Re: [Doh] Suggestion on draft-ietf-doh-dns-over-https-13: Recommend DANE-TLS to authenticate the TLS-certificate

"Rene 'Renne' Bartsch, B.Sc. Informatics" <ietf@bartschnet.de> Thu, 16 August 2018 11:22 UTC

Return-Path: <ietf@bartschnet.de>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F89112D7F8 for <doh@ietfa.amsl.com>; Thu, 16 Aug 2018 04:22:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (4096-bit key) header.d=bartschnet.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xiOFAl9f7aWb for <doh@ietfa.amsl.com>; Thu, 16 Aug 2018 04:22:15 -0700 (PDT)
Received: from mail.core-networks.de (mail.core-networks.de [IPv6:2001:1bc0:d::4:9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 032D9128B14 for <doh@ietf.org>; Thu, 16 Aug 2018 04:22:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bartschnet.de; s=2018030201; h=Content-Transfer-Encoding:MIME-Version:Date: Message-ID:To:From:Subject:content-disposition; bh=UcNnnyEBhRLJYhZWGgplgUeTFSGeCflQjFyspwetLOY=; b=hKY4h6rMrIJONR2yfu/kpMTXpY QOnrKj9QBJmyZy12UdsR5HmoXWjXYuXDEnNThMAXmtudyAO3rguh+qRyEhRGSGsWfe1HU131Z9tyI NAdaNWoKYPPSoxbmU5chacMcdx2I2I5CnmmhAqaIshlc1WK7RvqUTxW7JVdWGegztHQxXTYp0BoUy p6W5NfihYuVFgBrqZLTXQ5DrHQSTyZNxleZV7y8PMWu/70dhrJnvbkhbLZBYZHOSBQa/4g60+PlwS EvbNC9m6DG0FMhGzo+7M7ejWMjyQ+kxdA6GUrEg7pU0i8k8zALQN7dsx2/0/DvqKRAxrxZ86o438Q Sxu67Bmp8M11dtZkW5MSv0WWoNp6EaXivnnoztq2s1+F0kB54G70mo9tncP5QYzIpQF3KVgguU1J1 PqNHlz3Ol7TbxWqm06eaHYEcCFK8rtXgL9to9VQHpi4yW0ZdAIHPNLlkhK+B4rixcx05XKYNWPQIa cryz2hHlPJMebZFyZnqofgmhjm4R7oU2pZRIrnQ96EVWM+H13KqIlvZcTzgR9nc6Uab9bJftqY7pn IXZwrxNtontJZMgh2CNIj/z/LXyZlhOZxpHHnSO9iTLh1lyw4AxlI7gpHYUjaY5adVaPBSt+9Mlrk AOxWa6dGs3QMDcRF8BmPEwZfXl7s9Efj8SMCERuOo=;
Received: from localhost (localhost [127.0.0.1]) by mail.core-networks.de id 1fqGLz-0006Eu-0Q with ESMTPSA (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) for doh@ietf.org; Thu, 16 Aug 2018 13:22:13 +0200
References: <6fb4a552-8d5e-494b-f934-1f97b83b0ab6@bartschnet.de> <BYAPR19MB224839928ED4EC67F094F74A943E0@BYAPR19MB2248.namprd19.prod.outlook.com> <74018a91-eecb-bb35-d5c4-e72487a0719a@bartschnet.de> <BYAPR19MB22482948BA2CDC3D68277A9B943E0@BYAPR19MB2248.namprd19.prod.outlook.com>
From: "Rene 'Renne' Bartsch, B.Sc. Informatics" <ietf@bartschnet.de>
To: doh@ietf.org
Message-ID: <fb1bf0c3-3dff-f621-f6bf-19d459eb49cb@bartschnet.de>
Date: Thu, 16 Aug 2018 13:22:10 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <BYAPR19MB22482948BA2CDC3D68277A9B943E0@BYAPR19MB2248.namprd19.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: de-DE
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/iBk4D8Xll43nU8naEiq9b0KHX3w>
Subject: Re: [Doh] Suggestion on draft-ietf-doh-dns-over-https-13: Recommend DANE-TLS to authenticate the TLS-certificate
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Aug 2018 11:22:17 -0000


Am 16.08.2018 um 12:10 schrieb Star Brilliant:
> On Thu, Aug 16, 2018 at 7:37 PM Rene 'Renne' Bartsch, B.Sc. Informatics <ietf=40bartschnet.de@dmarc.ietf.org> wrote:
>>
>> Am 16.08.2018 um 11:01 schrieb Star Brilliant:
>>> On Thu, Aug 16, 2018 at 6:13 PM Rene 'Renne' Bartsch, B.Sc. Informatics <ietf=40bartschnet.de@dmarc.ietf.org> wrote:
>>>>
>>>> Hi,
>>>>
>>>> as TLS-certificates forged or obtained by devious means have become common in MITM-attacks by intelligence and criminals
>>>> I suggest to RECOMMEND authentication of the DoH-server TLS-certificate via DANE-TLS (RFC 6698) in section 10 (Security considerations).
>>>
>>> Hi Renne,
>>>
>>> I am sorry I could not get your point.
>>>
>>> How could it be possible to forge TLS certificates without being detected through our current PKI systems?
> 
> The security level is the same with either PKI and DANE.
> 
> Let me explain.


>> - Fraudulent certificate requests
> 
> I could not get your point. Any examples?

https://arstechnica.com/information-technology/2013/01/turkish-government-agency-spoofed-google-certificate-accidentally/
https://nakedsecurity.sophos.com/2013/12/09/serious-security-google-finds-fake-but-trusted-ssl-certificates-for-its-domains-made-in-france/

>> - Broken revocation system (https://medium.com/@alexeysamoshkin/how-ssl-certificate-revocation-is-broken-in-practice-af3b63b9cb3)
> 
> Therefore OCSP-Stapling is necessary.
> Not only for security, but also for bootstrap to work.
> 
>> What if the client doesn't get the CRL/OCSP informtation?
> 
> If unable to get OCSP information, the client will probably query itself in a loop, and may crash finally.
If the OSCP server is down the (sub-) domain is not reachable any more? The DNS is much more robust than an OCSP-server.

>> Bottom line: Don't trust a CA.
> 
> No offence, but do you trust ICANN?
> That is single authority, compared with multiple CAs.

I definitely do not trust the ICANN.

The benefits I see in DANE is you only have two parties involved: ICANN and registry.
Neither of them can change the signature without being detected because of the tree structure.
Checking hundreds of CAs is quite complicated and error-prone. A lot of certificates are not revoked as CAs demand a revokation fee.
DANE also allows to use free self-signed certificates and revoke them by changing the TLSA resource record.
DNS is more robust than a few OCSP servers. It is common usage to create fake TLS certificates via intermediate certificates on firewall appliances.
This is not possible with DANE.

> Conclusion: I do not think DANE should be preferred than PKI (or "MORE RECOMMENDED" than PKI).

My opinion: PKI gives CAs the possibility to handle security according to their will. DANE is too static to be tampered with in such a magnitude.

> At most they have the same level of security. (Actually DANE is worse, e.g. nearly impossible to rotate the root-anchor.)

This should be solved now and will happen on 10/11/2018.


Renne