[dnssd] Security through Obscurity

RJ Atkinson <rja.lists@gmail.com> Wed, 23 July 2014 20:51 UTC

Return-Path: <rja.lists@gmail.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A73601B2888 for <dnssd@ietfa.amsl.com>; Wed, 23 Jul 2014 13:51:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rEA9O16ZAyrL for <dnssd@ietfa.amsl.com>; Wed, 23 Jul 2014 13:51:13 -0700 (PDT)
Received: from mail-wg0-x230.google.com (mail-wg0-x230.google.com [IPv6:2a00:1450:400c:c00::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9FEE1A041A for <dnssd@ietf.org>; Wed, 23 Jul 2014 13:51:12 -0700 (PDT)
Received: by mail-wg0-f48.google.com with SMTP id x13so1734328wgg.31 for <dnssd@ietf.org>; Wed, 23 Jul 2014 13:51:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:content-transfer-encoding:subject:date:message-id :to:mime-version; bh=aa6cfw+dGK0ApEMmHWyYAXFMHNq8XNSy9Tv36rh1C/0=; b=s47iq5jBU4D5QyOU1yxihP4ZYm45SVqQ7RyFTSP9PVxoDInO90TN2whQT+4aEz6mKQ xmxHyULQeuk5lk+a8q/7phNZAGieA+N9ScwDjyM2dBkqVvdkeeI6924x6/VrNOKWr+J2 6SHOpo83AQ+K+s4/1jCXEvdGEYaTzQj/J38hArJQvMLqv8P9hwRjU8FQSfoi5gXSyo5k Z6AD1Q4b4bEZpNDg6gnjQTH8d3paWgt+b399AEx8Z7kPaIN+fNMtrHMUU5Ri1l7sNosj Pl8oKjfFwoT+Z7wLaMIUyBobQw4g9SUT68w3ZOqGG8yEHp5KacU6t25dEh5Zn9hihMxF VLiQ==
X-Received: by 10.180.97.129 with SMTP id ea1mr6326432wib.71.1406148670934; Wed, 23 Jul 2014 13:51:10 -0700 (PDT)
Received: from dhcp-b535.meeting.ietf.org (dhcp-b535.meeting.ietf.org. [31.133.181.53]) by mx.google.com with ESMTPSA id 19sm9334465wjz.3.2014.07.23.13.51.09 for <dnssd@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 23 Jul 2014 13:51:10 -0700 (PDT)
From: RJ Atkinson <rja.lists@gmail.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Date: Wed, 23 Jul 2014 16:51:05 -0400
Message-Id: <0644A943-80B9-42E0-BF82-3E1113710FA2@gmail.com>
To: dnssd@ietf.org
Mime-Version: 1.0 (Apple Message framework v1283)
X-Mailer: Apple Mail (2.1283)
Archived-At: http://mailarchive.ietf.org/arch/msg/dnssd/su3-z8peUcJV9EDu958raarOudA
Subject: [dnssd] Security through Obscurity
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of extensions to Bonjour \(mDNS and DNS-SD\) for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Jul 2014 20:51:14 -0000

(NOTE WELL: I am not a WG Chair, IESG member, IAB member,
or authorised spokesperson for anyone other than myself.)


Earlier Doug Otis wrote:
> It is not safe to advertise such addresses in DNS, 
> especially when security depends on address obscurity.


I believe that the the vast majority of security folks
would object to the notion that obscurity is a mechanism 
capable of providing any meaningful security.

If a client were to ask me for advice on protecting their
interior services or interior devices from the global Internet, 
I would suggest at least a firewall (ranging from router ACLs 
to an air-gap: depending upon their local needs and threat model) 
and possibly also other measures (again, depending upon local
needs and threat model).  Operational security is not 
one-size-fits-all, in my experience, but relying upon 
security-through-obscurity seems unwise to me.


> It sounds like Ran wants to configure devices within a data-center.


Incorrect.  To be very clear, my post to DNS-SD WG from earlier 
this week definitely was NOT focused on data centre environments. 

Yours,

Ran