Re: Interpreting DNSSEC was Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME

Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> Tue, 14 October 2008 15:32 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5A59F3A6862; Tue, 14 Oct 2008 08:32:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.674
X-Spam-Level:
X-Spam-Status: No, score=-4.674 tagged_above=-999 required=5 tests=[AWL=0.374, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xHFxv9P5VBFE; Tue, 14 Oct 2008 08:32:05 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 891E63A6A1E; Tue, 14 Oct 2008 08:32:05 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1Kpljk-000ArM-B7 for namedroppers-data@psg.com; Tue, 14 Oct 2008 15:23:04 +0000
Received: from [192.150.186.11] (helo=fruitcake.ICSI.Berkeley.EDU) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <nweaver@ICSI.Berkeley.EDU>) id 1KpljS-000Api-5N for namedroppers@ops.ietf.org; Tue, 14 Oct 2008 15:22:51 +0000
Received: from [IPv6:::1] (fruitcake [192.150.186.11]) by fruitcake.ICSI.Berkeley.EDU (8.12.11.20060614/8.12.11) with ESMTP id m9EFLvQ9015321; Tue, 14 Oct 2008 08:21:57 -0700 (PDT)
Cc: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>, Ben Laurie <ben@links.org>, Michael StJohns <mstjohns@comcast.net>, Alex Bligh <alex@alex.org.uk>, Wouter Wijngaards <wouter@NLnetLabs.nl>, namedroppers@ops.ietf.org
Message-Id: <A5A466C8-E774-4331-A63F-6C38778DECD3@icsi.berkeley.edu>
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
To: Edward Lewis <Ed.Lewis@neustar.biz>
In-Reply-To: <a06240803c51a5b57d9fa@[192.168.1.101]>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v929.2)
Subject: Re: Interpreting DNSSEC was Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME
Date: Tue, 14 Oct 2008 08:21:56 -0700
References: <Your message of "Mon, 22 Sep 2008 15:12:44 -0400." <E1KhqqB-000CE1-QD@psg.com> <200809230016.m8N0GS9E069236@drugs.dv.isc.org> <E1Khwdp-000J3V-QJ@psg.com> <a06240804c4ffc42abc16@[10.122.105.108]> <E1KicTm-000ANO-PO@psg.com> <a06240800c50fd3decd5b@[192.168.1.101]> <48F2DE42.1060209@links.org> <E1KpLkt-000HQ3-Is@psg.com> <48F33C34.3010901@nlnetlabs.nl> <D3AA46B662F334B8639E08CF@Ximines.local> <48F35170.30900@links.org> <4B27E2458EBA97669B259355@Ximines.local> <a06240800c5190d86422c@[192.168.1.101]> <STNTEXCH12OdHa24ABv00004495@stntexch12.cis.neustar.com> <a06240805c5193b226886@[10.31.201.38]> <48F3B11B.8090202@links.org> <a06240803c51a5b57d9fa@[192.168.1.101]>
X-Mailer: Apple Mail (2.929.2)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

On Oct 14, 2008, at 7:26 AM, Edward Lewis wrote:

> At 21:35 +0100 10/13/08, Ben Laurie wrote:
>
>> Broadly I agree, except I think you can also choose BOGUS ==  
>> UNSECURE ==
>> UNKNOWN.
>
> Such a strategy is akin to (today) only using IPv6. ;)  That is,  
> most of the network is not doing DNSSEC and not doing IPv6.
>
> Equating SEURE, UNSECURE, and UNKNOWN is what I think is more to the  
> spirit of DNSSEC and incremental deployment.  It's a recognition  
> that what can be secure is but you still have access to the legacy  
> network.
>
> Equating BOGUS, UNSECURE, and UNKNOWN is a paranoid strategy, only  
> trusting what you can see and touch.
>
> In some circles I can understand the paranoia.  But most of the  
> economy needs open access and a willingness to accept risk.

Then why not the following:

DNSSEC has two uses:  Secure name lookup, and as Another CA  
Infrastructure Run By Verisign Combined With A Hierarchical  
Distributed Integrity Data Store for small datums.  For "Another CA  
Infrastructure", the end application needs full control and full  
information, and a much richer API then gethostbyname().


But for secure name lookup, DNSSEC's additional protection is against  
in-path adversaries.  The adversary on the wire is not a real concern  
to my mind for DNS (its a concern for the end application).

But as witnessed by David Dagon's work, ISP's which wildcard failures,  
and even legitimate sites like OpenDNS man-in-the-middling some names  
( dig www.google.com @208.67.222.222 ), the recursive resolver IS an  
in-path adversary and a serious concern.


Thus why not the following default policy:  If the host's stub  
resolver is actually caring about DNSSEC ("secure name lookup"),  
operate in the following mode:

a)  If the stub resolver can fully validate a complete signature chain  
for the record returned from the recursive resolver, accept it, cache  
it, return it for gethostbyname() and have a nice day.

b)  If, FOR ANY REASON, the stub resolver can not fully validate the  
complete signature chain (expired signature, bad signature, recursive  
resolver lying, recursive resolver stating "What's DNSSEC d00d?"), it  
conducts a complete recursive fetch of its own to get the value to be  
returned to the querying application, and does not cache any record  
that doesn't have a valid signature.


This way, all failures of DNSSEC (or failure to USE DNSSEC) will still  
resolve, and, as importantly, they will resolve over what will be  
effectively the same path for in-path adversaries as the application  
will face.

I will argue that this is the correct behavior, because any  
application which would trust the name is probably vulnerable to the  
MitM anyway, so you haven't increased the vulnerability to the end  
application generating the query, but did not act as a denial-of- 
service attack because of a signature failure.


--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>