Re: [DNSOP] On trust anchors, roots of trust, humans and indirection

Phillip Hallam-Baker <phill@hallambaker.com> Sun, 01 April 2018 19:20 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B90C1270A0 for <dnsop@ietfa.amsl.com>; Sun, 1 Apr 2018 12:20:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OZz4GvW4j7T6 for <dnsop@ietfa.amsl.com>; Sun, 1 Apr 2018 12:20:52 -0700 (PDT)
Received: from mail-oi0-x22c.google.com (mail-oi0-x22c.google.com [IPv6:2607:f8b0:4003:c06::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72003120454 for <dnsop@ietf.org>; Sun, 1 Apr 2018 12:20:52 -0700 (PDT)
Received: by mail-oi0-x22c.google.com with SMTP id l190-v6so11385256oig.9 for <dnsop@ietf.org>; Sun, 01 Apr 2018 12:20:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=jVApv+2/5fIwL2pFJwkfK3ZY9rlwrQ/0q7RE38RkH9I=; b=rTDFCPeP8GnooXAbMFV3xhVSOmxHLMm+gsT4lPgYCTWbNMkPDCOujUPF/vd7FhRtPt u7oc4piT5VcksJJHdJcydcOgWBlxUhOn6JBIgKrxR/D1EqGeSU/nOq4rsxyKamf/TTRN XhPbY09ghCm9obpV/t/7xvUjhJ4QXCNi6B+klnP66USiWxUYsrISRl82AOWQ7ttIRSz/ PGYcOI1a51oRV7J+paQk+vF5+gOWXjqcqx3HqPkmVvyecI1w7RrH/hNuVArzMZfu4m3L DWjgfS5GPWT+94Z66IBrfUxt3MGX5Bv+Gdg/7ylIz1XxqRKxsyH0wOInYlRT+oJ1VL7p FiRw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=jVApv+2/5fIwL2pFJwkfK3ZY9rlwrQ/0q7RE38RkH9I=; b=MhHQNvgrjcI9WRls57wFqQo6tqBPrf+3P9U7t7Pi69PIMVKySsOVQ4rOK0D4bIwQ25 RsnRtyiphXX5IJpT178qcSaJBNzkboShT6/Bqd7fwfQyorp1KyWE8Uehd8cPJnWzyTUX LCzUAHFMkdmqDa79mIdVvCGYRIUbJUYzR8JryL1FgssleDfMAYnLrOfyKah4Jy4NBXLW zOR8ekj11PPJkjsYAE3PVHffTdaNh8guhChktNq/kchiZwru0OcjiXw4u0CBID4eZisD zAAuwpwPuV/d3Q2YMpD5GV4IiC2/WVP83w0wxcJXgoYicU4WfKOpLPR/N9E8kpmUvC2H 2pyQ==
X-Gm-Message-State: ALQs6tBzmaLT4KGGSnskVF7BYbhvG8rApAXDaad2F9aoYLiwdj1UaLr9 v+oom4wBFQop/vyVMThKcnyK5F5nlSUg6Z+3Oho=
X-Google-Smtp-Source: AIpwx4+FpbvWTi3A+5xod+LFdyfITbrYqvmdcyLQZE7WV6bt6MCVfDNas9xvtrCTlkSW4tCxlvYZBVrwPsnOMVHRDss=
X-Received: by 2002:aca:a8cf:: with SMTP id r198-v6mr3973856oie.180.1522610451618; Sun, 01 Apr 2018 12:20:51 -0700 (PDT)
MIME-Version: 1.0
Sender: hallam@gmail.com
Received: by 2002:a9d:233c:0:0:0:0:0 with HTTP; Sun, 1 Apr 2018 12:20:50 -0700 (PDT)
In-Reply-To: <5AC11E00.1020100@redbarn.org>
References: <a9bd794f-41bc-9593-db0d-5424c84431a3@nthpermutation.com> <alpine.DEB.2.11.1803281105310.10477@grey.csi.cam.ac.uk> <cfc66d01-c8ce-b605-8074-8400b377f414@nthpermutation.com> <alpine.DEB.2.11.1803301403230.25657@grey.csi.cam.ac.uk> <CAMm+Lwj5JwrOTfWqNX740bgRYFn4k7gAhOB=cm=LYed=0Pu9pQ@mail.gmail.com> <alpine.DEB.2.11.1803301700030.30706@grey.csi.cam.ac.uk> <5ABE641F.6020501@redbarn.org> <alpine.DEB.2.11.1803312346270.5300@grey.csi.cam.ac.uk> <5AC03BAA.3080601@redbarn.org> <alpine.DEB.2.11.1804011521020.8307@grey.csi.cam.ac.uk> <5AC11E00.1020100@redbarn.org>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Sun, 01 Apr 2018 15:20:50 -0400
X-Google-Sender-Auth: 1sgd7lNc21DSoAw51Bgqr2wMgRc
Message-ID: <CAMm+LwiNhqAYBWkiBHaywZsvv+Ug7X5XQmTEGqUh3kQqPONY7g@mail.gmail.com>
To: Paul Vixie <paul@redbarn.org>
Cc: Tony Finch <dot@dotat.at>, "dnsop@ietf.org" <dnsop@ietf.org>, Michael StJohns <msj@nthpermutation.com>
Content-Type: multipart/alternative; boundary="00000000000019a1b50568ce5f16"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/jcCOKcuAemN04mJ1SkIDexP-QxE>
Subject: Re: [DNSOP] On trust anchors, roots of trust, humans and indirection
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Apr 2018 19:20:55 -0000

