Re: [DNSOP] New I-D for OCSP over DNS

Shane Kerr <shane@time-travellers.org> Mon, 30 October 2017 09:23 UTC

Return-Path: <shane@time-travellers.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2ED2013B10E for <dnsop@ietfa.amsl.com>; Mon, 30 Oct 2017 02:23:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ebJkK79t9XpF for <dnsop@ietfa.amsl.com>; Mon, 30 Oct 2017 02:23:27 -0700 (PDT)
Received: from time-travellers.nl.eu.org (c.time-travellers.nl.eu.org [IPv6:2a02:2770::21a:4aff:fea3:eeaa]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 344CA13AC0E for <dnsop@ietf.org>; Mon, 30 Oct 2017 02:23:27 -0700 (PDT)
Received: from iceeecoldddd.billingeenvo.p3.tiktalik.io ([37.233.99.157] helo=[127.0.0.1]) by time-travellers.nl.eu.org with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <shane@time-travellers.org>) id 1e96K9-0001hm-Em; Mon, 30 Oct 2017 09:25:37 +0000
To: "Dr. Pala" <director@openca.org>
References: <c40df475-cb18-0f89-50d4-0e3a08ab4f75@openca.org>
From: Shane Kerr <shane@time-travellers.org>
Cc: dnsop@ietf.org
Message-ID: <f3cd87af-6182-c260-1673-533dd63de2fb@time-travellers.org>
Date: Mon, 30 Oct 2017 09:23:00 +0000
MIME-Version: 1.0
In-Reply-To: <c40df475-cb18-0f89-50d4-0e3a08ab4f75@openca.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/PAjdn8IfZV-_Pbau2y9VY98dOrw>
Subject: Re: [DNSOP] New I-D for OCSP over DNS
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Oct 2017 09:23:29 -0000

Dr. Pala,

Dr. Pala:
> Hello all,
> 
> As suggested by some people from other WGs, I just wanted to cross-post
> this message here since the proposal heavily rely on DNS and can be
> leveraged in many different environments (e.g., Server and Client
> (browsers) authentication, document validation, IoT identities, etc.)
> and we would like to receive feedback from anybody who might be
> interested in the topic.
> 
> *Context. *We are currently working on specifying how to use DNS as a
> transport protocol for revocation information for digital certificates.
> In particular, we are working on how to leverage the distributed nature
> of DNS to efficiently (and possibly at a lower operational costs)
> distribute OCSP (Online Certificate Status Protocol) responses to
> applications/devices/etc.
> 
> *Current Status.* We started this work sometime ago but never really had
> the time to finish it. Now it seems we can focus more on the topic and
> would like to discuss this work in a more public venue. We have recently
> updated the two competing I-D we submitted sometime ago into the latest
> reference I-D that is available here:
> 
>     https://datatracker.ietf.org/doc/draft-pala-odin/
> 
> Please feel free to contact us for any help (you might require or you
> might provide), feedback, etc.

I had a quick look and have a few comments/suggestions.

Some minor points, and then on to major issues....

Section 6.3, "Time Validity" might be tricky. Someone reading the
specification may infer that authoritative DNS servers are supposed to
look at the OSCP record and clamp TTL to the expiration of the OCSP
response. While there is some precedence for this (in RRSIG records),
those are limited to cryptography that is for the DNS itself.

My recommendation here is that it be made clear that as an operational
matter that operators ensure that the records are published in a way
that the TTL is low enough that they expire from caches before the OCSP
response expiration.

Section 7.2, "Use of TXT Records" may hit a problem similar to what
happened with the SPF record. In SPF (a mail authentication &
authorization technology), early implementations used TXT records. The
DNS community encouraged a switch to a "real" RRTYPE for this. However,
what ended up happening is that implementations had to support SPF *and*
TXT records. This was extra work and even extra packets on the wire, and
eventually the next SPF revision deprecated the SPF type.

If the OSCPRR is not yet widely deployed, I would suggest at the very
least changing "MAY use TXT records" to "SHOULD NOT use TXT records". If
it is widely deployed, then... ug. ;)

Now on to the big stuff. :)

I think that more work needs to be done explaining why DNS is a more
efficient delivery mechanism than HTTP or some other technology. If the
idea is that resolvers provide "free" caching close to the user then
this may be reasonable. If the idea is that DNS is a simple UDP
protocol, then this may quite possibly backfire when you stick largish
cryptographic blobs into the DNS responses; DNS is probably less
efficient than HTTP then because you'll get UDP responses that tell you
to switch to TCP... instead of starting with TCP in the first place.

Next, I think you may want to consider more security implications in
pressing the DNS infrastructure into service as a critical component of
a PKI infrastructure.

Unlike HTTP, most DNS traffic is not encrypted (there are not even any
drafts proposing a solution in the resolver-to-authoritative server
space). This means that, for example, an attacker who gains access to
DNS logs may not be able to infer clients who have not updated their
revocation lists in a way that was not previously possible.

None of this means that the proposal is a bad idea, just that more text
would make it more convincing.

Cheers,

--
Shane