Re: [dnssd] Security through Obscurity

Tom Pusateri <pusateri@bangj.com> Thu, 24 July 2014 01:43 UTC

Return-Path: <pusateri@bangj.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95BEC1A036E for <dnssd@ietfa.amsl.com>; Wed, 23 Jul 2014 18:43:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.038
X-Spam-Level:
X-Spam-Status: No, score=-1.038 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0pUCUi_lBnIL for <dnssd@ietfa.amsl.com>; Wed, 23 Jul 2014 18:43:07 -0700 (PDT)
Received: from oj.bangj.com (amt0.gin.ntt.net [129.250.11.170]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 400901A0305 for <dnssd@ietf.org>; Wed, 23 Jul 2014 18:43:07 -0700 (PDT)
Received: from dhcp-8415.meeting.ietf.org (dhcp-8415.meeting.ietf.org [31.133.132.21]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by oj.bangj.com (Postfix) with ESMTPSA id 9D17C13386; Wed, 23 Jul 2014 21:43:07 -0400 (EDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 8.0 \(1971.5\))
From: Tom Pusateri <pusateri@bangj.com>
In-Reply-To: <20E4ED19-12BD-45D4-B690-8629B552B23B@gmail.com>
Date: Wed, 23 Jul 2014 21:43:04 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <15473CC1-E1C2-4AF1-AD2B-542AA138B0F2@bangj.com>
References: <0644A943-80B9-42E0-BF82-3E1113710FA2@gmail.com> <20E4ED19-12BD-45D4-B690-8629B552B23B@gmail.com>
To: Douglas Otis <doug.mtview@gmail.com>
X-Mailer: Apple Mail (2.1971.5)
Archived-At: http://mailarchive.ietf.org/arch/msg/dnssd/Kq5wwb0oGOYNrKlhoXVxT9Eg3qo
Cc: dnssd@ietf.org, RJ Atkinson <rja.lists@gmail.com>
Subject: Re: [dnssd] Security through Obscurity
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of extensions to Bonjour \(mDNS and DNS-SD\) for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Jul 2014 01:43:08 -0000

> On Jul 23, 2014, at 9:27 PM, Douglas Otis <doug.mtview@gmail.com> wrote:
> 
> 
> On Jul 23, 2014, at 4:51 PM, RJ Atkinson <rja.lists@gmail.com> wrote:
>> 
>> If a client were to ask me for advice on protecting their
>> interior services or interior devices from the global Internet, 
>> I would suggest at least a firewall (ranging from router ACLs 
>> to an air-gap: depending upon their local needs and threat model) 
>> and possibly also other measures (again, depending upon local
>> needs and threat model).  Operational security is not 
>> one-size-fits-all, in my experience, but relying upon 
>> security-through-obscurity seems unwise to me.
> 
> I agree with that statement, but at the same time some of these devices are assigned routable addresses by the vendors. When assigned out of a 48 bit space, it might be possible to guess the device based on common manufacturers.  When randomly assigned by the owner, it is highly unlikely such an address will ever be guessed.  Add rate limiting, and this unknown should work well at mitigating attack.  But as I said, I agree with your statement and why I think mDNS should be working with ULAs.
> 

mDNS advertisements are link-local. Whether mDNS uses GUAs, ULAs, or link-local addresses is irrelevant.

I'll assume you meant the broader term DNS-SD. If so, then the scope of the address is a matter best left up to the particular use case.
There are arguments for all of them and a mix of them depending on what you're trying to achieve. Bots operate inside private networks and can do as much damage with ULAs as with GUAs.

We need to stop thinking about an internal network and an external network. There is just THE network. Your security should reflect the fact that malfeasants will try to break into every one of your devices and they all need the appropriate level of protection from this. If a device is susceptible, that's not an DNS-SD problem, that's a device problem.

Tom