Re: [dns-privacy] Adam Roach's No Objection on draft-ietf-dprive-bcp-op-08: (with COMMENT)

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Fri, 07 February 2020 10:10 UTC

Return-Path: <tirumaleswarreddy_konda@mcafee.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 621071201EF for <dns-privacy@ietfa.amsl.com>; Fri, 7 Feb 2020 02:10:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pyz7qZ888BFk for <dns-privacy@ietfa.amsl.com>; Fri, 7 Feb 2020 02:10:02 -0800 (PST)
Received: from us-smtp-delivery-140.mimecast.com (us-smtp-delivery-140.mimecast.com [63.128.21.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FD321201DC for <dns-privacy@ietf.org>; Fri, 7 Feb 2020 02:10:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=mimecast20190606; t=1581070201; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=xj+MFKx2hYso42PFbcECztOLzcrIQe56bJzX1tYC3Hg=; b=fgljazEHp2BIPO8KEU27OSzGl40Z2emeF11W5+Xjpd4IsLay+Fu7jhAe2di8vNsVzM+ZXz xUOVLB5970iJkdddZMfKgB+Lejd01vebBAwifFJUZ6IRQbaiTMsjI8JXe0gLrMNG0qH0ub mReBvLIIEqSzDEumGHEWdKcJN78ooqg=
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2171.outbound.protection.outlook.com [104.47.57.171]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-78-42Ip8mBWMaaczm81Q9yYAg-1; Fri, 07 Feb 2020 05:08:52 -0500
Received: from CY4PR1601MB1254.namprd16.prod.outlook.com (10.172.118.12) by CY4PR1601MB1351.namprd16.prod.outlook.com (10.172.118.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.29; Fri, 7 Feb 2020 10:08:50 +0000
Received: from CY4PR1601MB1254.namprd16.prod.outlook.com ([fe80::e851:20e8:57bd:fedd]) by CY4PR1601MB1254.namprd16.prod.outlook.com ([fe80::e851:20e8:57bd:fedd%12]) with mapi id 15.20.2707.024; Fri, 7 Feb 2020 10:08:50 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: Brian Dickson <brian.peter.dickson@gmail.com>, Eric Rescorla <ekr@rtfm.com>
CC: Tim Wicinski <tjw.ietf@gmail.com>, Adam Roach <adam@nostrum.com>, Benjamin Kaduk <kaduk@mit.edu>, "dprive-chairs@ietf.org" <dprive-chairs@ietf.org>, "draft-ietf-dprive-bcp-op@ietf.org" <draft-ietf-dprive-bcp-op@ietf.org>, DNS Privacy Working Group <dns-privacy@ietf.org>, The IESG <iesg@ietf.org>
Thread-Topic: [dns-privacy] Adam Roach's No Objection on draft-ietf-dprive-bcp-op-08: (with COMMENT)
Thread-Index: AQHV3Kr01xo3hCYoJ0+30qDByedW0agNqqSAgACao4CAACfQgIAAB0MAgAAG+QCAABDRgIAAC6KAgAABNoCAAAorgIAAAeKAgABJb4CAAEnngIAALMWAgAAY3tA=
Date: Fri, 07 Feb 2020 10:08:49 +0000
Message-ID: <CY4PR1601MB1254DDE6A55714902C65307CEA1C0@CY4PR1601MB1254.namprd16.prod.outlook.com>
References: <CAH1iCiqLwP8UOJe_vWQAr7iu8j7LF2Y4+386XNimM+3wJ-2RzQ@mail.gmail.com> <9fe99917-347b-ab79-7a9c-3e8da67a5246@nostrum.com> <364cf548-9114-fcb3-52b6-a73be08b55c4@nostrum.com> <CAH1iCirzvzQUAcbctzC4Bete_mDicT7MYJL5vnaSFZnVNAUbPg@mail.gmail.com> <9104d41b-2c78-0216-3262-4ed50f389ea7@nostrum.com> <CABcZeBMF2CT--gdKNuVWw+e8CvLYjL3yX0YtMj54CQBvdZ0o0A@mail.gmail.com> <CAH1iCirLPsLX-OebLxKTfR4FDXaejcNy+TONw5FuLP2_r6GBOw@mail.gmail.com> <CABcZeBPkLaFB5fv6WigJmY9QhOJnJf3YwrmooN0BRbm8fKxLog@mail.gmail.com> <CAH1iCiq555QF=we5moHBStmCRsJ_kZ=hzYacJ=GYSKvcqEBcvA@mail.gmail.com> <CABcZeBM+L_Qco3VkybhJp5_ijNiJd58yprCnHY2Yn4ODX-1UDA@mail.gmail.com> <20200207011411.GJ14382@kduck.mit.edu> <CABcZeBMuQotjcXOHOeNhQ8dNWEJZ3jijggGd=KGkWV6kWMu16Q@mail.gmail.com> <CAH1iCirnZ3JTsepHivW3Xc5Hytbsx1b48w9go_4oPA7ncfU34w@mail.gmail.com>
