Re: [DNSOP] New Version Notification for draft-muks-dns-message-checksums-00.txt

Ólafur Guðmundsson <olafur@cloudflare.com> Thu, 01 October 2015 00:16 UTC

Return-Path: <olafur@cloudflare.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B78471ACD65 for <dnsop@ietfa.amsl.com>; Wed, 30 Sep 2015 17:16:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.078
X-Spam-Level:
X-Spam-Status: No, score=-1.078 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ugUM2uKBCYTQ for <dnsop@ietfa.amsl.com>; Wed, 30 Sep 2015 17:16:39 -0700 (PDT)
Received: from mail-ig0-x236.google.com (mail-ig0-x236.google.com [IPv6:2607:f8b0:4001:c05::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6210E1ACD63 for <dnsop@ietf.org>; Wed, 30 Sep 2015 17:16:39 -0700 (PDT)
Received: by igcpb10 with SMTP id pb10so6170155igc.1 for <dnsop@ietf.org>; Wed, 30 Sep 2015 17:16:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=5XGp8yGOsTTnep2cPPbNDSmnijXVk1ZIZM0HH3qbItc=; b=t0s/XdedVjMBTOzYIMvPYxk+ljYcBEqobI9Jb6PoMfJJzEa7Ges1gjgC1Z3PKEnA9B 3iw17H4ddtGynJTc7HlzgUQ4K0uVommRWJt+MHgYOQxJuV3QCkQb+Si3RX2P9ezQ7YB8 zOX0zeuPyzK7vGTF24hsUfH2bJxI3OTj7b3rQ=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=5XGp8yGOsTTnep2cPPbNDSmnijXVk1ZIZM0HH3qbItc=; b=HU+5pSMXI+24OEMI0Zb4mT1Npy+MveQYR1ouQEqHICpz5x3gRbPJJ5mX/FUrL3qIKc hRm5BaZEwf/Wb+UjOT778G5yN+KCOl9YzSFWQJCRdpgoJHDYPllsHG2Wvn7O3bhJx7ib Q0CbSXvKyEFoEuetf2HLAyN8752Cjd6IGkfQjuK7XwYyuxnzkMPD2n0ZLWIjOzx+Hzfd /Y3mYqZyLEjhFewHH2BHYyRx8JRVvsMrmm8+DHEAK2G3U3z2dxQQYPX8DPDVaNIDxUaj yxOAgW8I2/cMXdQuPbRb7HbaLOXJYNuzoTAojRXtmIvBwPxAuuqsa35rHbgzPqPXfp4C KVaQ==
X-Gm-Message-State: ALoCoQldmIWyidGI5/+ky9pL/N/O/S4xrWLxRHxp8rmiMj6H5suxRo/Qwf64FHAuwUQNeuYBwm8S
MIME-Version: 1.0
X-Received: by 10.50.154.1 with SMTP id vk1mr205276igb.92.1443658598744; Wed, 30 Sep 2015 17:16:38 -0700 (PDT)
Received: by 10.107.16.29 with HTTP; Wed, 30 Sep 2015 17:16:38 -0700 (PDT)
In-Reply-To: <20150929045345.GC4513@jurassic.l0.malgudi.org>
References: <20150926191009.28433.58915.idtracker@ietfa.amsl.com> <20150926191551.GA32562@jurassic.l0.malgudi.org> <20150928173028.GA2328@mycre.ws> <20150928173255.GA23429@jurassic.l0.malgudi.org> <20150928182004.GA3197@mycre.ws> <56098631.4060607@redbarn.org> <alpine.LFD.2.20.1509281435590.5153@bofh.nohats.ca> <20150929045345.GC4513@jurassic.l0.malgudi.org>
Date: Wed, 30 Sep 2015 17:16:38 -0700
Message-ID: <CAN6NTqy65o98KnZkNKV2=F27Uk3aP8yb98mBPCCY8hdZ42Bwcw@mail.gmail.com>
From: Ólafur Guðmundsson <olafur@cloudflare.com>
To: Mukund Sivaraman <muks@isc.org>
Content-Type: multipart/alternative; boundary="047d7bd76aeef4a9c50520fff54f"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/t3REUy5x3FPXTkbwRSekWuPZObM>
Cc: dnsop <dnsop@ietf.org>, Paul Wouters <paul@nohats.ca>, Paul Vixie <paul@redbarn.org>
Subject: Re: [DNSOP] New Version Notification for draft-muks-dns-message-checksums-00.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Oct 2015 00:16:40 -0000

On Mon, Sep 28, 2015 at 9:53 PM, Mukund Sivaraman <muks@isc.org> wrote:

> Hi Paul
>
> On Mon, Sep 28, 2015 at 02:36:25PM -0400, Paul Wouters wrote:
> > On Mon, 28 Sep 2015, Paul Vixie wrote:
> >
> > >those things should also be done in the short term.
> > >
> > >but it's the internet. it'll outlive us all. we ought to have a long
> > >term plan as well.
> >
> > It's called DNSSEC.
>
> Zone data validation and DNS message validation are two different
> concepts. DNSSEC will not protect against DNS message modifications.
>
> DNSSEC provides support for end-to-end security (complete chain-of-trust
> signature verification), something that a DNS message checksum/signature
> cannot provide. On the other hand, DNSSEC requires signatures for each
> RRset bloating messages, whereas a DNS message checksum/signature is
> usually smaller as there is 1 per message.
>
> Anyway, I'll explain with an example why DNSSEC is not sufficient to
> protect against DNS message modifications. Assume a company provides a
> service in different countries. They want users in each country to use
> the local CDN only, let's assume because users have no route to other
> CDNs outside the country or because it's too expensive to service data
> from other countries. They use views in DNS, each serving a different
> country and the A/AAAA records returned by the authoritative server
> provides the correct IP address for that country. Assume that zones in
> these views are signed using the same KSK/ZSK.
>
> This will work fine, but an attacker who has access to country A's
> response may succeed in poisoning a message in country B with A's data
> and DNSSEC validation will not catch it. DNSSEC protects each RRset, but
> not the DNS message.
>

This is accepted risk signatures can be reused for the interval specified,
for any purpose.


> Also, there are other items in a DNS message aside from just signed zone
> data.
>
> As your schema is useless against on-path attacker I recommend you take a
look at
making TKEY +TSIG easier to use, then we get the good property of message
integrity.

Olafur