Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt

"Hosnieh Rafiee" <ietf@rozanak.com> Tue, 19 August 2014 22:07 UTC

Return-Path: <ietf@rozanak.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F241F1A6F2F for <dns-privacy@ietfa.amsl.com>; Tue, 19 Aug 2014 15:07:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.568
X-Spam-Level:
X-Spam-Status: No, score=-2.568 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.668] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JQGj6Bn6lZvg for <dns-privacy@ietfa.amsl.com>; Tue, 19 Aug 2014 15:07:06 -0700 (PDT)
Received: from mail.rozanak.com (mail.rozanak.com [IPv6:2a01:238:42ad:1500:aa19:4238:e48f:61cf]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CD521A017E for <dns-privacy@ietf.org>; Tue, 19 Aug 2014 15:07:05 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mail.rozanak.com (Postfix) with ESMTP id 4FB68566013B; Tue, 19 Aug 2014 22:07:03 +0000 (UTC)
X-Virus-Scanned: amavisd-new at rozanak.com
Received: from mail.rozanak.com ([127.0.0.1]) by localhost (mail.iknowlaws.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yVQGqaleWL2q; Wed, 20 Aug 2014 00:06:33 +0200 (CEST)
Received: from kopoli (p5DCC776E.dip0.t-ipconnect.de [93.204.119.110]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.rozanak.com (Postfix) with ESMTPSA id 996775660137; Wed, 20 Aug 2014 00:06:32 +0200 (CEST)
From: Hosnieh Rafiee <ietf@rozanak.com>
To: 'Carsten Strotmann' <cas@strotmann.de>
References:
In-Reply-To:
Date: Wed, 20 Aug 2014 00:06:29 +0200
Message-ID: <00ba01cfbbf9$d561f010$8025d030$@rozanak.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac+75MgogK9rLesYRS6TfLkL0S8e/gAEyMDw
Content-Language: en-us
Archived-At: http://mailarchive.ietf.org/arch/msg/dns-privacy/ptfxi3bflwtzurvRYiEX99sFqGc
Cc: dns-privacy@ietf.org, 'Paul Wouters' <paul@nohats.ca>
Subject: Re: [dns-privacy] [SPAM] Re: New draft on encrypting the stub-to-resolver link: draft-hoffman-dns-tls-stub-00.txt
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Aug 2014 22:07:10 -0000

I change my story a bit based on some offlist discussions ...

So the point 1 from summary email changes like this
1-  Opportunistic encryption is not appropriate for the privacy of stub
resolver to recursive resolver scenario unless the node has a possibility to
authenticate this resolver.
If you think when your domain is signed by DNSSEC, a fake resolver cannot
cause any problem for you, I gives you an example. You can argue with your
own example.

This is the scenario where there is no authentication but a  record is
supposed to signed by a DNSSEC server. 
A domain called www.example.com signed by DNSSEC A.  
Client B wants to browse "www.example.com". 
It asks the IP address of this from resolver C. Attacker D spoof the IP
address of resolver C and response to this query with the IP address of his
own server F. The client cannot verify this attacker in any case since it is
only a stub resolver and dependent to a recursive resolver for query
different authoritative DNS server in order to verify this DNSSEC server.
This is why the stub resolver accepts whatever receives from this fake
DNSSEC server. 

So, either client B encrypt the queries send back and forth to the resolver,
it ends to the case where the unwanted person can still eavesdrop this
communication by directly answer to the node in place of resolver.

In my opinion it does not matter whether this record is signed or encrypted,
the stub resolver has no possibility to verify that record. So, an attacker
can directly be in the middle of the communication and forward all the
packets to his desire place. So DNSSEC in this stage or last mile does not
help. 


> > How can you sign DNSSEC data without being in the posession of the
> > private signing key(s) all the way to the root?

So based on the revision in item 1. I can also revise my answer here.

I don't need to sign the DNSSEC data since the stub resolver is dependent to
me (or a DNSSEC recursive resolver) to verify any other DNSSEC server. 


Best,
Hosnieh