Re: [dnssd] Genart last call review of draft-ietf-dnssd-push-20

Eric Rescorla <ekr@rtfm.com> Sun, 14 July 2019 21:28 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB67112003E for <dnssd@ietfa.amsl.com>; Sun, 14 Jul 2019 14:28:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xFGLpKYIVjqz for <dnssd@ietfa.amsl.com>; Sun, 14 Jul 2019 14:28:34 -0700 (PDT)
Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8530D12019D for <dnssd@ietf.org>; Sun, 14 Jul 2019 14:28:32 -0700 (PDT)
Received: by mail-lj1-x22d.google.com with SMTP id x25so14176596ljh.2 for <dnssd@ietf.org>; Sun, 14 Jul 2019 14:28:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ixSScnDFpQzU1eGrJYpFEbTgp67NHfOQySLNPRL4Gtw=; b=SzZ3ziv/RAgWn1B83q3w35fpn5rcRK0unzXuBlyZOUqof28SC4vRWPya0vr2DnIY5M MqGYL+Rim12cz+h9W5YAaCjO+M6c7C8JDzie6pHnWzCevHdUiozO0qeq2AvnU6kK0oLj FVExL9ZY8X0LpZr5nqeJz5K6NHOrI1ij7dksj28Ip9bqtGghyFK9/N7L3K4SOahBpVKl fl2dYvsr9fSlfa7WI6ZuNr6y9iR9B03ryYFxaNhoEDX+5W0yuqfSePPIugM9+BhKDyCZ Yrml/Hwucym8g2Op3n/aS56s/JFLG9sQ6s55+25kGqM/VPRkCg2vjujlYuLJwBxjicyx YfmQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ixSScnDFpQzU1eGrJYpFEbTgp67NHfOQySLNPRL4Gtw=; b=ckXmlZqYg4oCcgXp19SZ5sBlbGpSj9ulNSeXOiKL/R9G/jkJe11hEdxmoIJSrtWt38 /PldyDgwIxRSEkDxfvgsdsXw8xwMkO9NKbQSsoGZinj5aSTYzJQq0WLtC8G5kts8Ars5 2Zo5f1TtkkMz/Q/+aNaUOKNZhhnokzRPUY+kK2H8bSQ6DsxoM6Tn7eVf7QxabQdTYK/u qf/hXIgJA8dIF1MHaGI8RykKlxVto1KKB8UFBbaT9evp+hiM98IdmaFQXuzaO0XbMBgw 5q8qQWK+ETFzh84EC+0HKiAPz8mVeQhpGxN/D7jf6d6Y799tKaRv5P7DIEYr00K7nHz5 M6ZA==
X-Gm-Message-State: APjAAAUJzWV0weV73wwmnVklUAScNTWoINgmnOpSRV/EzMPUwrXHv7Mf T3GYsVVm4GUo6vRAjcSDqwIJ7aopo3HOj1dyUnk=
X-Google-Smtp-Source: APXvYqycaEjlgtrcbpGM1029DmRuzudAAwTy/Z19W/BDxX4Vd0rnBiueze6srkxJJgcea5zyHsqtEg5NaeGb3wrY2KU=
X-Received: by 2002:a2e:8892:: with SMTP id k18mr12232447lji.239.1563139710637; Sun, 14 Jul 2019 14:28:30 -0700 (PDT)
MIME-Version: 1.0
References: <156175221593.21875.9525138908968318905@ietfa.amsl.com> <9E6DE124-9262-4870-A920-4E707A38DC08@bangj.com> <CAPDSy+7om=cBW51cyuPea9nabgJuRV3M+++gA7sy8VzfNpkn6Q@mail.gmail.com> <9F8CFF4A-ABC1-4005-AE65-6CE64940B59F@apple.com> <CAPDSy+6V+ooWDe7XezmWA_XKNQXRAOex8DE5CiTnZdz8zc-9CA@mail.gmail.com> <F6DD5CEF-E644-46E3-84B5-18309F6B44C5@apple.com> <270A8516-8BE8-441A-A6CC-4FDE8EFE2B10@fugue.com> <7784.1563138326@dooku.sandelman.ca>
In-Reply-To: <7784.1563138326@dooku.sandelman.ca>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 14 Jul 2019 14:27:54 -0700
Message-ID: <CABcZeBPPaPW1kh8f8KovA_MO0kECJ-1sRaygoOR-u3tFBKn3iA@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: Ted Lemon <mellon@fugue.com>, Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org>, DNSSD <dnssd@ietf.org>, draft-ietf-dnssd-push.all@ietf.org, David Schinazi <dschinazi.ietf@gmail.com>, Tom Pusateri <pusateri@bangj.com>, Robert Sparks <rjsparks@nostrum.com>
Content-Type: multipart/alternative; boundary="0000000000002fe83e058daad3e9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/NwkgjA3BmAEM9YUm1v17UayREQY>
Subject: Re: [dnssd] Genart last call review of draft-ietf-dnssd-push-20
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Jul 2019 21:28:36 -0000

On Sun, Jul 14, 2019 at 2:05 PM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Ted Lemon <mellon@fugue.com> wrote:
>     > forging an RST to the server. We should discuss whether this is a
>     > serious concern that we need to take into account. If it is, then
> using
>     > close_notify would protect against this iff the server ignores TCP
> RSTs
>     > for active TLS sessions.
>
> I'm unaware of TCP stacks that can turn off RSTs on a per-socket basis.
> Is this commonly available now and I'm just ignorant of it?
>
> I imagine that is the only way the application could inform the kernel that
> TLS is active.
>
> I guess a filter could drop RSTs to port 853, and assume it's always TLS.
>

I'm not sure how much this would help: if the attacker can inject an invalid
data segment full of random data, then this will likely lead to TLS
connection
failure (i.e., you'll be able to detect the problem but it's not
recoverable).
I'm not sufficiently up to date on the state of TCP injection attacks to
know
whether off-path RST attacks are significantly harder than off-path data
injection
attacks (obviously, on-path attacks are straightforward in both cases).


> Securing TCP against fake RSTs is something the TCP-AO was designed to do.
> AFAIK, we never defined a way to key TCP-AO from TLS.
>

No, we did not. It's theoretically straightforward, but you know what they
say
about the difference between theory and practice. In this particular case,
given the low level of deployment, it seems like it might be easier to just
move to QUIC.

-Ekr


> --
> ]               Never tell me the odds!                 | ipv6 mesh
> networks [
> ]   Michael Richardson, Sandelman Software Works        | network
> architect  [
> ]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on
> rails    [
>
>