Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard

Eliot Lear <lear@cisco.com> Fri, 27 February 2015 09:56 UTC

Return-Path: <lear@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5BC01A1BAC for <ietf@ietfa.amsl.com>; Fri, 27 Feb 2015 01:56:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZB5ruCuSK9nF for <ietf@ietfa.amsl.com>; Fri, 27 Feb 2015 01:56:11 -0800 (PST)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AF5D1A1B8E for <ietf@ietf.org>; Fri, 27 Feb 2015 01:56:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3375; q=dns/txt; s=iport; t=1425030970; x=1426240570; h=message-id:date:from:mime-version:to:subject:references: in-reply-to; bh=oSIRcsXqT+LiEpCducRuDjrLdd8/JzHkcaK1oj9fR2k=; b=XnXDFGM+0HyYxPLzS7acvk+427ErQq078aamepW4PpoBGmCARt5wNSYB nkVBlMoBvhzZs47jtz1qmJ1kdj5yKGO2GuFC0TQXmzZ80Ovdp/xssXLV4 aZFts2Vdf7v685PnsMxmsniI675P8gnYzrpDXXxY5LRyfii3N2IDEp5WJ c=;
X-Files: signature.asc : 486
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ASBQDwPfBU/xbLJq1bg1Ragwq/BoV0AoFtAQEBAQEBfIQPAQEBAwEjVRELGAkWBAcCAgkDAgECAUUTCAEBiCMIvGaaFAEBAQcCAR+LEoR1FoJSgUMFkVWBLlGFZoEbOYUViSqDPiOCMoE9PTGBBCSBGwEBAQ
X-IronPort-AV: E=Sophos;i="5.09,658,1418083200"; d="asc'?scan'208";a="362889954"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP; 27 Feb 2015 09:56:08 +0000
Received: from [10.61.193.10] ([10.61.193.10]) by aer-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id t1R9u8ni007033 for <ietf@ietf.org>; Fri, 27 Feb 2015 09:56:08 GMT
Message-ID: <54F03F38.9090601@cisco.com>
Date: Fri, 27 Feb 2015 10:56:08 +0100
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: ietf@ietf.org
Subject: Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard
References: <20150127223859.28024.43756.idtracker@ietfa.amsl.com> <4257D8A3-0EFE-40E3-B0AD-8E23772B7693@mnot.net> <6F9BB11D-C224-4D7B-A06C-41EACBAAB4B2@netnod.se> <54C9DA42.5040901@cisco.com> <9EB44D8A-278B-42FC-A542-1C182AD43128@netnod.se> <A74A30F4D1214630918FD4CA@JcK-HP8200.jck.com> <20150223153757.GI1260@mournblade.imrryr.org> <20150223155241.GJ1260@mournblade.imrryr.org> <tsl8ufoh9ko.fsf@mit.edu> <20150224170209.GV1260@mournblade.imrryr.org>
In-Reply-To: <20150224170209.GV1260@mournblade.imrryr.org>
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="VMN80wRc0BDLB5J0otsaSBpF3cDgWQ6aG"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/TIDeWRz4yWzCaqkNrOn36N6jgro>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Feb 2015 09:56:12 -0000


On 2/24/15 6:02 PM, Viktor Dukhovni wrote:
> On Mon, Feb 23, 2015 at 11:33:11AM -0500, Sam Hartman wrote:
>
>>     Viktor>     "The authors do not believe this resource record cause
>>     Viktor> any new security problems."
>>
>> Yes, I see significant security problems with this URI.
> With MX and SRV indirection, prior to DNSSEC/DANE, TLS applications
> have generally used the service domain (not the target domain) as
> the relevant reference identifier.  Also MX and SRV records do not
> specify whether TLS is or is not to be used, that decision is made
> by other means.  Here, the language specifies using the target,
> which makes the DNS trusted as with DNSSEC/DANE and this seems
> unavoidable, because the URI includes the scheme!

I think the real issue here we are concerned about is this:

Given a slightly modified example from your document:

   $ORIGIN example.net.
   _http._web    IN URI 10 1 "httpS://www.example.com/"

If the intent here is to declare an equivalence between
http://example.com and https://www.example.com the problem is that
absent DNSSEC one is subject to a downgrade attack.  Thus a browser
cannot trust the equivalence.

Eliot

>
> One might make the case that it is not the new DNS RRtype itself
> that changes the security model.  Rather, it would be its use in
> with a particular protocol.  This document then just provides the
> means, and future documents specify when URI records are (or are
> not) to be applied to a particular application protocol.  The draft
> then just defines the record type format, with specific discussion
> of when to use it, exactly how to decide whether TLS is required
> and which PKI to use deferred to documents that specify a particular
> application context.
>
>> In particular, prior to this URI, your security depends on your TLS
>> trust anchors.  Since this RR encourages folks to validate the
>> certificate in the target URI, not the expected name entered by the
>> user, even if DNSSec validation is done, the security now depends on the
>> DNS trust anchors and the TLS trust anchors.
> Yes, both, in a way that means that compromise of either breaks
> security.  So at the very least, I would advocate to go with DANE
> for verification: in for a penny, in for a pound!  Adding a second
> set of trusted parties increases exposure without any compensating
> increase in security.
>