In-Reply-To: <CAH1iCirnZ3JTsepHivW3Xc5Hytbsx1b48w9go_4oPA7ncfU34w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.4.0.45
dlp-reaction: no-action
x-originating-ip: [49.37.206.28]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 41825b80-1eea-43d5-2e72-08d7abb5ba76
x-ms-traffictypediagnostic: CY4PR1601MB1351:
x-microsoft-antispam-prvs: <CY4PR1601MB1351C664CBC11F8090155E38EA1C0@CY4PR1601MB1351.namprd16.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0306EE2ED4
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(39860400002)(366004)(396003)(346002)(376002)(189003)(199004)(32952001)(8936002)(5660300002)(55016002)(71200400001)(2906002)(966005)(110136005)(54906003)(76116006)(53546011)(66946007)(6506007)(33656002)(316002)(86362001)(66446008)(66556008)(66476007)(64756008)(186003)(52536014)(478600001)(81156014)(81166006)(26005)(4326008)(9686003)(8676002)(7696005)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR1601MB1351; H:CY4PR1601MB1254.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: WfAVRt/JUaqXQ7EK0o57OyERMm15qaIOc08ni4ZYMUVEYtEhI8HJ7zB7E2Ss93a6c7sZUlrePhH0mc2916X38FAes98Egm9nYa2uE8Xl1gHGkfacXb2OYofCzsVxoN+lZ78YHIHkwAIw43W4DKXsvfE0lNywaizHo+Q2fR0Vovlgy30PVCYOPYbhJ4XsvGVPoovRvakA0VTKUOIQg7e2q2cgZ0xc01h/4HIYTBVis0G82gWRieQvStiSoGpvMAl6u9vaxBacowNzqg1rQiN1T+HU07fb6asj8LmwsSOnBln8MCwwIJ3c6rpSpSjW1B84SFQQ5bCPQEu9EyCkLvXNEMBvMrrZ5VvCe9F3Um0Ij4MUh6blhUT6RqUISX/3b9lgtAoVXpUEMJRfXHhJ5VOHeFCcl1/jMJ8fRziVQ+hCQ54N7tyvD6S65dzGyYJzSJ4y6m4ydGhUsh9G5CwFnUuxtmTd14jTQ2VEzjfDidlT+uIpb/D1IDs8izaB05VbJjw2kzdkYZPLUIF71s5szT3NgAlfpGilD81yS1+I2RZAuP/LXSCG6EoGXrXn8uO5525WFmZtHxx00GpKkW5DPOCygHmUd/6Us4YmTkxj+YY2Jl8=
x-ms-exchange-antispam-messagedata: K8av0XNGj3dc8HdwTOQDFUbeFFHCXSuXs5jK4VlkU0sy2kQcH1Lssw82IBY5WwSqVUp/gJ/RCPKN+ZPwS9a/5zHLaU8Rc9ypORly2mFbEGBFl5E4pFMYXSGxNSr4opGt4UP4AguZ/w73tEXwlkhTcA==
x-ms-exchange-transport-forked: True
MIME-Version: 1.0
X-OriginatorOrg: mcafee.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 41825b80-1eea-43d5-2e72-08d7abb5ba76
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Feb 2020 10:08:49.8203 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7KVe4Z0Y7ebCTkd6Zjmn4W4MKKf6VtmJpozX9V3eCm5v0iMycUO5a1w4opzGdHzPXz83ytQZ0oOgn5kYG22W61in6tFC9U49im6VkjIE5aZeFsxA+GDbIpvvnxIW74//
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1601MB1351
X-MC-Unique: 42Ip8mBWMaaczm81Q9yYAg-1
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: mcafee.com
Content-Type: multipart/alternative; boundary="_000_CY4PR1601MB1254DDE6A55714902C65307CEA1C0CY4PR1601MB1254_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/fIhrPbjsJ5Q3KmRPFGbw7PXf3rc>
Subject: Re: [dns-privacy] Adam Roach's No Objection on draft-ietf-dprive-bcp-op-08: (with COMMENT)
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Feb 2020 10:10:04 -0000

