Re: [dnssd] I-D Action: draft-huitema-dnssd-privacy-00.txt

Alf Watt <alf@istumbler.net> Thu, 24 March 2016 00:36 UTC

Return-Path: <alf@istumbler.net>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 281D112D0FD for <dnssd@ietfa.amsl.com>; Wed, 23 Mar 2016 17:36:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v1qf8iBu120T for <dnssd@ietfa.amsl.com>; Wed, 23 Mar 2016 17:36:54 -0700 (PDT)
Received: from octans.istumbler.net (octans.istumbler.net [IPv6:2600:3c01::f03c:91ff:fe26:b456]) by ietfa.amsl.com (Postfix) with ESMTP id 4CD27128874 for <dnssd@ietf.org>; Wed, 23 Mar 2016 17:36:54 -0700 (PDT)
Received: from [192.168.29.219] (c-24-5-43-153.hsd1.ca.comcast.net [24.5.43.153]) by octans.istumbler.net (Postfix) with ESMTPSA id 0B70127CFD; Thu, 24 Mar 2016 00:36:51 +0000 (UTC)
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.98.7 at octans.istumbler.net
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
From: Alf Watt <alf@istumbler.net>
X-Mailer: iPhone Mail (13E234)
In-Reply-To: <620719BD-01B1-426C-8FAC-09C615DFBF7C@istumbler.net>
Date: Wed, 23 Mar 2016 17:36:50 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <FC9530D1-C66A-4A63-B62C-6D98EB8E2E9C@istumbler.net>
References: <20160310013909.9336.65458.idtracker@ietfa.amsl.com> <7E27ED38-3858-4080-A31E-2116EA2DD436@ecs.soton.ac.uk> <EMEW3|53a64596503ce821209d6d873fee625as2GNBl03tjc|ecs.soton.ac.uk|7E27ED38-3858-4080-A31E-2116EA2DD436@ecs.soton.ac.uk> <055301d184bc$11a0e450$34e2acf0$@huitema.net> <620719BD-01B1-426C-8FAC-09C615DFBF7C@istumbler.net>
To: huitema@huitema.ne
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnssd/ttyIl_W-J4ofDYEjRqSQj5sFXG0>
Cc: dnssd@ietf.org
Subject: Re: [dnssd] I-D Action: draft-huitema-dnssd-privacy-00.txt
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Discussion of extensions to Bonjour \(mDNS and DNS-SD\) for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2016 00:36:56 -0000

Notes after I RTFD:

For most users a single security posture or group membership won't be adequate. Some services may be private (synch with a phone, for e.g.), some shared with work mates (file and screen sharing), some with family (game and content sharing), while others are public, the service advertising stack will have to keep track of the difference and advertise and browse as appropriate.

- Yes, the concern is privacy in multicast environments, so I suggest the title change to reflect that. Strictly speaking any kind of DNS message send over mDNS is leaking information, but we only expect to see the SD, name and address resolution messages associated with DNS-SD

- 4.1: if the party is concerned they MAY use a random host name, if privacy is required they MUST

- the goal is to advertise services in such a way that hosts not implementing the updated protocol will not see them, this suggests using a new protocol and port to differentiate traffic, allow for a secure protocol design and avoid obfuscation and name mangling

- as you are proposing a shared key solution, there should be some proposal for key sharing and exchange

- this moves the solution towards Bluetooth style link-key exchange pairing model of security for local services. It's probably worth reviewing those protocols to see if one can be reused for this purpose.

- as suggested, only a single key and therefore a single 'kin' group[1] per device would be supported

- consider using a one-time key to protect the payload of an mDNS packet, and wrapping that key in one or more 'kin' group keys to allow a single service to be advertised to multiple groups:

    [mDNS message encrypted with K]
    [K encrypted with G1]
    [K encrypted with G2]
    [etc.]

- note that this allows for privately advertising the true host name and makes browsing requests private as well (only a kin will be able to unwrap the on-time-key and see the service type requested). 

Best,
Alf

[1] apologies to any former Danger Inc. employees

> On Mar 23, 2016, at 4:54 PM, Alf Watt <alf@istumbler.net> wrote:
> 
> Just looking over the paper titles for DPRIV it seems like the solution is going to be TLS or DTLS of the DNS server to client connection, which should encapsulate the unicast DNS-SD as well as the usual A and AAAA lookups.
> 
> Is the concern about information disclosure from devices using DNS-SD and mDNS for multicast advertising and discovery?
> 
> Best,
> Alf
> 
>>> On Mar 22, 2016, at 9:25 PM, Christian Huitema <huitema@huitema.net> wrote:
>>> 
>>> On Thursday, March 17, 2016 4:12 PM, Tim Chown wrote:
>>> 
>>> Hi,
>>> 
>>> Ralph and I would welcome comments to the list on this draft.
>>> 
>>> Tim
>> 
>> Yep. Me too. This draft
>> (https://datatracker.ietf.org/doc/draft-huitema-dnssd-privacy/) is the
>> continuation of the work to minimize metadata disclosure went moving to
>> random locations, and in particular when connecting to Wi-Fi hot spots.
>> 
>> The first big disclosure comes with the MAC address, and can be addressed
>> with MAC address randomization. The next big disclosure are the DHCP
>> messages, which use to disclose things like DNS name of the node, and the
>> DNS traffic, which would happily pass a full log of visited URL to the DNS
>> server chosen by the hot spot manager. The IETF has been working on that
>> with the DHCP anonymity profile, and with the DNS Privacy work in DPRIVE.
>> Which means we have to look at the next big disclosure source, which happens
>> to be DNS-SD.
>> 
>> The draft proposes essentially to obfuscate the names used in DNS-SD so that
>> cooperating parties understand them, but they look like gibberish to casual
>> observers. I am sure that DNS-SD WG members have opinions about that.
>> 
>> -- Christian Huitema
>> 
>> 
>> 
>> _______________________________________________
>> dnssd mailing list
>> dnssd@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnssd
> 
> _______________________________________________
> dnssd mailing list
> dnssd@ietf.org
> https://www.ietf.org/mailman/listinfo/dnssd