Re: [dns-privacy] [Last-Call] [Ext] Review of draft-ietf-dprive-rfc7626-bis-03

Eric Rescorla <ekr@rtfm.com> Fri, 10 January 2020 14:54 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD4711200E5 for <dns-privacy@ietfa.amsl.com>; Fri, 10 Jan 2020 06:54:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MDpEmETOSXvD for <dns-privacy@ietfa.amsl.com>; Fri, 10 Jan 2020 06:54:21 -0800 (PST)
Received: from mail-lj1-x233.google.com (mail-lj1-x233.google.com [IPv6:2a00:1450:4864:20::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E7E4120852 for <dns-privacy@ietf.org>; Fri, 10 Jan 2020 06:54:21 -0800 (PST)
Received: by mail-lj1-x233.google.com with SMTP id z22so2453745ljg.1 for <dns-privacy@ietf.org>; Fri, 10 Jan 2020 06:54:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=B1zxFt0aJoCSOleV2vqaMGkTfP52+69SNHS1Z1SuWgs=; b=HfzisjgsUTk3AVIHiF5Kf2DRNCWfqPwKQgPyXNzQuOwq3ok7B0kPmoHcY/3J4SXSFv SJyaI9QVw86TQB1Ci1pgXut02QF7lE1ehEGqa/GU/JTQbCN1Ef6LyWLmnu9IKCZw6ch8 hhWsRhdLQ+UY5kWc3MY8uPYK3nFr5ErGPi3HF1yLO4TnLmcQBZ+LTfbRLslZt/hxs06v Qpe76vwST4eHl9+yqP4Ip2zSC9KsNF/Z9RKee0h2mJap1+LlTUOUvuu38fYmt9pzJh+Y FebZKEGV6lpk6zmJUFUG1xst48qtUG+yjjwBnn9Jvamzhav19zs1PfskdEBZbITWqG7T 0DxQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=B1zxFt0aJoCSOleV2vqaMGkTfP52+69SNHS1Z1SuWgs=; b=L7SNbzKJdIwVB5fTcMZNqf5+9KfZawkS1yUVKDENksnKFKxUYrPZf/lngA0nzC4CrX TjdFOorL1KR4Jq35/Fds4Kit+5SZqUGpQez/VUofMBgeBpi1DbLwLJY817eMpXni4W0f ZiONCQ2nu5wCY8FZjlaGTFy+38d7/9gk2jvWMfYoXQ03cOEkcevqASILQf1lqMJxP39V tl2F/Dr8lDrwulSW/Q3erlzVXhAGkps3qdh+vYmHApxoALdWmKsPPtZJGvAGDXU2MWD5 GlLrIXCjdq6io79+ESkyqUpxGCrB1Z+AJo3b5XmXQhqdRL07SG0iJrCltSOmox1I67pj UeRA==
X-Gm-Message-State: APjAAAWotPXzGSY6+VAbYIBs/KF0hz+3T2Py2gfrVCRefj8nk52aMPMK DyrCTxn0SZmqX7RRC1YbJBPWvEZ+KdxhisnqB0ruRA==
X-Google-Smtp-Source: APXvYqwveWuPKIpgiYaWhQIweYdgn4XaddOd0PURbrb5jW6msVkaK0ZqbTG1eUITjCx+tKkbhNHCmPOR969xO0aCGkc=
X-Received: by 2002:a2e:b0e3:: with SMTP id h3mr2916554ljl.56.1578668059191; Fri, 10 Jan 2020 06:54:19 -0800 (PST)
MIME-Version: 1.0
References: <4639bd67-6fca-47d1-aaeb-85fcd0394f46@www.fastmail.com> <029D8BB9-CE93-486A-BDF2-6D0720E59109@sinodun.com> <CABcZeBO2eNo6d2PVd4DCiGCMgrZdmBrCkfKb9i7bx7ay4E0yAA@mail.gmail.com> <EE291DD5-D7B3-4FDA-A04F-9ADA7B2190FC@sinodun.com> <CABcZeBOW1XWX71ivh9t1tzogZntTsZHQQc4BXAjBra1a-HOUmA@mail.gmail.com> <8B36C1A0-B2D9-48E8-9C7D-BD0FED4E62FD@sinodun.com> <CABcZeBMcM3NtYW+c9OnqnFw2QTAmwyyVdLuHeNMiLqh6dC1oag@mail.gmail.com> <5FB2D0FA-A6E2-4F0A-8607-06520FD8F375@icann.org>
In-Reply-To: <5FB2D0FA-A6E2-4F0A-8607-06520FD8F375@icann.org>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 10 Jan 2020 06:53:42 -0800
Message-ID: <CABcZeBOVRyZSUBqP_OQ0HKnZdBRZJEpwQb4vX9qH2=VAMFFcWg@mail.gmail.com>
To: Paul Hoffman <paul.hoffman@icann.org>
Cc: "last-call@ietf.org" <last-call@ietf.org>, DNS Privacy Working Group <dns-privacy@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e30221059bca4ce5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/uijtfLEV4irkRsltN4GvO0kxEKM>
Subject: Re: [dns-privacy] [Last-Call] [Ext] Review of draft-ietf-dprive-rfc7626-bis-03
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 14:54:26 -0000

