Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard

Phillip Hallam-Baker <phill@hallambaker.com> Fri, 27 February 2015 14:34 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E719B1A88F3 for <ietf@ietfa.amsl.com>; Fri, 27 Feb 2015 06:34:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level:
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4lJsqSGsPoIr for <ietf@ietfa.amsl.com>; Fri, 27 Feb 2015 06:34:14 -0800 (PST)
Received: from mail-la0-x22c.google.com (mail-la0-x22c.google.com [IPv6:2a00:1450:4010:c03::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D7C61A0110 for <ietf@ietf.org>; Fri, 27 Feb 2015 06:34:13 -0800 (PST)
Received: by lamq1 with SMTP id q1so17913651lam.5 for <ietf@ietf.org>; Fri, 27 Feb 2015 06:34:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=lFgz3eRuh6B9b8QLo4bJ+uVqHqPYbjM62zWY6APZsho=; b=y22rdkTtIUzWQLN+MS0l72YUERANTZMm4qgNnxMpMKBF54+CBVQX6FViTaAjDkcI74 d+Bgd3ankEUcRJ222e0sW24PNX9DE1DRnTzpyvx/0hP0Bnjogs5l3V5H1tX8QdaTXP8D m0BKytlqj7joJq00Ls1W038JvBiCbs0zikCx6Uk9YpZwiQ4DMHAOXtwU8dLSCKaEtyPg bgmyO785AYFdAuA3uJydS6kEZhXFPdrJKqU9AEWHmj5GPyBvRLp+EkMu6tRXACosmjhf d+nxx0qQ7DrlBU5cSAJA2cCtYW3dA2Hol7kEjCM5uO1TUpLCawUBbOupydPOWH0XAhV+ PGmA==
MIME-Version: 1.0
X-Received: by 10.112.172.131 with SMTP id bc3mr12841263lbc.79.1425047651927; Fri, 27 Feb 2015 06:34:11 -0800 (PST)
Sender: hallam@gmail.com
Received: by 10.113.3.165 with HTTP; Fri, 27 Feb 2015 06:34:11 -0800 (PST)
In-Reply-To: <2DF7230C-D1D8-4B21-9003-B336108A38CB@vpnc.org>
References: <20150127223859.28024.43756.idtracker@ietfa.amsl.com> <4257D8A3-0EFE-40E3-B0AD-8E23772B7693@mnot.net> <6F9BB11D-C224-4D7B-A06C-41EACBAAB4B2@netnod.se> <54C9DA42.5040901@cisco.com> <9EB44D8A-278B-42FC-A542-1C182AD43128@netnod.se> <A74A30F4D1214630918FD4CA@JcK-HP8200.jck.com> <20150223153757.GI1260@mournblade.imrryr.org> <20150223155241.GJ1260@mournblade.imrryr.org> <tsl8ufoh9ko.fsf@mit.edu> <2DF7230C-D1D8-4B21-9003-B336108A38CB@vpnc.org>
Date: Fri, 27 Feb 2015 09:34:11 -0500
X-Google-Sender-Auth: QL28G7RmRCeUuQ8m9v_qVNm567Q
Message-ID: <CAMm+Lwjiw2P27co9-uvf4P24MnGwLzca0224e_uYXgjFSYiffg@mail.gmail.com>
Subject: Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: multipart/alternative; boundary="001a11c3491c14ce84051012c3f4"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/nswrEKNRLoV5UdSfkKVztHq7Iek>
Cc: Sam Hartman <hartmans-ietf@mit.edu>, IETF Discussion Mailing List <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Feb 2015 14:34:16 -0000

On Tue, Feb 24, 2015 at 11:49 AM, Paul Hoffman <paul.hoffman@vpnc.org>
wrote:

> On Feb 23, 2015, at 8:33 AM, Sam Hartman <hartmans-ietf@mit.edu> wrote:
> > Yes, I see significant security problems with this URI.
>
> It sounds like you have issues with URIs in general, not in a DNS RTYPE
> that carries a URI. That is, any URI that has a domain name that can lead
> to redirection (though CNAME, DNAME, or SRV) would have the properties that
> worry you. It that a fair summary?
>

I think Sam is raising an important point. But it is an easy one to solve.

The DNS is really providing multiple layers of lookup. The question is what
layer the TLS credentials should bind at and what assurances should be
presented to users if any. It is really independent of URI but it is an
important one.


Take the following discovery path

Application provides: Service: _new._ws   Domain: example.com

SRV / URI lookup returns

host1.example.net:443
host2.example.net:443

A / AAAA lookup returns

10.2.3.1:443
10.2.3.2:443

So the question is which TLS certificate should be accepted and what
assertions should be made to the end user?


I don't think the question can be properly be answered without considering
the security policy. At the moment we only have the security policy that
results from explicitly using https:// as the URI.

If someone types in https://www.example.com/ then I think it is clear that
the security policy is ONLY met if the site has a certificate for
example.com.

If someone types in http://www.example.com/ and then gets redirected to
https://www.example.net/ which has an EV certificate, then we have met the
security policy and we have an assurance the site has accountability. So we
can show a security indicator [but I am not going to say which one]

If someone types in http://www.example.com/ and we get back a redirect to
https://www.example.net/ and a DV cert then things are a little different.
The only fact that the cert is attesting to is something we allowed to be
overwritten with an untrusted redirect. We should definitely turn on TLS.
But we should not be telling the user they have any security because they
don't.


This does not map onto the SRV/URI lookup cleanly because we don't have the
notion of a security policy yet. In order to make it work we need to
specify what the security policy is.

Another difference is that SRV and URI should really be considered as being
equivalent to A or AAAA mappings rather than http redirects.


So in my view, if someone types in https://www.example.com/ and there is an
SRV record for _http._tcp, this is not semantically equivalent to a http
redirect as the address bar value does not change. There is no visual
signal. It is a purely internal DNS mapping like a CNAME record.


So I believe that for the example above, a Web Service client should:

* Only accept a TLS certificate for example.com for the purposes of meeting
a 'must meet EV' security policy.

* Accept a TLS cert for example.com OR a DNSSEC trust chain for a
SRV/URI/etc mapping and a TLS cert for host1.example.net for the purposes
of meeting a 'must meed DV'

* Accept any cert at all for the purposes of promiscuous encryption
accepting that this does not provide authentication or confidentiality
guarantees against active attack.