Re: [DNSOP] DNSOP: question about hardening "something like mDNS" against attacks

Jared Mauch <jared@puck.nether.net> Mon, 26 October 2020 21:17 UTC

Return-Path: <jared@puck.nether.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 246FF3A0F44 for <dnsop@ietfa.amsl.com>; Mon, 26 Oct 2020 14:17:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1AbjYCJEhIAg for <dnsop@ietfa.amsl.com>; Mon, 26 Oct 2020 14:17:32 -0700 (PDT)
Received: from puck.nether.net (puck.nether.net [204.42.254.5]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F109A3A0F41 for <dnsop@ietf.org>; Mon, 26 Oct 2020 14:17:31 -0700 (PDT)
Received: by puck.nether.net (Postfix, from userid 162) id AE9FF540147; Mon, 26 Oct 2020 17:17:30 -0400 (EDT)
Date: Mon, 26 Oct 2020 17:17:30 -0400
From: Jared Mauch <jared@puck.nether.net>
To: Ted Lemon <mellon@fugue.com>
Cc: Toerless Eckert <tte@cs.fau.de>, Jared Mauch <jared@puck.nether.net>, dnsop <dnsop@ietf.org>, kaduk@mit.edu
Message-ID: <20201026211730.GA1254962@puck.nether.net>
References: <20201025192456.GG48111@faui48f.informatik.uni-erlangen.de> <539093D8-97C4-448F-A9C4-288C2586BC51@fugue.com> <20201026165915.GA40654@faui48f.informatik.uni-erlangen.de> <41920477-8979-49EC-9F14-11A100D622FF@fugue.com> <6D931ED7-7A34-4E9D-B2CC-D2F555D79E0B@puck.nether.net> <20201026174221.GC40654@faui48f.informatik.uni-erlangen.de> <20201026200538.GA1328776@puck.nether.net> <4EBB9789-EDA8-418F-898F-3A2D0B3C5CC2@fugue.com> <20201026201448.GD40654@faui48f.informatik.uni-erlangen.de> <84D39283-D696-476E-A9CB-2ACCD7A7365F@fugue.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <84D39283-D696-476E-A9CB-2ACCD7A7365F@fugue.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/oEHnBiD1amcHDdo-8jMvlBccNTk>
Subject: Re: [DNSOP] DNSOP: question about hardening "something like mDNS" against attacks
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Oct 2020 21:17:33 -0000

On Mon, Oct 26, 2020 at 04:39:10PM -0400, Ted Lemon wrote:
> What actually hardens mDNS is that it’s a link-local protocol. 
> It doesn’t work across links. This limits the attack surface. 

Exactly.

> But there’s no way to eliminate the attack surface.  If I were in Ben’s shoes, 
> I’d be asking you to change the protocol to support authentication and 
> ToFU as a hardening strategy, with some better trust establishment mechanism 
> as future work based on the existing presence of crypto signatures. But 
> the current consensus of the IETF is apparently that ADs aren’t allowed to 
> insist on things like that. :(

We must also consider that mDNS is meant to provide that on-link communication
for devices that are perhaps not professionally managed, such as my
home where I may want to talk to raspberrypi.local or my printer
or other on-link device without placing it in some enterprise or other
lookup system.  This helps prevent remote attacks and discoverability of
my devices and provides security this way.

- Jared


-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.