Re: [DNSOP] Favor: Weigh in on draft-ietf-ipsecme-split-dns?

Paul Wouters <> Thu, 29 November 2018 05:31 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 42B5012875B; Wed, 28 Nov 2018 21:31:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id D92HKDKfN--v; Wed, 28 Nov 2018 21:31:08 -0800 (PST)
Received: from ( [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id CCAD012785F; Wed, 28 Nov 2018 21:31:07 -0800 (PST)
Received: from localhost (localhost [IPv6:::1]) by (Postfix) with ESMTP id 4355j51Kc5zCwQ; Thu, 29 Nov 2018 06:31:05 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=default; t=1543469465; bh=+14rzz68JBYY0OosNHaA211h5XAjDkt7BqVegRLrTIY=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=bsnVO3b/lRgVWyGkpdJpOp7DZ+oOxrBkKaZ7kF6n1cxkQHBVpbdB7+1Ae1Sk27Eyn VOnvUv7wbTiNgvjaGT51lykW+LlVvIH/aDrAbW4aNP/tulipHPPzudRwuBYmiT/edi cOwhb/bgbTMVFXKNOpdoPn6iaB5f3o3mmUktgnd8=
X-Virus-Scanned: amavisd-new at
Received: from ([IPv6:::1]) by localhost ( [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 9HXPSmzChdHP; Thu, 29 Nov 2018 06:31:03 +0100 (CET)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS; Thu, 29 Nov 2018 06:31:01 +0100 (CET)
Received: from [] (unknown []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPSA id AFB944081E4; Thu, 29 Nov 2018 00:30:59 -0500 (EST)
DKIM-Filter: OpenDKIM Filter v2.11.0 AFB944081E4
Content-Type: multipart/alternative; boundary="Apple-Mail-44A9AD92-2067-4580-8B55-1485467E8BE4"
Mime-Version: 1.0 (1.0)
From: Paul Wouters <>
X-Mailer: iPhone Mail (16A405)
In-Reply-To: <>
Date: Thu, 29 Nov 2018 13:30:52 +0800
Cc: Warren Kumari <>, Tony Finch <>, dnsop WG <>,, Joe Abley <>,
Content-Transfer-Encoding: 7bit
Message-Id: <>
References: <> <> <> <> <> <>
To: Ted Lemon <>
Archived-At: <>
Subject: Re: [DNSOP] Favor: Weigh in on draft-ietf-ipsecme-split-dns?
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 29 Nov 2018 05:31:12 -0000

> On Nov 29, 2018, at 08:49, Ted Lemon <> wrote:

> but I'd definitely be happier if the use case were more constrained

How could the use case be more constrained without breaking functionality?

> and the implementation advice were clearer.

What is unclear ? Do you have suggested improvement text?

> One thing that I really don't like is the text that talks about users being presented with confirmation messages.   That is an extremely bad message to put into this document.   The user should never ever ever see an offer to install one of these whitelists.   That's just the wrong UI flow.

Have you ever installed a Configuration Profile on iOS device? If your profile contains a VPN profile which contains a PkCS12 it will warn (entity installing this can monitor all your traffic) and show you the root CA.

The idea of the text is that this can be similarly done and warning you about the domains whitelisted. That would help if it suddenly lists or I believe this adds value and is better than not presenting the whitelist. Ignorant users will just click click click regardless and knowledgeable users can go “wait a minute”


