Re: [DNSOP] Closing out issues in draft-ietf-dnsop-resolver-priming

Shane Kerr <shane@time-travellers.org> Fri, 16 October 2015 18:42 UTC

Return-Path: <shane@time-travellers.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53F341ACD52 for <dnsop@ietfa.amsl.com>; Fri, 16 Oct 2015 11:42:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kzQh8NYfJ2H8 for <dnsop@ietfa.amsl.com>; Fri, 16 Oct 2015 11:42:05 -0700 (PDT)
Received: from time-travellers.nl.eu.org (c.time-travellers.nl.eu.org [IPv6:2a02:2770::21a:4aff:fea3:eeaa]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4EC81ACD4D for <dnsop@ietf.org>; Fri, 16 Oct 2015 11:42:04 -0700 (PDT)
Received: from [2001:960:7b5:2:224:9bff:fe13:3a9c] (helo=pallas.home.time-travellers.org) by time-travellers.nl.eu.org with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <shane@time-travellers.org>) id 1Zn9x3-0003oL-Sb; Fri, 16 Oct 2015 18:42:01 +0000
Date: Fri, 16 Oct 2015 20:42:02 +0200
From: Shane Kerr <shane@time-travellers.org>
To: Joe Abley <jabley@hopcount.ca>
Message-ID: <20151016204202.677f3be3@pallas.home.time-travellers.org>
In-Reply-To: <BCE894DC-01B6-42C4-9589-1C19CA395250@hopcount.ca>
References: <8149BC4D-F11E-4E4F-BBB8-C38D865A4184@vpnc.org> <20151016161831.58bdf78d@pallas.home.time-travellers.org> <56211942.20206@redbarn.org> <CAJE_bqcxjC=zS8tj6tKGX18UeEFm6GHcyRhjC7AFdh3x9-L=vA@mail.gmail.com> <d2f5212cbf9b4f46a5cae9f3af3f1f50@mxph4chrw.fgremc.it> <A7B11A56-A66F-4E13-9675-56344E25C403@vpnc.org> <BCE894DC-01B6-42C4-9589-1C19CA395250@hopcount.ca>
X-Mailer: Claws Mail 3.12.0 (GTK+ 2.24.28; x86_64-pc-linux-gnu)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/EjZgb3RXeYWLjRmLxp2lZW5TvYo>
Cc: dnsop WG <dnsop@ietf.org>
Subject: Re: [DNSOP] Closing out issues in draft-ietf-dnsop-resolver-priming
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Oct 2015 18:42:06 -0000

Joe,

On Fri, 16 Oct 2015 13:58:00 -0400
"Joe Abley" <jabley@hopcount.ca> wrote:

> On 16 Oct 2015, at 13:15, Paul Hoffman wrote:
> 
> > On 16 Oct 2015, at 10:07, Darcy Kevin (FCA) wrote:
> >
> >> Let's see, millions of full-service resolvers, times the packet-count 
> >> differential between UDP and TCP, times the average reload/restart 
> >> frequency of those full-service resolvers per day/week/month. Can't a 
> >> case be made from sheer volume?
> >
> > The root operators have shown no concern about legitimate resolvers 
> > asking a lot more queries. Given that using TCP for priming helps 
> > mitigate an injection attack,
> 
> Have we characterised this attack at all?

Seems like quite an easy attack at first blush. One could send a
constant stream of priming answers to resolvers since they would get
made once a day.

While the chance of poisoning any one resolver with such a response is
low, the impact is catastrophic to a non-validating resolver, as an
attacker basically owns your view of the Internet at that point. For
resolvers that do validate, the only issue is information leakage that
a random party can see all of your root queries (or possibly a DoS). 

> We're talking principally about a risk to resolvers that prime but don't 
> validate, right?

This draft also says that you MUST NOT set the DO bit on priming
queries, so any resolver following this draft isn't validating.

While a resolver could validate the NS RRSET, as you know the
ROOT-SERVERS.NET domain is not signed, so the A and AAAA records
(what you really care about) cannot be validated.

I know there is discussion about signing the root servers somehow, so
perhaps a resolver that cares could someday validate the priming
query... but we should probably remove the MUST NOT text around the DO
bit then, perhaps replacing it with a SHOULD recommending validation.

Cheers,

--
Shane