DNS poisoning is used as an attack vector even with TLS where users can potentially ignore/accept fake certificates and lost $, for instance see https://www.theregister.co.uk/2018/04/24/myetherwallet_dns_hijack/.

-Tiru

From: dns-privacy <dns-privacy-bounces@ietf.org> On Behalf Of Brian Dickson
Sent: Friday, February 7, 2020 1:49 PM
To: Eric Rescorla <ekr@rtfm.com>
Cc: Tim Wicinski <tjw.ietf@gmail.com>; Adam Roach <adam@nostrum.com>; Benjamin Kaduk <kaduk@mit.edu>; dprive-chairs@ietf.org; draft-ietf-dprive-bcp-op@ietf.org; DNS Privacy Working Group <dns-privacy@ietf.org>; The IESG <iesg@ietf.org>
Subject: Re: [dns-privacy] Adam Roach's No Objection on draft-ietf-dprive-bcp-op-08: (with COMMENT)




CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

________________________________
On Thu, Feb 6, 2020 at 9:39 PM Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote:


On Thu, Feb 6, 2020 at 5:14 PM Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> wrote:

but given that the recursive has no way of knowing what the
DNS client is planning to do (and that some ~20% of web traffic does not
use TLS), it's hard for me to argue that this document is making the wrong
recommendation about DNSSEC validation.

The question at hand is not about whether it ought to recommend DNSSEC validation but rather whether the text around that, which implies that failure to do so has a high risk of sending your sensitive *web* traffic to the attacker, is accurate given the high fraction of Web traffic that is protected with TLS and the likely even higher fraction of sensitive traffic that is..

The issue around implied risk, is a longitudinal one.

For sake of argument, let's assume 100.0% of web traffic is TLS protected.
Let's also assume that of the privacy resolver operators, there is at least one that does not do DNSSEC.

If an attacker obtains the private key for *some* certificate for a web site, what is the risk for the customers of the two groups of resolver operators?

The risk for the DNSSEC validating operators' clients is zero if the web site is in a DNSSEC signed domain.
The risk for the non-DNSSEC validating operators' clients is non-zero if the web site is in a DNSSEC signed domain.

The risk depends on the ability of the attacker to poison the cache.
The validating resolver cannot be poisoned if the zone is signed.
The non-validating resolver can be poisoned even if the zone is signed.

The fact of non-DNSSEC validation is very likely known, particularly given the public nature of privacy resolver operators, and trivial to confirm directly by using them as a resolver.
The non-validating operators will definitely be a target for such an attacker.

It doesn't particularly matter which certificate is compromised, in principal; the question is whether the web traffic for that site can be compromised. If the DNS poisoning succeeds, the answer is yes.

An attacker is unlikely to do the poisoning attack unless there is a benefit to doing so, such as already possessing the private key.

I don't have any particular knowledge of how often keys leak.

I do have a pretty good idea how easy it is to poison a resolver.

It is generally only a factor of, at most, bandwidth and the ability to send queries as a resolver client.
And unlike the typical ISP or enterprise or small network, the resolvers here have to be open for use to anyone.
This makes them particularly vulnerable to the conditions that facilitate poisoning.
And it is precisely this that make the case for a MUST rather than a SHOULD.

Brian