On Sun, Apr 1, 2018 at 1:59 PM, Paul Vixie <paul@redbarn.org> wrote:

>
>
> Tony Finch wrote:
>
>> Paul Vixie<paul@redbarn.org>  wrote:
>>
>>> i suggest that bind, unbound, powerdns, and so on change their packaging
>>> to
>>> put the trust anchor in a different upgradeable package (.deb, .rpm, etc)
>>> than the software itself. until and unless the package manager is
>>> secured by
>>> DANE rather than by ssh/pgp/x509/etc, then the solution for being on the
>>> shelf for several months is, do a software update before you try to go
>>> online.
>>>
>>
>> I think that's a good suggestion for the short term. For the longer
>> term I would like it to be possible to say that DANE is a reasonable
>> way to authenticate software updates, but at the moment it is not.
>>
>
> i believe that software packaging systems will never put that many moving
> parts between their users and their updates. it'll remain some flavour of
> non-distributed keying, like pgp and ssh, simply because of the
> risk/benefit ratio of adding third parties.
>
> i see a bright future for DANE, because of user-driven web and e-mail
> transactions, that are not point-source trust models.
> ​
>
   [RFC6698]  Hoffman, P. and J. Schlyter, "The DNS-Based Authentication
              of Named Entities (DANE) Transport Layer Security (TLS)
              Protocol: TLSA", RFC 6698
<https://tools.ietf.org/html/rfc6698>, August 2012.


​The RFC was published six years ago. Has anything happened since that
suggests this is the basis for a ubiquitous infrastructure? I am not aware
of anything.

I see a big future for using DNSSEC to distribute authenticated security
policies. But not via the TLSA record. It was tried, it failed.

Prefixed TXT records work and they do not demand end entities consider
their DNSSEC trust root to be trustworthy. Which is kind of essential if
you find yourself in the part of the world where the government is going to
insist that you trust their national DNSSEC root and not the ICANN one.


The only root of trust that is ever going to be acceptable to me is me. And
I am not the only person who thinks that way, ​the US federal government
developed the BridgeCA concept because US government agencies can't agree
who is going to be the ultimate source of trust among them. So you can be
absolutely certain they are never going to agree to it being ICANN.



​
​
On Fri, Mar 30, 2018 at 12:06 PM, Tony Finch <dot@dotat.at> wrote:

> Phillip Hallam-Baker <phill@hallambaker.com> wrote:
>
> > But even if we accept the need for updates, where does the ground truth
> > for the updates come from?
>
> Your vendor gets to decide :-)
>
>
Well that is precisely the point. One of the chief reasons I uninstall
software on machines is that it keeps making demands for updates.

What people tell each other is good security practice is often wrong or
even broken. We told people to change their passwords frequently for
decades until people did actual research and found that it was a terrible
idea and makes things worse, not better.

Keeping software up to date is one security CONCERN. It is one control that
addresses one potential source of risk in a system. It does not trump every
other concern.

In particular, I have managed systems in the past that have been either
subject to nation state level attack or are obvious targets for such
attack. The idea that such an actor would suborn a
​manufacturer is far from far-fetched, it has happened.

Hence my requirement that every actor be their own ultimate source of trust
but with the option to delegate management of that source of trust to a
third party of their choice.​