>> On Wed, Nov 28, 2018 at 4:54 PM Warren Kumari <> wrote:
>> So, thank you everyone for commenting / the feedback...
>> I've been mulling this over, and, while I really don't like it, I think that the:
>> "IKE clients willing to accept INTERNAL_DNSSEC_TA attributes MUST use
>> a whitelist of one or more domains that can be updated out of band.
>> IKE clients with an empty whitelist MUST NOT use any
>> INTERNAL_DNSSEC_TA attributes received over IKE.  Such clients MAY
>> interpret receiving an INTERNAL_DNSSEC_TA attribute for a non-
>> whitelisted domain as an indication that their local configuration
>> may need to be updated out of band."
>> helps mitigate this -- as Tero says above, the user would have to jump through many stupid hoops in order to make themselves vulnerable.
>> If think that if the text around "that can be updated out of band" were strengthened (the current wording sounds like being updated out of band is one option, but e.g being updated in-band and "approved" by the user is another), and it were made a bit clearer how the whitelist might be managed I'd be (grudgingly) willing to remove my DISCUSS.
>> Again, I don't love this, but I think that the mitigations can be made to work, and it *does* solve a real world problem.
>> Can anyone *not* live with this?
>> W
>>> On Wed, Nov 28, 2018 at 8:12 AM Tero Kivinen <> wrote:
>>> Tony Finch writes:
>>> > Joe Abley <> wrote:
>>> > >
>>> > > It seems to me that the intended use-case is access to corporate-like
>>> > > network environments where might exist on
>>> > > the inside but not on the outside.
>>> > 
>>> > More likely cases like corporate-like.local or or
>>> > like.corp etc. usw. :-(
>>> Yes, this is the more common practice to use. I.e., several companies
>>> quite often have (multiple) internal domains they use. Because those
>>> are internal domains they cannot get real certificates for them.
>>> Because they cannot use real certificates they use self signed
>>> certificates, thus users have to click on "trust this web site having
>>> invalid certificate yes/no". The idea is that with TLSA we could get
>>> some kind of security for those internal sites.
>>> More competent companies might also run their own CA and use that to
>>> sign internal web sites, but unfortunately those more competent
>>> companies usually then also have heavy IT processes that requires all
>>> kind of complicated stuff to get things be signed by corporate CA, and
>>> then developers setting up intranet / chat system / testing setup etc
>>> revert to self signed certificates, because it is easy. On the other
>>> hand getting DNS names added to the internal DNS is usually something
>>> that happens often, and is not too hard to do, getting TLSA record
>>> along with the name should also be quite easy.
>>> Now when browsers start to make it harder and harder to allow access
>>> to self signed certificates, users are seeing more and more problems
>>> with that.
>>> > Private DNSSEC trust anchors should be distributed in the same way
>>> > that you would distribute corporate X.509 trust anchors.
>>> This is exactly what is proposed by the draft, execpt that it is split
>>> in two parts, i.e., the names for which TAs can be given are
>>> distributed in same way as X.509 trust anchors, the actual contents
>>> for the TA for that whitelisted name is distributed inside IKE.
>>> The draft requires the whitelist to pre-configured before starting up
>>> the VPN connection. It also do require implementations to ignore all
>>> those settings unless user have explictly configured split-tunnel on
>>> for that connection.
>>> I.e., in the example the VPNs-R-Us would not be able to set those
>>> configuration settings, nor would it be able to provide dialog asking
>>> that.
>>> VPN-R-Us would require provide instructions how to configure your VPN
>>> client to do that, i.e., it would need to ask users to do following:
>>>   - In your IPsec VPN configuration dialog click "Add" to add new VPN. 
>>>   - Type in VPNs-R-Us for name, and IP of f00::BA5 as IP-address.
>>>   - Click advanced
>>>   - In Advanced settings to go the enterprise VPN tab
>>>   - In there click the Enable Split-tunnel setup check box.
>>>   - Answer YES to question verifying that you really want to configure
>>>     this manually, and do not want to use the managment profile
>>>     provided by the enterprise (normally enterprise VPN setups are
>>>     managed automatically by profiles provided by the company, normal
>>>     users usually do not even have option to change anything).
>>>   - After that click "Add items to DNSSEC whitelist".
>>>   - Type in "", and click OK.
>>>   - (vpn client would probably forbid him adding .com to list as or if
>>>     it is added it would be ignored), so VPN-R-Us is smart and asks
>>>     following:
>>>   - Type in "" and click OK.
>>>   - Click OK to few times and get the VPN configuration setup.
>>>   - Then fire up the VPN client.
>>> More likely VPN-R-Us would say if you do not want to do that, just
>>> download this easy binary exe that will do all that configuration for
>>> you (and some others they do not mention).
>>> I.e., that whitelist needs to be modified out of band. Usually it is
>>> done by the management system taking care of the enterprise profiles,
>>> i.e., the same program that installs X.509 roots for the company CA,
>>> and mandates that virus checkers are up to date before allowing
>>> connection to the corporate network, and which also configures the VPN
>>> connection too.
>>> If you are running that kind of programs you have already given all
>>> control to whoever provided you that program (VPN-R-Us, or the
>>> enterprise).
>>> In enterprise case, you usually do not have option not to, as those
>>> softwares come pre-installed and you cannot uninstall or not to use
>>> them. On the other hand do not use your work laptop to go to paypal,
>>> if you do not trust your company...
>>> And yes, the enterprise (or VPN-R-Us) management.exe could also
>>> install those TAs directly for the global system use without any
>>> problems. This would not be problem for the VPN-R-Us (they would be
>>> happy to have fake TA in your system even when you are not using their
>>> VPN), but enterprise might not want to have its TA there when you are
>>> not connected to its network, just to limit the exposure, and they
>>> might want to update the TA contens, even when the whitelisted domain
>>> name stays same.
>>> I.e., if the TAs cannot be transmitted and agreed to be taken in use
>>> (after comparing them to whitelist) inside the IKE, then enterprises
>>> will most likely just install them by the management system for
>>> general use (or not use DNSSEC). I think that would weaken security
>>> more than what is proposed in this draft.
>>> -- 
>> -- 
>> I don't think the execution is relevant when it was obviously a bad idea in the first place.
>> This is like putting rabid weasels in your pants, and later expressing regret at having chosen those particular rabid weasels and that pair of pants.
>>    ---maf
>> _______________________________________________
>> DNSOP mailing list
> _______________________________________________
> DNSOP mailing list