Re: [dns-privacy] [Ext] Revised opportunistic encryption draft

Brian Dickson <brian.peter.dickson@gmail.com> Mon, 16 November 2020 18:22 UTC

Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59CB03A137E for <dns-privacy@ietfa.amsl.com>; Mon, 16 Nov 2020 10:22:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id klZjvuNscz7R for <dns-privacy@ietfa.amsl.com>; Mon, 16 Nov 2020 10:22:47 -0800 (PST)
Received: from mail-vk1-xa30.google.com (mail-vk1-xa30.google.com [IPv6:2607:f8b0:4864:20::a30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B780F3A1378 for <dprive@ietf.org>; Mon, 16 Nov 2020 10:22:47 -0800 (PST)
Received: by mail-vk1-xa30.google.com with SMTP id b190so3945028vka.0 for <dprive@ietf.org>; Mon, 16 Nov 2020 10:22:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3muuawbDPUo5vLAzGhQWcN9zn23uApjrNuEJhIFSuCg=; b=PaeNW6pUBXMPNvi6JeGdQAhGys4FDBU2MiyfnXgUkbTdj08AcFPDmTOM2RsUeesiy1 28OuArB71ZXzx50e5IloGaVLGh3orSyaQFWs4vrLP5cji5yarD8y+QVuOKpypIpuqKTQ eSCsOESkyvwyVvzgn4+PaGhrjlGei14aCEslWratTl9KllIRdUVVWCkxMbTvZpxhkO7w OjnwZX/pR+ur590dsh0CHBbogOjr06bkTXUK6ydEn+IzFF5ZyipocQaqf1w2JPJwGGLi s408tJjHyf1P3PIqJggkQjYgvc8iVSo+ibJXaM+Vcq+q0H6KMoaQXmQdTro8JxHgcfzR wMLw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3muuawbDPUo5vLAzGhQWcN9zn23uApjrNuEJhIFSuCg=; b=HoMCidK7uEmtk4NDx1E+iTrje42aLpO6hz9vzt5ebEYPSP5KUYXE6uv5rpPOIrKPTY AL1YHlNwDrjCyg1r0UPkAKTQou/baqkJo8LQHvtt3dFXVqhT4iZ7FFMk1G8mxZhtHvZg j+XooBqht7cY178M0WB9J7olGC3QVxACwMVd4myJbwmVNIWEStJcFal12yCnD3zb0YtL jT6sb9yfZQpGB43GZkA3z8qmGOPj4wlOMAteJf9iWZMky92qnZixrmWySgxdmIVcSQP1 jCFhg9A/blB1zrMcCQcQ32L8nZuHJUMbKc8ZkpuDV3YchWiEZ/0n9h12Ii4FABdkSF6b E0SQ==
X-Gm-Message-State: AOAM533gwS/rjkb6PAwxULd1ecfFNmDCodgB9ZOrusOUa2AnBpPEbwwH 6KLSBgpmD0+s5iAiTOKglEh+Qj9qnQ6PG/rr7rmBIWX9ftA=
X-Google-Smtp-Source: ABdhPJwCF+cd+0vEcOivFq8T/k4JH+Knwg0DVVZD8TKe9jqR0mYpU/SJx7ghUq1EdM1BgZHzyr7ltaMIFhh6jyXYsFk=
X-Received: by 2002:a1f:198e:: with SMTP id 136mr8767874vkz.2.1605550966724; Mon, 16 Nov 2020 10:22:46 -0800 (PST)
MIME-Version: 1.0
References: <C0CBEBC5-D28A-46C0-AE50-078710015466@icann.org> <alpine.LRH.2.23.451.2010301202350.2587497@bofh.nohats.ca> <2444B21B-9465-4A5B-97CC-AF809309300A@icann.org> <CABcZeBPZFY9aQ5Nb0q_4uTMFRbY3-S2rus4vaeLaUmvU+h_ftg@mail.gmail.com> <2D07CBD0-30CE-418E-AD05-02E0A5EDB79F@icann.org> <CABcZeBNdNnyjzk0mOtfix=OvVTEpPzegEw_V5QfKvYtkFV+zOw@mail.gmail.com> <CAH1iCirz27EoahrYE8z9AV=Cf=A-i=iPP1deOYPWO8_k1mL+XA@mail.gmail.com> <27ddd3bde1ea11c857a96346b6f4ba5aa8b1d92f.camel@powerdns.com> <CAH1iCipYL6fujSLur6OsoPq3ACv-uOFGFOzks0oij-97gTfp6A@mail.gmail.com> <d8d1613f65f180f1495559114b55a2f06e7de08f.camel@powerdns.com>
In-Reply-To: <d8d1613f65f180f1495559114b55a2f06e7de08f.camel@powerdns.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
Date: Mon, 16 Nov 2020 10:22:35 -0800
Message-ID: <CAH1iCirx+QUOXico8vpJKos_jsSkVs-0v3SQqWNtGxv3P14wYQ@mail.gmail.com>
To: Peter van Dijk <peter.van.dijk@powerdns.com>
Cc: "dprive@ietf.org" <dprive@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000a5d1f05b43d77e0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/lMT9-nV51vxpMdAQ778kNzsPfrg>
Subject: Re: [dns-privacy] [Ext] Revised opportunistic encryption draft
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2020 18:22:49 -0000

