Re: [DNSOP] Favor: Weigh in on draft-ietf-ipsecme-split-dns?

Warren Kumari <> Wed, 28 November 2018 21:54 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id A612C130F8E for <>; Wed, 28 Nov 2018 13:54:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -3.358
X-Spam-Status: No, score=-3.358 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-1.459, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id UNPfmvVE9BiD for <>; Wed, 28 Nov 2018 13:54:25 -0800 (PST)
Received: from ( [IPv6:2a00:1450:4864:20::344]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 96A30128A6E for <>; Wed, 28 Nov 2018 13:54:24 -0800 (PST)
Received: by with SMTP id s14so215583wmh.1 for <>; Wed, 28 Nov 2018 13:54:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=2CBliPv/1fIKVxCaOQ4eRSSu7f7qTU5V+AyAyxSw05o=; b=txAqyafa9/WTKvJZGTpgkqyYEdl6gmmLtQRwU+tD42Mm3GnQDPB4vTDMyDHF6j60lj UGwGtJi+OgYpfBJRk7WTtzlx5LDu3a4CMGzRBz76DmtSU8aC/uAyIkHsNCgKEzNDGhs3 zKrHvhIPx77buja299WS7+tBWCN1dLxtXr2JSRuoBxNjg+vlOb+UhzwdmmlbAY5xepfP MpTENn8gLZD4ysd3IbswkGBDTobSn5HFKs+NBCOs1jg/p9KvYL6rFh3ggdh8q7ivm/zw QOzromwlj8WP7rSgUt9Dr9VUOiVamDt85LCZ4R7xev69M67FFdfsfs1xdx1DnlVpF70t OMzA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2CBliPv/1fIKVxCaOQ4eRSSu7f7qTU5V+AyAyxSw05o=; b=D0NGY/A/IcGzRw0jEHCJBGwdeOGI6nq1sTF/l0HbcyAWWG3LWhVFrGI+xagQckCURb T8wyzD8MkdKuFFSDZo5Ak1b8VRX9NqEw5J0MTz6ZNKAzpQhgTUA97+qJ7mZihe6th+Sq pmIYXNN+5XhkF2+k+jmhdgVq+H+mYWY9YITMUCVSG8Z7oYiuqXCVi3UV2osnHIj6oq1T OSwCy0ZIC8sh9ldKQ61+4RKuRNpVTdZcAcEEGhKbO6i+4Firw3Bj0RHJd7hbuYj5XarT wtphfte7vGbyCPAGIRK12SVrAP/QR2ZU5QTpapfX/s7z1k0VbOdTZUeTUQ+/9izmTyDt IKlA==
X-Gm-Message-State: AA+aEWYLIiKsJ5taMEtTVPYPR+jqrQiRk5YXujke52MYeofnFLrVBFty uVXhha1Yfd93+6u76zm8nRplYattDSk5fcSMFfqvLQ==
X-Google-Smtp-Source: AFSGD/Vk5t6BXt0BWDwtdvi/eaY27hfI4aYdeqAdlnz9gWxgslduN6D7DU3NfX1dTbzpk4sf52VzoQAF7feEwXXAC5U=
X-Received: by 2002:a1c:eed4:: with SMTP id j81mr3206373wmi.24.1543442062530; Wed, 28 Nov 2018 13:54:22 -0800 (PST)
MIME-Version: 1.0
References: <> <> <> <>
In-Reply-To: <>
From: Warren Kumari <>
Date: Wed, 28 Nov 2018 16:53:45 -0500
Message-ID: <>
To: Tero Kivinen <>
Cc: Tony Finch <>, Joe Abley <>, dnsop <>,
Content-Type: multipart/alternative; boundary="000000000000de6b85057bc09b7a"
Archived-At: <>
Subject: Re: [DNSOP] Favor: Weigh in on draft-ietf-ipsecme-split-dns?
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 28 Nov 2018 21:54:29 -0000

So, thank you everyone for commenting / the feedback...

I've been mulling this over, and, while I really don't like it, I think
that the:
"IKE clients willing to accept INTERNAL_DNSSEC_TA attributes MUST use
a whitelist of one or more domains that can be updated out of band.
IKE clients with an empty whitelist MUST NOT use any
INTERNAL_DNSSEC_TA attributes received over IKE.  Such clients MAY
interpret receiving an INTERNAL_DNSSEC_TA attribute for a non-
whitelisted domain as an indication that their local configuration
may need to be updated out of band."

helps mitigate this -- as Tero says above, the user would have to jump
through many stupid hoops in order to make themselves vulnerable.
If think that if the text around "that can be updated out of band" were
strengthened (the current wording sounds like being updated out of band is
one option, but e.g being updated in-band and "approved" by the user is
another), and it were made a bit clearer how the whitelist might be managed
I'd be (grudgingly) willing to remove my DISCUSS.

