Re: [DNSOP] NSEC/NSEC3 for unsigned zones and aggressive use

Petr Špaček <petr.spacek@nic.cz> Fri, 21 July 2017 08:24 UTC

Return-Path: <petr.spacek@nic.cz>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1E34131748 for <dnsop@ietfa.amsl.com>; Fri, 21 Jul 2017 01:24:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7
X-Spam-Level:
X-Spam-Status: No, score=-7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nic.cz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8SucaakXvdZs for <dnsop@ietfa.amsl.com>; Fri, 21 Jul 2017 01:24:38 -0700 (PDT)
Received: from mail.nic.cz (mail.nic.cz [217.31.204.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A612412EC51 for <dnsop@ietf.org>; Fri, 21 Jul 2017 01:24:38 -0700 (PDT)
Received: from [IPv6:2001:67c:370:128:8f23:502f:10bd:1a2a] (unknown [IPv6:2001:67c:370:128:8f23:502f:10bd:1a2a]) by mail.nic.cz (Postfix) with ESMTPSA id 39CED62250 for <dnsop@ietf.org>; Fri, 21 Jul 2017 10:24:37 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nic.cz; s=default; t=1500625477; bh=CuKQ79bIdPLyqFGH7J7D40kk+fzH9xrrjrn0wij9oa4=; h=To:From:Date; b=f+y3rbNd9ZTSpXHa3VbCijMUebyige1nlnclk1jnRLHfO5EJky8F2hdswALCp9suH w1I0kPe4cXRqaqjuaMzTuLiySZjWIzhJ8EFZ+8Xhad5Q6WyqUcHszi8qqj/UOZDha9 AHfZYG6VmagaeDB6aI7wHvKGG3dBeokPbdw5NrQg=
To: dnsop@ietf.org
References: <201707190850.v6J8ol1c028029@givry.fdupont.fr>
From: Petr Špaček <petr.spacek@nic.cz>
Organization: CZ.NIC
Message-ID: <eb8b12e6-1a0e-38b7-0b31-8c242741536e@nic.cz>
Date: Fri, 21 Jul 2017 10:24:35 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <201707190850.v6J8ol1c028029@givry.fdupont.fr>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: clamav-milter 0.99.2 at mail
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/VgIPEf2dcnaRIbcSQk3oH4sSDBc>
Subject: Re: [DNSOP] NSEC/NSEC3 for unsigned zones and aggressive use
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 08:24:40 -0000

On 19.7.2017 10:50, Francis Dupont wrote:
>  In your previous mail you wrote:
> 
>>  NSEC needs no keys, only their RRSIGs would which wouldn't exist in
>>  unsigned zones. In this case the unsigned NSEC would also not be part of
>>  the zone (it would have to be synthesized and maintained outside the
>>  zone).
> 
> => but it is created by an authoritative server, isn't it?
> And as it is synthesized I can't see a good reason to use NSEC3 instead.
> 
>>  Because an unsigned/unauthenticated NSEC/NSEC3 has the potential to nix
>>  entire zones, when it was discussed, Mark Andrews suggested that
>>  requiring DNS COOKIE to further reduce the chance of cache poisoning
>>  (more than source port randomization and random message ID) could be a
>>  reasonable idea to think about.
> 
> => it adds a nonce so another (short) bunch of unpredictable bits.
> As NSEC is not signed it is more than vulnerable to on-the-path attacks.
> I am afraid it is first a massive zone destruction weapon and after
> perhaps an optimization...

Oh yes, very good point Francis. Let me repeat that I'm against this
proposal.

Petr Špaček  @  CZ.NIC

> 
>>  > It seems easier to remember that DNSSEC offers proofs for denial of
>>  > existence.
> 
> => still applies...
> 
> Regards
> 
> Francis.Dupont@fdupont.fr
> 
> PS: really if this is deployed I can see more "interesting" ways for misuses
> than real benefits. Of course it can be a mean to make zone managers