Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard

Viktor Dukhovni <ietf-dane@dukhovni.org> Tue, 24 February 2015 17:02 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 279B41A8866 for <ietf@ietfa.amsl.com>; Tue, 24 Feb 2015 09:02:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LkxRpMIzxg6m for <ietf@ietfa.amsl.com>; Tue, 24 Feb 2015 09:02:26 -0800 (PST)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB5401A886D for <ietf@ietf.org>; Tue, 24 Feb 2015 09:02:16 -0800 (PST)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id D5747282F52; Tue, 24 Feb 2015 17:02:09 +0000 (UTC)
Date: Tue, 24 Feb 2015 17:02:09 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: ietf@ietf.org
Subject: Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard
Message-ID: <20150224170209.GV1260@mournblade.imrryr.org>
References: <20150127223859.28024.43756.idtracker@ietfa.amsl.com> <4257D8A3-0EFE-40E3-B0AD-8E23772B7693@mnot.net> <6F9BB11D-C224-4D7B-A06C-41EACBAAB4B2@netnod.se> <54C9DA42.5040901@cisco.com> <9EB44D8A-278B-42FC-A542-1C182AD43128@netnod.se> <A74A30F4D1214630918FD4CA@JcK-HP8200.jck.com> <20150223153757.GI1260@mournblade.imrryr.org> <20150223155241.GJ1260@mournblade.imrryr.org> <tsl8ufoh9ko.fsf@mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <tsl8ufoh9ko.fsf@mit.edu>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/8MLUIBq3eGPBXTR7T5JVP106tBw>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: ietf@ietf.org
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Feb 2015 17:02:28 -0000

On Mon, Feb 23, 2015 at 11:33:11AM -0500, Sam Hartman wrote:

>     Viktor>     "The authors do not believe this resource record cause
>     Viktor> any new security problems."
> 
> Yes, I see significant security problems with this URI.

With MX and SRV indirection, prior to DNSSEC/DANE, TLS applications
have generally used the service domain (not the target domain) as
the relevant reference identifier.  Also MX and SRV records do not
specify whether TLS is or is not to be used, that decision is made
by other means.  Here, the language specifies using the target,
which makes the DNS trusted as with DNSSEC/DANE and this seems
unavoidable, because the URI includes the scheme!

One might make the case that it is not the new DNS RRtype itself
that changes the security model.  Rather, it would be its use in
with a particular protocol.  This document then just provides the
means, and future documents specify when URI records are (or are
not) to be applied to a particular application protocol.  The draft
then just defines the record type format, with specific discussion
of when to use it, exactly how to decide whether TLS is required
and which PKI to use deferred to documents that specify a particular
application context.

> In particular, prior to this URI, your security depends on your TLS
> trust anchors.  Since this RR encourages folks to validate the
> certificate in the target URI, not the expected name entered by the
> user, even if DNSSec validation is done, the security now depends on the
> DNS trust anchors and the TLS trust anchors.

Yes, both, in a way that means that compromise of either breaks
security.  So at the very least, I would advocate to go with DANE
for verification: in for a penny, in for a pound!  Adding a second
set of trusted parties increases exposure without any compensating
increase in security.

-- 
	Viktor.