On Mon, Nov 16, 2020 at 2:02 AM Peter van Dijk <peter.van.dijk@powerdns.com>
wrote:

> On Sun, 2020-11-15 at 12:40 -0800, Brian Dickson wrote:
> >
> > > > Using TLSA records at _853._tcp.<NS_NAME> in a signed zone provides
> an unambiguous signal to use optionally TLSA, in a downgrade-resistant
> manner.
> > >
> > > Not downgrade-resistant, until NS names in delegations become signed.
> >
> > That's a moot point.
> > TLSA records MUST be signed, and the TLSA RFC makes this very clear: RFC
> 6698 section 4.1 (Determining whether a TLSA RRSet can be used MUST be
> based on the
> >    DNSSEC validation state (as defined in [RFC4033]).
>
> Which buys you very little if the name you are looking up is from an
> unauthenticated source - like NS names in delegations.
>
>
Ah, okay, now I understand.

Yes, this is a huge gap in the fundamentals for any privacy architecture
(ADoT), which is rooted in the unsigned nature of NS records regardless of
the security state of a delegation (DNSSEC or not).

This pretty much impacts any solution that relies on either the names or IP
addresses of authoritative servers (the latter served as glue from the TLD).
An on-path active adversary (between recursive and TLD authoritative
server) would be able to modify these unsigned values.
Without any way to obtain them with some degree of protection (transport or
data), there is no path to connecting to the correct server initially over
TLS.

If the domain in question (the delegated domain, not the nameserver
namespace) is DNSSEC signed, it is possible to detect a discrepancy between
the delegation and apex NS records, assuming DNSSEC responses are not
blocked or tampered with.

If the domain in question is not DNSSEC signed, there is no defense against
such an attacker, if the query to the TLD is not protected by transport or
data security.

However, even in the signed zone case, confirming the apex NS records does
require a query to the authoritative server to verify things,
If the IP address used operates on port 853, there is no guarantee the
server responding is the actual authoritative server rather than an
attacker's server, since the name/IP could have been tampered with
initially.

This leads to a few possible conclusions:

   - With no changes to the DNSSEC management of TLDs (protocol and
   implementations), and with no availability of ADoT to TLD servers, an
   on-path active adversary :
      - Can defeat any attempt at privacy (ADoT) for unsigned zones
      - Can at most DOS any privacy mechanism for signed zones
   - The following techniques can alter the prerequisite conditions, each
   of which has deployment/operation concerns:
      - Changes to DNSSEC signing of (at minimum TLD) delegation data (NS
      records and glue A/AAAA records)
         - Many large hurdles to overcome, including standardization,
         implementation, and deployment
         - May not be offered by all (or even any) TLDs
         - Availability of ADoT at TLD servers
         - Protects traffic via TLS
         - May not be offered by all (or even any) TLDs
      - Eliminating the on-path possibility, by obtaining the TLD zone via
      AXFR/IXFR
         - Protecting the TLD zone transfer is possible by either ZONEMD
         signature, or by doing AXFR over TLS
         - May not be offered by all (or even any) TLDs




> > So, downgrade-resistant, period.
>
> No.
>

I stand corrected.
Downgrade resistant only if the delegation information is protected (NS
names in particular).

Protecting the delegation NS records against an on-path adversary (between
resolver and TLD) does not have any nice solutions.

Brian