Re: [dnsext] WGLC: draft-ietf-dnsext-dnssec-bis-updates-16

Samuel Weiler <weiler@watson.org> Mon, 12 March 2012 20:05 UTC

Return-Path: <weiler@watson.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0FA521F8928 for <dnsext@ietfa.amsl.com>; Mon, 12 Mar 2012 13:05:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.418
X-Spam-Level:
X-Spam-Status: No, score=-2.418 tagged_above=-999 required=5 tests=[AWL=0.181, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y3-32dc7vkQY for <dnsext@ietfa.amsl.com>; Mon, 12 Mar 2012 13:05:00 -0700 (PDT)
Received: from fledge.watson.org (fledge.watson.org [65.122.17.41]) by ietfa.amsl.com (Postfix) with ESMTP id 02B6521F844B for <dnsext@ietf.org>; Mon, 12 Mar 2012 13:04:59 -0700 (PDT)
Received: from fledge.watson.org (localhost.watson.org [127.0.0.1]) by fledge.watson.org (8.14.4/8.14.4) with ESMTP id q2CJfwPF086242; Mon, 12 Mar 2012 15:41:58 -0400 (EDT) (envelope-from weiler@watson.org)
Received: from localhost (weiler@localhost) by fledge.watson.org (8.14.4/8.14.4/Submit) with ESMTP id q2CJfwRu086238; Mon, 12 Mar 2012 15:41:58 -0400 (EDT) (envelope-from weiler@watson.org)
X-Authentication-Warning: fledge.watson.org: weiler owned process doing -bs
Date: Mon, 12 Mar 2012 15:41:58 -0400
From: Samuel Weiler <weiler@watson.org>
To: Mohan Parthasarathy <suruti94@gmail.com>
In-Reply-To: <CACU5sDnS-3V26yKyvTGObR67H2LPiBjWxCZAbMpHPZrgXJeNFg@mail.gmail.com>
Message-ID: <alpine.BSF.2.00.1203121532490.39342@fledge.watson.org>
References: <20120120054939.GD4365@mail.yitter.info> <CACU5sDnS-3V26yKyvTGObR67H2LPiBjWxCZAbMpHPZrgXJeNFg@mail.gmail.com>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.3 (fledge.watson.org [127.0.0.1]); Mon, 12 Mar 2012 15:41:58 -0400 (EDT)
Cc: DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] WGLC: draft-ietf-dnsext-dnssec-bis-updates-16
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Mar 2012 20:05:00 -0000

On Fri, 27 Jan 2012, Mohan Parthasarathy wrote:

> - Section 4.4 Insecure Delegation proofs last sentence is very
> confusing. An example as to what attack this is describing would be
> helpful to the implementer.

Here's an example of the attack we're trying to avoid.  Consider a 
signed zone that contains the names:
   alfa.example.com.
and
   bravo.alfa.example.com.

alfa.example.com is NOT a delegation.  Instead, it has this NSEC 
record:

 	alfa.example.com. 86400 IN NSEC host.example.com. (
 		A MX RRSIG NSEC TYPE1234 )

The quesion is: could an attacker use this NSEC record in reply to a 
query for bravo.alfa.example.com, replying with either a spoofed 
bravo.alfa.example.com or even claiming the name doesn't exist?  Under 
the old rules, read literally, that attack would work: the NSEC does 
not have a DS or SOA bit.  It also does not have an NS bit, but the 
rules did not say to check for that.

The forthcoming -17 has that section somewhat reworked.  There still 
is no example in.  Let us know if you really want that.

(note: the error is also broken, since bravo.alfa.example.com sorts 
before host.example.com.  maybe there are multiple ways to catch this 
attack.)

> - The "Security Considerations" section says:
>
>     This document adds two cryptographic features to the core DNSSEC protocol.
>
>    Is this referring to the algorithms mentioned in section 2.2 (
> which actually lists three)  or something else ?

clarified.

-- Sam