Re: [DNSOP] On trust anchors, roots of trust, humans and indirection

Tony Finch <dot@dotat.at> Wed, 28 March 2018 10:36 UTC

Return-Path: <dot@dotat.at>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B19B1241FC for <dnsop@ietfa.amsl.com>; Wed, 28 Mar 2018 03:36:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fC_A5n4iZY4T for <dnsop@ietfa.amsl.com>; Wed, 28 Mar 2018 03:36:17 -0700 (PDT)
Received: from ppsw-30.csi.cam.ac.uk (ppsw-30.csi.cam.ac.uk [131.111.8.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48C6B1204DA for <dnsop@ietf.org>; Wed, 28 Mar 2018 03:36:16 -0700 (PDT)
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: http://help.uis.cam.ac.uk/email-scanner-virus
Received: from grey.csi.cam.ac.uk ([131.111.57.57]:52427) by ppsw-30.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.136]:25) with esmtps (TLSv1:ECDHE-RSA-AES256-SHA:256) id 1f18RD-000NRj-eP (Exim 4.89_2) (return-path <dot@dotat.at>); Wed, 28 Mar 2018 11:36:15 +0100
Date: Wed, 28 Mar 2018 11:36:15 +0100
From: Tony Finch <dot@dotat.at>
To: Michael StJohns <msj@nthpermutation.com>
cc: "dnsop@ietf.org" <dnsop@ietf.org>
In-Reply-To: <a9bd794f-41bc-9593-db0d-5424c84431a3@nthpermutation.com>
Message-ID: <alpine.DEB.2.11.1803281105310.10477@grey.csi.cam.ac.uk>
References: <a9bd794f-41bc-9593-db0d-5424c84431a3@nthpermutation.com>
User-Agent: Alpine 2.11 (DEB 23 2013-08-11)
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="1870870841-990487114-1522233375=:10477"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/jrvfISt5U197F79UIp2MQmGuOfI>
Subject: Re: [DNSOP] On trust anchors, roots of trust, humans and indirection
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2018 10:36:20 -0000

Michael StJohns <msj@nthpermutation.com> wrote:
>

Interesting thoughts, thanks. I have a slightly different starting point,
which doesn't disagree with your argument, but leads to somewhat different
consequences.

> Proposition 1 (P1):  The initial selection of a root of trust (ROT) on behalf
> of a validator ALWAYS involves a human in the loop.  It may not be obvious
> which human(s), but it is always the case someone (not a computer) decided. 
> The selector may be the person configuring the validator or the set of people
> who compile the code with the validator, or linux distribution manager, but
> the initial selection always involves a judgement call of some sort by a
> human.  In many cases, this is a judgement call is based on external
> information (like widespread publication of the ROT information or multiple
> third party endorsements (e.g. reputation evaluation)).

I think it should be possible to automate this judgment call, given a
suitable distributed publication/endorsement mechanism. This is the point
of my trust anchor witnesses draft. The HITL doesn't select the trust
anchor directly, but instead selects the witnesses.

> Proposition 4 (P4):  The compromise of a singleton ROT (or more generally of
> all ROTs) leading to the "no trust" condition, requires repeating the "initial
> root of trust selection process". From the point of view of the validator,
> this is almost always a manual action either directly to the validator (manual
> configuration update, manual firmware update), or indirectly through a
> validators control point (e.g. pushed by a NOC).

With multiple trust anchor witnesses, a validator can survive the
compromise of a witness (or a witness ceasing operations, or multiple
witness failures) if it requires a large enough quorum when setting up or
recovering a trust anchor, and enough working witnesses remain. No need
for a HITL in these cases.

Loss of all witnesses should be extremely unlikely!

> Corollary 3 (C3): If P4, C1 and P1 are true, simply moving the ROT from the
> DNS Root Trust Anchor set to one or more CA ROTs does not mitigate against ROT
> compromise, it only moves the responsibility for mitigating the problem from
> the DNSSEC system to the CA system.

Right.

My idea is different because witnesses are not individually trusted: only
a quorum is enough to establish trust. A compromised witness is basically
equivalent to an unavailable witness (unless the compromise is as big as
the quorum!)

The aim is to disperse trust, not to move it around.

Tony.
-- 
f.anthony.n.finch  <dot@dotat.at>  http://dotat.at/  -  I xn--zr8h punycode
Biscay, Fitzroy, Sole: West or northwest 5 to 7, increasing gale 8 at times.
Rough or very rough, occasionally high later in west Fitzroy. Rain or thundery
showers. Good, occasionally poor.