Re: [DNSOP] [Ext] Security Considerations Suggestion for draft-ietf-dnsop-rfc7816bis

Paul Hoffman <paul.hoffman@icann.org> Tue, 31 March 2020 15:01 UTC

Return-Path: <paul.hoffman@icann.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E1DC3A23E0 for <dnsop@ietfa.amsl.com>; Tue, 31 Mar 2020 08:01:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fRVl-HGVfGCI for <dnsop@ietfa.amsl.com>; Tue, 31 Mar 2020 08:01:03 -0700 (PDT)
Received: from ppa3.lax.icann.org (ppa3.lax.icann.org [192.0.33.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C54163A2387 for <dnsop@ietf.org>; Tue, 31 Mar 2020 08:00:48 -0700 (PDT)
Received: from PFE112-CA-1.pexch112.icann.org (out.west.pexch112.icann.org [64.78.40.7]) by ppa3.lax.icann.org (8.16.0.42/8.16.0.42) with ESMTPS id 02VF0mYG018634 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 31 Mar 2020 15:00:48 GMT
Received: from PMBX112-W1-CA-1.pexch112.icann.org (64.78.40.21) by PMBX112-W1-CA-2.pexch112.icann.org (64.78.40.23) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 31 Mar 2020 08:00:46 -0700
Received: from PMBX112-W1-CA-1.pexch112.icann.org ([64.78.40.21]) by PMBX112-W1-CA-1.PEXCH112.ICANN.ORG ([64.78.40.21]) with mapi id 15.00.1497.006; Tue, 31 Mar 2020 08:00:46 -0700
From: Paul Hoffman <paul.hoffman@icann.org>
To: "Hollenbeck, Scott" <shollenbeck=40verisign.com@dmarc.ietf.org>
CC: "dnsop@ietf.org" <dnsop@ietf.org>
Thread-Topic: [Ext] [DNSOP] Security Considerations Suggestion for draft-ietf-dnsop-rfc7816bis
Thread-Index: AdYHX/gsc8iq0mP+SZ6sVAg3JqLxBQAR9u6A
Date: Tue, 31 Mar 2020 15:00:45 +0000
Message-ID: <67714498-6868-435D-941C-6E54E1DBEA2F@icann.org>
References: <51d9f36f70b84586a347a64088d7da4e@verisign.com>
In-Reply-To: <51d9f36f70b84586a347a64088d7da4e@verisign.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.0.32.234]
x-source-routing-agent: Processed
Content-Type: multipart/signed; boundary="Apple-Mail=_C50040C8-F111-42FD-957D-EF9C23B2CAA1"; protocol="application/pkcs7-signature"; micalg="sha-256"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.676 definitions=2020-03-31_05:2020-03-31, 2020-03-31 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/J-9qre-_-DHxE1IqEqqbLzzd2xk>
Subject: Re: [DNSOP] [Ext] Security Considerations Suggestion for draft-ietf-dnsop-rfc7816bis
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Mar 2020 15:01:11 -0000

On Mar 31, 2020, at 6:34 AM, Hollenbeck, Scott <shollenbeck=40verisign.com@dmarc.ietf.org> wrote:
> 
> I originally sent this to the list last July. Olafur provided some feedback (which has been incorporated into the text suggested below), but it seems to have slipped past the document editors. Trying again since the document has been revived after it recently expired...
> 
> I've recently been reading draft-ietf-dnsop-rfc7816bis and I'd like to propose some additional text for the Security Considerations section in the spirit of this sentence from the abstract:
> 
> "Future versions of this draft will contain descriptions of different minimisation implementation choices that have been made since the RFC 7816 first came out, as well as deployment experience."
> 
> QNAME minimization has the consequence of reduction in the amount of information seen by authoritative name server operators. Active consideration of that consequence is worth capturing as a factor to be weighed when making the choice to implement QNAME minimization. Here's suggested text:
> 
> "In addition to the performance considerations described in Section 4, there's also a security consideration associated with the reduction of  data sent to parental name servers: they lose some of their ability to assess security threats.  This ability  has proven to be useful in, for example, studies of name collision vulnerabilities.  It was also instrumental in the research that led to the discovery of the JASBUG vulnerability. The reduction will also have an impact on the level of detail available for research studies such as DNS-OARC's annual Day in the Life of the Internet (DITL) data collection exercise.
> 
> For this reason, operators should consider the potential impact on threat analysis and research when reducing the level of detail included in queries to parental name servers. Without such consideration, a collection of individual decisions to reduce query information, over time, may well have the unintended consequence of "deciding" to no longer support threat analysis and research that the operational DNS community has historically relied on.  Alternative mechanisms for facilitating threat analysis and research are beyond the scope of this document."

Sorry for missing that message last year. I remember it now, and I strongly disagree with the wording you propose.

(Disclaimer: ICANN uses the data we see at the root server we operate for security analysis, as does Verisign.)

Privacy-reducing exposure of data almost always can be supported as allowing better monitoring for security. That's always the balance. The folks who run root servers who use the data coming to them for security analysis will naturally want more data. The folks sending queries to the root servers who want more privacy will naturally want to send less data.

It is appropriate to mention this tension in the Security Considerations section. However, because the default is already "send full queries upstream", the current text seems sufficient to alert the reader of the privacy benefits.

Said a different way, if the wording above is needed for this document, it is needed for every document that adds encryption or reduces query traffic; the IETF has not done that much in the past.

--Paul Hoffman