Re: [dns-privacy] [Ext] Threat Model

Warren Kumari <warren@kumari.net> Sun, 03 November 2019 12:27 UTC

Return-Path: <warren@kumari.net>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC90A1200EC for <dns-privacy@ietfa.amsl.com>; Sun, 3 Nov 2019 04:27:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VF59mze3xxDj for <dns-privacy@ietfa.amsl.com>; Sun, 3 Nov 2019 04:27:32 -0800 (PST)
Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BB19120089 for <dns-privacy@ietf.org>; Sun, 3 Nov 2019 04:27:32 -0800 (PST)
Received: by mail-qk1-x72c.google.com with SMTP id i19so5818297qki.2 for <dns-privacy@ietf.org>; Sun, 03 Nov 2019 04:27:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=bwDGerOVp1UFD4I/SxenZ/pO29xXo+1DzBXSaSj3w9w=; b=MDfiwCTya9DkmvwVmOh6Cvr7oIhNstdJe1mZ1Sn9E/CBoibjoA2VC+ugr3XZK7mO1+ j0a4hJD4TeqA7EP0n8uijYcJOUQfBHRn0HEH9i6KYTQ0+qWYdkO/mmXicMY1tCIHxzaH kxCB2cIzK0e4rcz3qBSq+DfcCaRf6EA/XOCkoQ4fzjC5sZWEFXvke3LfOqSbflILLpAA Za79bSFGRaq1Dso1jok9V391JrVIspEYSGYOCewlYDQ1KeyzwnUET2m3YC7lx8yekuLl jXA4ONk6bdQLrM6NZuv4DK/JtR28DPxPZnIsVWL7iTmsMKwdCuCUUIgTiGTykZFrvLlm FhlA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=bwDGerOVp1UFD4I/SxenZ/pO29xXo+1DzBXSaSj3w9w=; b=JKBkUHSDFW58vpZk/ofvRYWfOZCzjZQ2tpuqgh6L+dBXM9Un7svA3/06nReZhtzjCv PcMmKumSmzIk4G23uEv8nt8ZjieenVFGBD+dUtMci3AzhrfhDWzJ7vt35YnyJKDz7J22 KZ2WbON1DxYZwfuh1ew1jtxDkIJ9mIPiWcR8eJ9Y6D/ljM+mqg/M30qvWdh7VYlhRXZc x6O7JaUSCmv775n6LbZBZics6BQFI07unfsC1q7jLWLROz4vIbe4ZSscWAQE92AxlkJy Ibjl3TSe5q0GwbWysoU7OZu8nG0mMdU21Ff08rujaKHV1Z0syVRqzAx+Mq66KW06GBm0 Owew==
X-Gm-Message-State: APjAAAXFPiXlGnyIeBkaAq+FfnpHUvpF9GeTw3nS6ctL0RnRgrU/AkWJ GWHiBcFIg/dyeWqZmpZDkcGpl/jQMupcZmyxIldw9w==
X-Google-Smtp-Source: APXvYqy1aNaOtK+CR1ws+EBzNhg7YH/HJGSjbYlxOBRrfzHcvKTzkz/WUAkWRvJ0da5U+YbrGVjtDOgTcMr0azZF8lE=
X-Received: by 2002:a37:8806:: with SMTP id k6mr17896687qkd.106.1572784050772; Sun, 03 Nov 2019 04:27:30 -0800 (PST)
MIME-Version: 1.0
References: <CABcZeBMQEJ=LE8ATQYnJj59srsK47hf4HT3BMMg3X2crVfSUXQ@mail.gmail.com> <1a70035e-edef-a3f4-ea91-52409ba37828@icann.org> <CABcZeBPAtvf3RU2gKWzyTaNwd6NBGsBuxq+n6r0W6-2RCnivSA@mail.gmail.com> <17189d1a-7689-f68d-6fe3-8d704af614a3@icann.org> <CABcZeBOhSYvqPyDcm9zbMYRc03DmPcCKYTYE-uC54=Mm9HMcnQ@mail.gmail.com> <99ee8cd4-9418-2d64-57fd-487b4f2c3a1a@cs.tcd.ie> <CABcZeBOBFFi=dA_XEzhkYvRU6kzvND5CMQcMoyriYusDH0RbKQ@mail.gmail.com> <CAHw9_iLz5No-SKa74To03ida3DHfeKY58CrJFJpLph8FsvzNQQ@mail.gmail.com> <CABcZeBMFDbATVRvJvvs5b4giQ=0B82i76ahv-ffDgWJOzqZccw@mail.gmail.com>
In-Reply-To: <CABcZeBMFDbATVRvJvvs5b4giQ=0B82i76ahv-ffDgWJOzqZccw@mail.gmail.com>
From: Warren Kumari <warren@kumari.net>
Date: Sun, 03 Nov 2019 07:27:19 -0500
Message-ID: <CAHw9_i+e8veeAz+KYXjvchmjKJz6OZHX1pEYx_Tvs8n5xnfBnQ@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: Paul Hoffman <paul.hoffman@icann.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a7af6b0596705249"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/ryL-0NXAX6zYHxAJ0-rqIS1g9lQ>
Subject: Re: [dns-privacy] [Ext] Threat Model
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Nov 2019 12:27:36 -0000

On Sat, Nov 2, 2019 at 10:01 PM Eric Rescorla <ekr@rtfm.com> wrote:

