Re: [DNSOP] DNSOP Call for Adoption draft-vixie-dns-rpz

Ted Lemon <mellon@fugue.com> Wed, 21 December 2016 17:47 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82F78129873 for <dnsop@ietfa.amsl.com>; Wed, 21 Dec 2016 09:47:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jVhHYlUcLVcV for <dnsop@ietfa.amsl.com>; Wed, 21 Dec 2016 09:47:51 -0800 (PST)
Received: from mail-qk0-x236.google.com (mail-qk0-x236.google.com [IPv6:2607:f8b0:400d:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8A701293DB for <dnsop@ietf.org>; Wed, 21 Dec 2016 09:47:50 -0800 (PST)
Received: by mail-qk0-x236.google.com with SMTP id u25so78515648qki.2 for <dnsop@ietf.org>; Wed, 21 Dec 2016 09:47:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=ddncIc/nGh/p4VY1/spZSR4PI+XHuiEQe55sVe6NThk=; b=qaSjlt+H4MqCyXMkF3YO4BCAym34r3DUQAQ+bQ7pY5JFinEicR/8nJan+NxWVDddbd pydDcpjM5aWCGWeU1apPWn1ASvztkMa5cOwj8hqiKVOX7+gnvj2vgIadHS6/0cmd5w/q ZSBZSmQt3Bcp0uln2zfQajEOv1JUKo2BST2VGha9ruYgWIbkQixHBz9ax8lHwti4ZSdg UmzA4QduuSUxWcoDgVwi85/uEJAum3Vm4gReXwspSrRz06YTRmY3oz+j7ujUXEjNeJPj tW3i1JHY3MBMw4j1R4V4pr63x2tBBIUsu1cP1i5D9lDGlG/3jT+WgfUclr8xG2AXv2qN fsPg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=ddncIc/nGh/p4VY1/spZSR4PI+XHuiEQe55sVe6NThk=; b=lHKLhzppJdgIxfcpJm5syhCDmamxz+czt1Qb9HCHIzhchsgJ6E7VWhZt/3ej2a8bZo HCn0Z2HnwA3Yux3swQfyVbqJuvvRQVMHppdlskcYk75Uhgw9z8CZjc8Mmxae+wcnS/w+ ZcsXauNwUDhRqpesJdmmzSUqqQcvhassBGkvo2urHfUXTPk3sbcAjdHk2IvPep3B+B+M dt6CArX145rpmsKXeMbZ8uWxJetNQjx2cZKd10ouobCukFwX/w4b8j1PQ6ay3VMaB/je wKKj8uOUa0NS6W/E78LQ14COOZ2vGI+jwHNPX+GbjU0HtOUW3GG/0TFb3oyE4ItiyuhP G3Dg==
X-Gm-Message-State: AIkVDXLEE1idN14HrMLhNc4AJpMRHL+QTsDVBdcm08ty9WD2LWXobXG2SwgIxTfWoZVJ/A==
X-Received: by 10.55.4.134 with SMTP id 128mr5868818qke.281.1482342469958; Wed, 21 Dec 2016 09:47:49 -0800 (PST)
Received: from [192.168.1.131] (c-73-167-64-188.hsd1.nh.comcast.net. [73.167.64.188]) by smtp.gmail.com with ESMTPSA id y22sm15996048qtb.26.2016.12.21.09.47.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Dec 2016 09:47:48 -0800 (PST)
From: Ted Lemon <mellon@fugue.com>
Message-Id: <46FB1FAA-29FD-4844-87AF-61B4F37604F6@fugue.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_7610C1E7-AED2-4378-8373-6957E97DF0C3"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Date: Wed, 21 Dec 2016 12:47:47 -0500
In-Reply-To: <CAAiTEH_LOUhCSRuDNggTK9f1iWw6dCQB2bJQ7FVyYn3MH49KUQ@mail.gmail.com>
To: Matthew Pounsett <matt@conundrum.com>
References: <C18E2D4E-EE89-4AF6-B4A0-FAD1A7A01B5E@vpnc.org> <5248A099-7E1F-437A-A1B7-C300F917D273@fl1ger.de> <CACfw2hj4VfuqsM-jRpxNc+bWNsUcSid+Y=r9U5jsA-0ZLbLRUg@mail.gmail.com> <20161221.163826.74705202.sthaug@nethelp.no> <alpine.LRH.2.20.1612211047200.13966@bofh.nohats.ca> <CAAiTEH_-LGUkpmPjDRsKpnPhXev1sNdF_2yaVXKmeWMJ7vm_eg@mail.gmail.com> <6C982A3A-721C-4094-A04F-059698581321@fugue.com> <CAAiTEH_LOUhCSRuDNggTK9f1iWw6dCQB2bJQ7FVyYn3MH49KUQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3259)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/g_0rrUNDS61y310PhUwN8Kl0s8U>
Cc: dnsop <dnsop@ietf.org>, Paul Wouters <paul@nohats.ca>
Subject: Re: [DNSOP] DNSOP Call for Adoption draft-vixie-dns-rpz
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Dec 2016 17:47:52 -0000

On Dec 21, 2016, at 12:39 PM, Matthew Pounsett <matt@conundrum.com> wrote:
> None of those things are required by RPZ, but I believe they are required by the hypothetical better alternative that a few people have suggested we should work on instead.  

To be clear, there is no real alternative to RPZ in terms of providing protection.   We could provide annotation in RPZ, and that might be useful in some cases.   But ultimately if a domain is malicious, you _have_ to block it by not providing an answer.   If you do not, only those devices that implement the new protocol will be protected, which is to say we will be failing broken, not failing safe.

> If you want the browser to receive and understand a signal then that signal needs to be invented, the DNS servers need to be modified to send it, and the browsers (and all other applications you want to benefit) need to be modified to receive and understand it.  This is the point I was making.

Yes, correct.   I proposed a draft in tls to do this after the redirect has happened, which I think is useful, but does not solve the problem of signaling when DNSSEC is available: https://tools.ietf.org/html/draft-lemon-tls-blocking-alert-00 <https://tools.ietf.org/html/draft-lemon-tls-blocking-alert-00>

If we wanted to account for DNSSEC and provide signaling, I think the signaling would have to take the form of a signed EDNS0 option that signaled similar information.

In the draft I’m referencing, it was my intention to provide a set of values that could be returned to indicate what has happened.   I think it’s a bad idea to provide anything more than that, because for example if you return a text string, that becomes an attack surface.   You can use it to trick the user into bypassing their security settings.