cc:* Warren Kumari <warren@kumari.net>; dns-privacy@ietf.org; > DPRIVE-chairs@tools.ietf.org; draft-ietf-dprive-dnsodtls@ietf.org; > Allison Mankin <allison.mankin@gmail.com>; John Heidemann <johnh@isi.edu> > *Subject:* Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls. > > > > My calendar reminds me this is the last day of this WGLC. > > Overall comments: > > This is a well-written spec. I'm especially appreciative of how much the > draft has gotten aligned with RFC 7858. I support its publication soon as > an Experimental. > > > > Three suggestions/concerns: > > > > Abstract and Section 1 - > > I'd like to see a note added that the Experiment will be concluded when > the spec is evaluated through an implementation and some testing of the > details. > > > > [TR] I am not sure if this line is required, I don’t see other drafts with > Experimental status adding this line ! > > > > Section 1 > > > However TCP Fast Open [RFC7413 <https://tools.ietf.org/html/rfc7413>] > can eliminate 1-RTT in the latter case. > > If the TLS Resume and the TCP Fast Open are pipelined, there is no extra > RTT in comparison with DTLS. So I think it would be better to say that with > TCP Fast Open, the implementation can achieve the same RTT efficiency as > DTLS. > > [TR] Updated. > > Section 6 > > I don't recall recent WG discussion of this section on Anycast (JohnH > reviewed an earlier approach in https://www.ietf.org/mail- > archive/web/dns-privacy/current/msg00989.html). > > The section states that a server receiving a DTLS message for which it > doesn't have cryptographic context SHOULD generate a DTLS Alert message to > encourage the client to try to recover. But it acknowledges that the Alert > can't be authenticated, and so it advise the client receiving this Alert to > try two things: > > upon receipt > > of an in-window DTLS Alert, the client SHOULD continue re- > > transmitting the DTLS packet (in the event the Alert was spoofed), > > and at the same time it SHOULD initiate DTLS session resumption. > > When the DTLS client receives an authenticated DNS response from one > > of those DTLS sessions, the other DTLS session should be terminated. > > Why do we think that the server is allowed to send a non-fatal Alert > message for this case? See the MUST in RFC 6347 4.1.2.7[*]. > > > > [TR] Good point, changed to fatal alert. > > > > -Tiru > > > > And if it is OK to send a non-fatal Alert message, under what conditions > might the client's two attempts have success? The assumption seems to be a > very transient Anycast routing change (for the retransmit) or an Anycast > routing change that cycled to a previous server within the time window for > the valid resume. One of John Heidemann's points in the message I linked > to is that there's a lack of data on Anycast impacts on transport in DNS. > > Does others think that a server must send a fatal Alert (or else > contradict RFC 6347)? > > In general, is the complexity of this recovery worthwhile compared with > fault-tolerantly giving up and starting over? Is the assumed rapid and/or > cycling Anycast change common enough to justify the proposed behavior ? > > > > Suggestion: let the client give up. Or else add language about the > assumptions and about the section being pretty theoretical/untested. > > Thanks, > > Allison > > > > [*] RFC 6347 4.1.2.7: > > Unlike TLS, DTLS is resilient in the face of invalid records (e.g., > > invalid formatting, length, MAC, etc.). In general, invalid records > > SHOULD be silently discarded, thus preserving the association; > > however, an error MAY be logged for diagnostic purposes. > > Implementations which choose to generate an alert instead, MUST > > generate fatal level alerts to avoid attacks where the attacker > > repeatedly probes the implementation to see how it responds to > > various types of error. Note that if DTLS is run over UDP, then any > > implementation which does this will be extremely susceptible to > > denial-of-service (DoS) attacks because UDP forgery is so easy. > > Thus, this practice is NOT RECOMMENDED for such transports. > > > > > > > > On 22 August 2016 at 21:44, Tirumaleswar Reddy (tireddy) < > tireddy@cisco.com> wrote: > > > -----Original Message----- > > From: dns-privacy [mailto:dns-privacy-bounces@ietf.org] On Behalf Of > > Stephane Bortzmeyer > > Sent: Monday, August 22, 2016 8:42 PM > > To: Warren Kumari <warren@kumari.net> > > Cc: dns-privacy@ietf.org; DPRIVE-chairs@tools.ietf.org; > draft-ietf-dprive- > > dnsodtls@ietf.org > > Subject: Re: [dns-privacy] Start of WGLC for draft-ietf-dprive-dnsodtls. > > > > On Tue, Aug 16, 2016 at 01:05:40PM -0400, Warren Kumari > > <warren@kumari.net> wrote a message of 38 lines which said: > > > > > https://datatracker.ietf.org/doc/draft-ietf-dprive-dnsodtls/ > > > > I've read it (the last version, -10) and, for me, it is OK, and ready to > be sent to > > the next step. > > > > I would like to make it a bit shorter by deleting two sentences, "An > active > > attacker can send bogus responses causing misdirection of the subsequent > > connection" in the abstract and "Active attackers have long been > successful at > > injecting bogus responses, causing cache poisoning and causing > misdirection > > of the subsequent connection (if attacking A or AAAA records). A popular > > mitigation against that attack is to use ephemeral and random source > ports > > for DNS queries [RFC5452]." in section 1. Both are about an attack which > is > > *not* mitigated by DNS-over-DTLS and these two sentences are clearly out > of > > scope. (The relationship with DNSSEC, which solves these attacks, is > already > > handled in section 1.1.) > > Done. > > > > > Otherwise, now that the well-knon port is not absolutely mandatory, I > suggest > > to change "Once the DNS client succeeds in receiving HelloVerifyRequest > from > > the server via UDP on the well-known port for DNS-over-DTLS" to "Once the > > DNS client succeeds in receiving HelloVerifyRequest from the server via > UDP > > from the port used for DNS-over-DTLS". > > Based on feedback from Christian that HelloVerifyRequest is optional from > the server, removed the above line and replaced with the following lines: > > DNS client initiates DTLS handshake as described in [RFC6347], > following the best practices specified in [RFC7525]. After DTLS > negotiation completes, if the DTLS handshake succeeds according to > [RFC6347] the connection will be encrypted and is now protected from > eavesdropping. > > > > > RFC 2119 mandatory flame war: "the DNS client may want to probe the > server > > using DTLS heartbeat" May or MAY? > > Changed to "MAY". > > -Tiru > > > > > > > > _______________________________________________ > > dns-privacy mailing list > > dns-privacy@ietf.org > > https://www.ietf.org/mailman/listinfo/dns-privacy > > _______________________________________________ > dns-privacy mailing list > dns-privacy@ietf.org > https://www.ietf.org/mailman/listinfo/dns-privacy > > >
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Christian Huitema
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Bob Harold
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Bob Harold
- [dns-privacy] Start of WGLC for draft-ietf-dprive… Warren Kumari
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Paul Hoffman
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Warren Kumari
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Stephane Bortzmeyer
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Allison Mankin
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Warren Kumari
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Allison Mankin
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tim Wicinski
- Re: [dns-privacy] Start of WGLC for draft-ietf-dp… Tirumaleswar Reddy (tireddy)