On Fri, Jan 10, 2020 at 6:50 AM Paul Hoffman <paul.hoffman@icann.org> wrote:

> On Jan 9, 2020, at 7:41 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> >>>> Section 3.5.1.2
> >>>>
> >>>> I admit that I don't understand the purpose of this section.
> Concentrating on minutiae, like the details of DHCP or ARP/NDP spoofing, is
> far too low level. If we were to simply assume the usual threat model
> [RFC3552], then the conclusions here are obvious: if you fail to
> authenticate the server, then you get the server that an attacker chooses.
> >>>>
> >>>> I would remove this section in favour of improving Section 3.5.1.4,
> which addresses the most pertinent question.
> >>>
> >>> RFC7626 included Section 2..5.3
> https://tools.ietf.org/html/rfc7626#section-2.5.3 ‘Rogue Servers’. This
> section is just an update of that text to improve context and remove the
> phrase ’rogue server’.  Since the majority of OS implementations still use
> these mechanisms today it seems to still be relevant.
> >>>
> >>> Well, as MT says, this is just the 3552 threat model.  The basic fact
> is that you need a reference to a server that is (1) securely obtained and
> (2) verifiable against the server itself. Absent that, you are subject to
> attack by the network.
> >>
> >> Suggest adding a sentence at the start of the section “[RFC3552]
> provides guidelines for describing Internet threat models. This section
> specialises the discussion to the case of DNS resolver configuration.”
> >>
> >> Well, that's a start, but the problem is still that it's too low level.
> If you insist on having this section, you should lay out the implications
> of the situation rather than (or at least in advance of) digging into the
> details.
> >
> > The level is detail is entirely comparible to that in the original RFC
> (much of the text is still the same).
> >
> > That doesn't seem like a particularly strong argument. We're revising
> this document and the question is what is good now.
> >
> >
> >
> > As I said to Martin, the section focusses on the impact on the DNS
> resolution path that results from the attack: diversion of traffic and
> traffic capture.. Are there other implications you think should be
> included? Please suggest text.
> >
> > I would replace the entirety of this section with:
> >
> > The Internet Threat model, as described in RFC 3552, assumes that the
> attacker controls the network. Such an attacker can completely control any
> insecure DNS resolution, both passively monitoring the queries and
> responses and substituting their own responses. Even if encrypted DNS such
> as DoH or DoT is used, unless the client has been configured in a secure
> way with the server identity, an active attacker can impersonate the
> server. This implies that opportunistic modes of DoH/DoT as well as modes
> where the client learns of the DoH/DoT server via in-network mechanisms
> such as DHCP are vulnerable to attack. In addition, if the client is
> compromised, the attacker can replace the DNS configuration with one of its
> own choosing.
>
> Given that this topic is one where there is rampant confusion, I think
> brevity and clarity are best for this document. I believe Ekr's words cover
> exactly what is needed here, and agree that the rest of the section should
> be eliminated.
>
> I aslo agree with earlier comments that this document referring to
> draft-arkko-arch-infrastructure-centralisation is a bad idea. We have no
> idea what that document will end up saying when published as an RFC.
>

Or whether it will be published as an RFC at all.

-Ekr


> --Paul Hoffman--
> last-call mailing list
> last-call@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call
>