>
>
> On Sat, Nov 2, 2019 at 6:02 PM Warren Kumari <warren@kumari.net> wrote:
>
>> On Sat, Nov 2, 2019 at 3:59 PM Eric Rescorla <ekr@rtfm.com> wrote:
>> >
>> >
>> >
>> > On Sat, Nov 2, 2019 at 11:52 AM Stephen Farrell <
>> stephen.farrell@cs.tcd.ie> wrote:
>> >>
>> >>
>> >> Hiya,
>> >>
>> >> On 02/11/2019 18:33, Eric Rescorla wrote:
>> >> > On Sat, Nov 2, 2019 at 7:03 AM Paul Hoffman <paul.hoffman@icann.org>
>> wrote:
>> >> >
>> >> >> On 11/2/19 9:58 AM, Eric Rescorla wrote:
>> >> >>> Generally, I would expect that a solution which addressed the
>> active
>> >> >> threat model would also address the passive one.
>> >> >>
>> >> >> Of course, but there are many threat models that have different
>> solutions.
>> >> >> The passive threat models might be addressable more quickly than
>> the active
>> >> >> threat model.
>> >> >>
>> >> >
>> >> > Yes, that's why I asked the question of whether we are trying to
>> solve the
>> >> > active attacker case.
>> >>
>> >> Tackling passive and active attacks are not mutually
>> >> exclusive goals.
>> >
>> >
>> > Nor did I say they were.
>> >
>> >
>> >>
>> >> Experience from SMTP/TLS (as I interpret it anyway)
>> >> was that defence against active attacks only really
>> >> became tractable a few years after mitigations against
>> >> passive attacks had been deployed and clearly hadn't
>> >> broken anything. Note that that transition did not require any changes
>> >> to SMTP/TLS, though it may have needed
>> >> the mail equivalent of HSTS and reporting to have been
>> >> defined (it's hard to tell what really motivated folks
>> >> to try mitigate active attacks for sure).
>> >>
>> >> Whether or not adot is sufficiently similar is (for me)
>> >> an unknown at this point but I'd hope we don't rule that
>> >> out.
>> >
>> >
>> > I think the primary difference between this case and the TLS case,
>> > where, as I note below, defense against active attacks was required from
>> > the beginning, is the question of whether or not the reference that
>> > the initiator has tells it that it supposed to expect security. In the
>> case
>> > of TLS you have that with the different URI scheme (https) but in
>> > the case of email you do not.
>> >
>> > Conversely, what made opportunistic style approaches viable for
>> > SMTP was that there was an existing protocol handshake that
>> > could be conveniently adopted to have upward negotiation (STARTTLS).
>> > This was more of a pain with HTTP, though RFC 2817 does in fact
>> > specify something.
>> >
>> > In this case, I think the relevant question is whether there is some
>> > viable mechanism (by which I mean one that people might actually
>> > use) by which recursive resolvers would, in talking to an authoritative
>> > resolver, detect that that resolver supported secure transport and
>> > upgrade. If there is, then it's potentially possible to have some kind
>> > of opportunistic approach. And conversely, whether it's viable
>> > to have the records that point you to the next authoritative convey
>> > that you should expect security.. If there is, then it's potentially
>> > possible/better to have a non-opportunistic approach
>>
>> I've suggested a number of times, but haven't actually written up,
>> that you could encode this in the nameserver name - this is somewhat
>> similar to the dnscrypt idea...
>>
>> E.g - no DoX expected:
>> $ dig ns example.com
>> ;; ANSWER SECTION:
>> example.com. 42923 IN NS b.iana-servers.net.
>> example.com. 42923 IN NS a.iana-servers.net.
>>
>> Recursive resolvers should expect DoT:
>> $ dig ns example.com
>> ;; ANSWER SECTION:
>> example.com. 42923 IN NS b-dot.iana-servers.net.
>> example.com. 42923 IN NS a-dot.iana-servers.net.
>>
>>
>> Yes, I'll be the first to admit that it is hacky, and not it's not
>> completely foolproof, but it requires an attacker to do more than just
>> block port 853 to force a downgrade, and also means that resolvers
>> don't have to probe 853, wait for a timeout and then try 53
>> instead....
>>
>
> Can you expand on this? Is the convention that if I see x-dot.example.com,
> then I should expect DoT?
>

Yup, that’s it exactly.

As a DNS person, encoding semantics into the name makes me twitch, and I’m
concerned we eventually end up with:
x-dot-doh-ipv4-and-IPv6-I-also-support-tcp-far-our-in-the-uncharted-backwaters-of-the-western-spiral-arm.example.com,
but as a pragmatic and deployment it seem to work.

A suitably positioned *active* attacker could probably still cause a
downgrade (because glue isn’t signed), but it requires much more work on
the attackers part than:
deny I do any any 853
permit ip any any

This also gives us the opportunity for a bikeshed discussion re: what label
to use :-)

w


>
> -Ekr
>
>
>> W
>>
>>
>>
>> >
>> >
>> >>
>> >> ISTM that requiring day-1 defence against active attacks was to an
>> >> extent responsible for the lack of deployment
>> >> of IPsec and DNSSEC,
>> >
>> >
>> > I don't understand what DNSSEC would do if not defend against active
>> > attack.
>> >
>> >
>> >> so I hope we keep an eye on that
>> >> ball too.
>> >
>> >
>> > OTOH, TLS had day one defense against active attacks.
>> >
>> > -Ekr
>> >
>> > _______________________________________________
>> > dns-privacy mailing list
>> > dns-privacy@ietf.org
>> > https://www.ietf.org/mailman/listinfo/dns-privacy
>>
>>
>>
>> --
>> I don't think the execution is relevant when it was obviously a bad
>> idea in the first place.
>> This is like putting rabid weasels in your pants, and later expressing
>> regret at having chosen those particular rabid weasels and that pair
>> of pants.
>>    ---maf
>>
> --
I don't think the execution is relevant when it was obviously a bad idea in
the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair of
pants.
   ---maf