Re: [DNSOP] New I-D for OCSP over DNS

"Dr. Pala" <director@openca.org> Thu, 02 November 2017 17:27 UTC

Return-Path: <director@openca.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1519613F6FF for <dnsop@ietfa.amsl.com>; Thu, 2 Nov 2017 10:27:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_HK_NAME_DR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PAi24RetPXsG for <dnsop@ietfa.amsl.com>; Thu, 2 Nov 2017 10:27:30 -0700 (PDT)
Received: from mail.katezarealty.com (mail.katezarealty.com [104.168.158.213]) by ietfa.amsl.com (Postfix) with ESMTP id C5B1613F6F3 for <dnsop@ietf.org>; Thu, 2 Nov 2017 10:27:29 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mail.katezarealty.com (Postfix) with ESMTP id 86A6D3743A42; Thu, 2 Nov 2017 17:27:29 +0000 (UTC)
X-Virus-Scanned: amavisd-new at katezarealty.com
Received: from mail.katezarealty.com ([127.0.0.1]) by localhost (mail.katezarealty.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 767nvnlxsRJB; Thu, 2 Nov 2017 13:27:24 -0400 (EDT)
Received: from Maxs-MBP.hsd1.co.comcast.net (c-67-176-54-195.hsd1.co.comcast.net [67.176.54.195]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.katezarealty.com (Postfix) with ESMTPSA id 6274B3741035; Thu, 2 Nov 2017 13:27:24 -0400 (EDT)
To: Shane Kerr <shane@time-travellers.org>
Cc: dnsop@ietf.org
References: <c40df475-cb18-0f89-50d4-0e3a08ab4f75@openca.org> <f3cd87af-6182-c260-1673-533dd63de2fb@time-travellers.org>
From: "Dr. Pala" <director@openca.org>
Organization: OpenCA Labs
Message-ID: <a6d130d1-fd77-adb7-2b85-d6f2154926e5@openca.org>
Date: Thu, 02 Nov 2017 11:27:23 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.4.0
MIME-Version: 1.0
In-Reply-To: <f3cd87af-6182-c260-1673-533dd63de2fb@time-travellers.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms030008050506060407070405"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/Suy01BrNmbgz_HKd8xIX5uKeOWs>
Subject: Re: [DNSOP] New I-D for OCSP over DNS
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Nov 2017 17:27:32 -0000

Hi Shane,

thanks for the reply and feedback, we do really appreciate :D For the 
replies to your comments, see inline.

Again, thanks!


On 10/30/17 3:23 AM, Shane Kerr wrote:
> Dr. Pala,
> [...]
> Some minor points, and then on to major issues....
>
> Section 6.3, "Time Validity" might be tricky. Someone reading the
> specification may infer that authoritative DNS servers are supposed to
> look at the OSCP record and clamp TTL to the expiration of the OCSP
> response. While there is some precedence for this (in RRSIG records),
> those are limited to cryptography that is for the DNS itself.
>
> My recommendation here is that it be made clear that as an operational
> matter that operators ensure that the records are published in a way
> that the TTL is low enough that they expire from caches before the OCSP
> response expiration.
Thanks. This is a good point. I will update the draft and add this 
consideration. It is to be noted that, today, most of the pre-computed 
OCSP tokens/responses are generated at specific times (few times a day) 
and usually have a configured validity time. This is probably easy to 
implement also in the DNS case where the ZONE file might be updated at 
specific times and the TTL, in that case, would be the same for all entries.

Good point, I will add some specific considerations for that.
>
> Section 7.2, "Use of TXT Records" may hit a problem similar to what
> happened with the SPF record. In SPF (a mail authentication &
> authorization technology), early implementations used TXT records. The
> DNS community encouraged a switch to a "real" RRTYPE for this. However,
> what ended up happening is that implementations had to support SPF *and*
> TXT records. This was extra work and even extra packets on the wire, and
> eventually the next SPF revision deprecated the SPF type.
>
> If the OSCPRR is not yet widely deployed, I would suggest at the very
> least changing "MAY use TXT records" to "SHOULD NOT use TXT records". If
> it is widely deployed, then... ug. ;)
I do agree with this point. I will remove the TXT example/suggestion.
>
> Now on to the big stuff. :)
>
> I think that more work needs to be done explaining why DNS is a more
> efficient delivery mechanism than HTTP or some other technology. If the
> idea is that resolvers provide "free" caching close to the user then
> this may be reasonable. If the idea is that DNS is a simple UDP
> protocol, then this may quite possibly backfire when you stick largish
> cryptographic blobs into the DNS responses; DNS is probably less
> efficient than HTTP then because you'll get UDP responses that tell you
> to switch to TCP... instead of starting with TCP in the first place.
The main point of this I-D is to allow for simple "caching" closer to 
the user. So, it is not about UDP or "low-latency" (as someone else in 
other WG asked about). This I-D is meant to leverage the widely 
distributed nature of the DNS so that operational costs can be lowered 
(from a Certification Authority point of view and the revocation 
information has another channel/transport mechanism that (in my opinion) 
will ease the use of revocation information in applications (not only 
browsers) and IoT space.

So, "free" caching is the target for us.
>
> Next, I think you may want to consider more security implications in
> pressing the DNS infrastructure into service as a critical component of
> a PKI infrastructure.
>
> Unlike HTTP, most DNS traffic is not encrypted (there are not even any
> drafts proposing a solution in the resolver-to-authoritative server
> space). This means that, for example, an attacker who gains access to
> DNS logs may not be able to infer clients who have not updated their
> revocation lists in a way that was not previously possible.
I am not sure about your point on the DNS logs - could you elaborate a 
little bit more? For the security of the communication (i.e., DNS 
traffic not being encrypted), consider that, today, most (if not all) 
the major Internet Certification Authorities distribute the pre-computed 
OCSP responses via CDNs over HTTP (not HTTPS). This is because all the 
OCSP responses are signed, therefore they can not be forged. However, 
this approach has security implications about MITM attacks that are the 
same as the DNS ones.
> None of this means that the proposal is a bad idea, just that more text
> would make it more convincing.
>
Again, I do really appreciate the feedback :D The whole point of IETF is 
to mold a good ideas by one person/group into a great idea that 
incorporates feedback from experts in different fields :D Our goal is to 
provide a good alternative to HTTP that is also easy to deploy so that 
it can be adopted and deployed easily.

Cheers,
Max

-- 
Best Regards,
Massimiliano Pala, Ph.D.
OpenCA Labs Director
OpenCA Logo