Re: [dns-privacy] [Ext] [Last-Call] Review of draft-ietf-dprive-rfc7626-bis-03

Paul Hoffman <paul.hoffman@icann.org> Fri, 10 January 2020 14:50 UTC

Return-Path: <paul.hoffman@icann.org>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97E1A12009E; Fri, 10 Jan 2020 06:50:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4NUx6LmDH2ks; Fri, 10 Jan 2020 06:50:10 -0800 (PST)
Received: from ppa3.lax.icann.org (ppa3.lax.icann.org [192.0.33.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F33EC12001E; Fri, 10 Jan 2020 06:50:09 -0800 (PST)
Received: from PFE112-CA-2.pexch112.icann.org (out.west.pexch112.icann.org [64.78.40.10]) by ppa3.lax.icann.org (8.16.0.27/8.16.0.27) with ESMTPS id 00AEo9mS017219 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Fri, 10 Jan 2020 14:50:09 GMT
Received: from PMBX112-W1-CA-1.pexch112.icann.org (64.78.40.21) by PMBX112-W1-CA-1.pexch112.icann.org (64.78.40.21) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 10 Jan 2020 06:50:07 -0800
Received: from PMBX112-W1-CA-1.pexch112.icann.org ([64.78.40.21]) by PMBX112-W1-CA-1.PEXCH112.ICANN.ORG ([64.78.40.21]) with mapi id 15.00.1497.000; Fri, 10 Jan 2020 06:50:07 -0800
From: Paul Hoffman <paul.hoffman@icann.org>
To: "last-call@ietf.org" <last-call@ietf.org>
CC: DNS Privacy Working Group <dns-privacy@ietf.org>
Thread-Topic: [Ext] [dns-privacy] [Last-Call] Review of draft-ietf-dprive-rfc7626-bis-03
Thread-Index: AQHVx8U/sm5sOl6oFUaKNQnIOe4QTg==
Date: Fri, 10 Jan 2020 14:50:07 +0000
Message-ID: <5FB2D0FA-A6E2-4F0A-8607-06520FD8F375@icann.org>
References: <4639bd67-6fca-47d1-aaeb-85fcd0394f46@www.fastmail.com> <029D8BB9-CE93-486A-BDF2-6D0720E59109@sinodun.com> <CABcZeBO2eNo6d2PVd4DCiGCMgrZdmBrCkfKb9i7bx7ay4E0yAA@mail.gmail.com> <EE291DD5-D7B3-4FDA-A04F-9ADA7B2190FC@sinodun.com> <CABcZeBOW1XWX71ivh9t1tzogZntTsZHQQc4BXAjBra1a-HOUmA@mail.gmail.com> <8B36C1A0-B2D9-48E8-9C7D-BD0FED4E62FD@sinodun.com> <CABcZeBMcM3NtYW+c9OnqnFw2QTAmwyyVdLuHeNMiLqh6dC1oag@mail.gmail.com>
In-Reply-To: <CABcZeBMcM3NtYW+c9OnqnFw2QTAmwyyVdLuHeNMiLqh6dC1oag@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.0.32.234]
x-source-routing-agent: Processed
Content-Type: multipart/signed; boundary="Apple-Mail=_6D4586BC-8169-4A34-AD57-3BCCE4A332FB"; protocol="application/pkcs7-signature"; micalg="sha-256"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-01-10_01:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/dDNI4VQ8g1E-_pB2IX8wlRagDms>
Subject: Re: [dns-privacy] [Ext] [Last-Call] Review of draft-ietf-dprive-rfc7626-bis-03
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 14:50:13 -0000

On Jan 9, 2020, at 7:41 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>>>> Section 3.5.1.2
>>>> 
>>>> I admit that I don't understand the purpose of this section. Concentrating on minutiae, like the details of DHCP or ARP/NDP spoofing, is far too low level. If we were to simply assume the usual threat model [RFC3552], then the conclusions here are obvious: if you fail to authenticate the server, then you get the server that an attacker chooses.
>>>> 
>>>> I would remove this section in favour of improving Section 3.5.1.4, which addresses the most pertinent question.
>>> 
>>> RFC7626 included Section 2..5.3 https://tools.ietf.org/html/rfc7626#section-2.5.3 ‘Rogue Servers’. This section is just an update of that text to improve context and remove the phrase ’rogue server’.  Since the majority of OS implementations still use these mechanisms today it seems to still be relevant. 
>>> 
>>> Well, as MT says, this is just the 3552 threat model.  The basic fact is that you need a reference to a server that is (1) securely obtained and (2) verifiable against the server itself. Absent that, you are subject to attack by the network.
>> 
>> Suggest adding a sentence at the start of the section “[RFC3552] provides guidelines for describing Internet threat models. This section specialises the discussion to the case of DNS resolver configuration.”
>> 
>> Well, that's a start, but the problem is still that it's too low level. If you insist on having this section, you should lay out the implications of the situation rather than (or at least in advance of) digging into the details.
> 
> The level is detail is entirely comparible to that in the original RFC (much of the text is still the same).
> 
> That doesn't seem like a particularly strong argument. We're revising this document and the question is what is good now.
> 
> 
> 
> As I said to Martin, the section focusses on the impact on the DNS resolution path that results from the attack: diversion of traffic and traffic capture.. Are there other implications you think should be included? Please suggest text. 
> 
> I would replace the entirety of this section with:
> 
> The Internet Threat model, as described in RFC 3552, assumes that the attacker controls the network. Such an attacker can completely control any insecure DNS resolution, both passively monitoring the queries and responses and substituting their own responses. Even if encrypted DNS such as DoH or DoT is used, unless the client has been configured in a secure way with the server identity, an active attacker can impersonate the server. This implies that opportunistic modes of DoH/DoT as well as modes where the client learns of the DoH/DoT server via in-network mechanisms such as DHCP are vulnerable to attack. In addition, if the client is compromised, the attacker can replace the DNS configuration with one of its own choosing.

Given that this topic is one where there is rampant confusion, I think brevity and clarity are best for this document. I believe Ekr's words cover exactly what is needed here, and agree that the rest of the section should be eliminated.

I aslo agree with earlier comments that this document referring to draft-arkko-arch-infrastructure-centralisation is a bad idea. We have no idea what that document will end up saying when published as an RFC.

--Paul Hoffman