Again, I don't love this, but I think that the mitigations can be made to
work, and it *does* solve a real world problem.

Can anyone *not* live with this?

On Wed, Nov 28, 2018 at 8:12 AM Tero Kivinen <> wrote:

> Tony Finch writes:
> > Joe Abley <> wrote:
> > >
> > > It seems to me that the intended use-case is access to corporate-like
> > > network environments where might exist on
> > > the inside but not on the outside.
> >
> > More likely cases like corporate-like.local or or
> > like.corp etc. usw. :-(
> Yes, this is the more common practice to use. I.e., several companies
> quite often have (multiple) internal domains they use. Because those
> are internal domains they cannot get real certificates for them.
> Because they cannot use real certificates they use self signed
> certificates, thus users have to click on "trust this web site having
> invalid certificate yes/no". The idea is that with TLSA we could get
> some kind of security for those internal sites.
> More competent companies might also run their own CA and use that to
> sign internal web sites, but unfortunately those more competent
> companies usually then also have heavy IT processes that requires all
> kind of complicated stuff to get things be signed by corporate CA, and
> then developers setting up intranet / chat system / testing setup etc
> revert to self signed certificates, because it is easy. On the other
> hand getting DNS names added to the internal DNS is usually something
> that happens often, and is not too hard to do, getting TLSA record
> along with the name should also be quite easy.
> Now when browsers start to make it harder and harder to allow access
> to self signed certificates, users are seeing more and more problems
> with that.
> > Private DNSSEC trust anchors should be distributed in the same way
> > that you would distribute corporate X.509 trust anchors.
> This is exactly what is proposed by the draft, execpt that it is split
> in two parts, i.e., the names for which TAs can be given are
> distributed in same way as X.509 trust anchors, the actual contents
> for the TA for that whitelisted name is distributed inside IKE.
> The draft requires the whitelist to pre-configured before starting up
> the VPN connection. It also do require implementations to ignore all
> those settings unless user have explictly configured split-tunnel on
> for that connection.
> I.e., in the example the VPNs-R-Us would not be able to set those
> configuration settings, nor would it be able to provide dialog asking
> that.
> VPN-R-Us would require provide instructions how to configure your VPN
> client to do that, i.e., it would need to ask users to do following:
>   - In your IPsec VPN configuration dialog click "Add" to add new VPN.
>   - Type in VPNs-R-Us for name, and IP of f00::BA5 as IP-address.
>   - Click advanced
>   - In Advanced settings to go the enterprise VPN tab
>   - In there click the Enable Split-tunnel setup check box.
>   - Answer YES to question verifying that you really want to configure
>     this manually, and do not want to use the managment profile
>     provided by the enterprise (normally enterprise VPN setups are
>     managed automatically by profiles provided by the company, normal
>     users usually do not even have option to change anything).
>   - After that click "Add items to DNSSEC whitelist".
>   - Type in "", and click OK.
>   - (vpn client would probably forbid him adding .com to list as or if
>     it is added it would be ignored), so VPN-R-Us is smart and asks
>     following:
>   - Type in "" and click OK.
>   - Click OK to few times and get the VPN configuration setup.
>   - Then fire up the VPN client.
> More likely VPN-R-Us would say if you do not want to do that, just
> download this easy binary exe that will do all that configuration for
> you (and some others they do not mention).
> I.e., that whitelist needs to be modified out of band. Usually it is
> done by the management system taking care of the enterprise profiles,
> i.e., the same program that installs X.509 roots for the company CA,
> and mandates that virus checkers are up to date before allowing
> connection to the corporate network, and which also configures the VPN
> connection too.
> If you are running that kind of programs you have already given all
> control to whoever provided you that program (VPN-R-Us, or the
> enterprise).
> In enterprise case, you usually do not have option not to, as those
> softwares come pre-installed and you cannot uninstall or not to use
> them. On the other hand do not use your work laptop to go to paypal,
> if you do not trust your company...
> And yes, the enterprise (or VPN-R-Us) management.exe could also
> install those TAs directly for the global system use without any
> problems. This would not be problem for the VPN-R-Us (they would be
> happy to have fake TA in your system even when you are not using their
> VPN), but enterprise might not want to have its TA there when you are
> not connected to its network, just to limit the exposure, and they
> might want to update the TA contens, even when the whitelisted domain
> name stays same.
> I.e., if the TAs cannot be transmitted and agreed to be taken in use
> (after comparing them to whitelist) inside the IKE, then enterprises
> will most likely just install them by the management system for
> general use (or not use DNSSEC). I think that would weaken security
> more than what is proposed in this draft.
> --

I don't think the execution is relevant when it was obviously a bad idea in
the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair of