Re: [dnssd] Security through Obscurity

Douglas Otis <doug.mtview@gmail.com> Thu, 24 July 2014 16:27 UTC

Return-Path: <doug.mtview@gmail.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E6791A03E7 for <dnssd@ietfa.amsl.com>; Thu, 24 Jul 2014 09:27:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cYCoG4ZNv4Ja for <dnssd@ietfa.amsl.com>; Thu, 24 Jul 2014 09:27:06 -0700 (PDT)
Received: from mail-wi0-x22d.google.com (mail-wi0-x22d.google.com [IPv6:2a00:1450:400c:c05::22d]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08C361A03EB for <dnssd@ietf.org>; Thu, 24 Jul 2014 09:27:05 -0700 (PDT)
Received: by mail-wi0-f173.google.com with SMTP id f8so10016560wiw.6 for <dnssd@ietf.org>; Thu, 24 Jul 2014 09:27:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=4E+Du+3+qfXcOsX8qFlKGYEXV+LMdqFYWcL5o1RdfZc=; b=xtD0PCmSUSQC9VAfP7pzVs5gE+EHB+0h1951zLkNz32mZzcOA4MO98A+7YU1JTzIhS YbpiA7Xy05fEsM8+i+LVdn3geZGMMdEJ1ImY4vUXx7GkL6GXUQID+DqALhHaGGjtAkrl NpFQ4WQQTVGCpTpS1K8/X2vQxfQh8xXsDU8vd4Ykq6S8rpRDpiDvfpozsTaO5PAzLWEW uOXbaLO3H5gARXAM0KxdK6UNEXCKq1y+4LTQ403ceZT3bk9fJgM5LsMaISOnk8MewxIS PbxBKe90Sm7qEzLmzfjmSW5KoHjl2kYG2LNZ8x5LI0CxMHphoE21aMhiTCB6F0/sOQNI 7Mgg==
X-Received: by 10.180.211.101 with SMTP id nb5mr36735328wic.53.1406219223488; Thu, 24 Jul 2014 09:27:03 -0700 (PDT)
Received: from wireless-a-1x-v6.meeting.ietf.org ([2001:67c:370:184:1d29:e3f1:96d7:1d60]) by mx.google.com with ESMTPSA id sa4sm17120488wjb.45.2014.07.24.09.27.01 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 24 Jul 2014 09:27:02 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_DCF9738A-7894-4F80-9A42-8984919FE7BB"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <EMEW3|faec94f4ff05bea449f9614b93dae254q6NE8Q03tjc|ecs.soton.ac.uk|0E0BC226-E68E-4BC2-99EA-AFF1AF96A5EC@ecs.soton.ac.uk>
Date: Thu, 24 Jul 2014 12:26:59 -0400
Message-Id: <F681929D-FC38-4C35-AD93-312719680235@gmail.com>
References: <0644A943-80B9-42E0-BF82-3E1113710FA2@gmail.com> <20E4ED19-12BD-45D4-B690-8629B552B23B@gmail.com> <0E0BC226-E68E-4BC2-99EA-AFF1AF96A5EC@ecs.soton.ac.uk> <EMEW3|faec94f4ff05bea449f9614b93dae254q6NE8Q03tjc|ecs.soton.ac.uk|0E0BC226-E68E-4BC2-99EA-AFF1AF96A5EC@ecs.soton.ac.uk>
To: Tim Chown <tjc@ecs.soton.ac.uk>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/dnssd/WfwL8-CSavLwVAIzPNoR_1hS3hE
Cc: dnssd@ietf.org, RJ Atkinson <rja.lists@gmail.com>, Douglas Otis <doug.mtview@gmail.com>
Subject: Re: [dnssd] Security through Obscurity
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of extensions to Bonjour \(mDNS and DNS-SD\) for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Jul 2014 16:27:08 -0000

On Jul 24, 2014, at 9:07 AM, Tim Chown <tjc@ecs.soton.ac.uk> wrote:

> On 24 Jul 2014, at 02:27, Douglas Otis <doug.mtview@gmail.com> wrote:
> 
>> 
>> On Jul 23, 2014, at 4:51 PM, RJ Atkinson <rja.lists@gmail.com> wrote:
>> 
>>> 
>>> (NOTE WELL: I am not a WG Chair, IESG member, IAB member,
>>> or authorised spokesperson for anyone other than myself.)
>>> 
>>> 
>>> Earlier Doug Otis wrote:
>>>> It is not safe to advertise such addresses in DNS, 
>>>> especially when security depends on address obscurity.
>>> 
>>> 
>>> I believe that the the vast majority of security folks
>>> would object to the notion that obscurity is a mechanism 
>>> capable of providing any meaningful security.
>>> 
>>> If a client were to ask me for advice on protecting their
>>> interior services or interior devices from the global Internet, 
>>> I would suggest at least a firewall (ranging from router ACLs 
>>> to an air-gap: depending upon their local needs and threat model) 
>>> and possibly also other measures (again, depending upon local
>>> needs and threat model).  Operational security is not 
>>> one-size-fits-all, in my experience, but relying upon 
>>> security-through-obscurity seems unwise to me.
>> 
>> I agree with that statement, but at the same time some of these devices are assigned routable addresses by the vendors.  When assigned out of a 48 bit space, it might be possible to guess the device based on common manufacturers.  When randomly assigned by the owner, it is highly unlikely such an address will ever be guessed.  Add rate limiting, and this unknown should work well at mitigating attack.  But as I said, I agree with your statement and why I think mDNS should be working with ULAs.
> 
> Doug, if you mean a 48-bit MAC address being embedded in the IPv6 address, see http://tools.ietf.org/html/rfc7217.
> 
> I agree with Tom’s comments. A question to discuss in your slot today is when a device has a LL, ULA and GUA, which of those should be advertised via the SD protocol and whether/how that choice can/should be influenced.

Dear Tim,

The comment was focused on typical operating modes regarding newer IPv6 ready printers in typical home networks.  There are ways to improve upon SLACC, as noted in RFC7217. When a printer is assigned a globally routable IP address, publishing this address in a way that can be seen by malefactors outside the network would be a bad practice.  In home environments, SLAAC rather than DHCP often provides the printer's IPv6 address.

Where there is no overlay network in a home network having multiple routers, publishing the printer's address would be detrimental. Testing determined, that when not using an overlay network, these devices were highly vulnerable to exploits that allows malefactors an ability to remotely fax, scan, print, from anywhere in the Internet without any logging being generated.  As such, it would be a bad practice to place a printer's mDNS resources into DNS.  

Answering your specific question, the address functional for DNS-SD would be the ULA address, which should be the prefix announced to the printer.  In essence, this represents a security consideration for the use of SSD and not directly an SSD mode of operation.

Regards,
Douglas Otis