Re: [Mud] review of mDNS vs IoT DNS

Ted Lemon <mellon@fugue.com> Wed, 27 March 2024 17:50 UTC

Return-Path: <mellon@fugue.com>
X-Original-To: mud@ietfa.amsl.com
Delivered-To: mud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBC8EC151072 for <mud@ietfa.amsl.com>; Wed, 27 Mar 2024 10:50:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VmMc13xQkkYo for <mud@ietfa.amsl.com>; Wed, 27 Mar 2024 10:50:39 -0700 (PDT)
Received: from mail-qv1-xf2b.google.com (mail-qv1-xf2b.google.com [IPv6:2607:f8b0:4864:20::f2b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 321E2C14CE52 for <mud@ietf.org>; Wed, 27 Mar 2024 10:50:38 -0700 (PDT)
Received: by mail-qv1-xf2b.google.com with SMTP id 6a1803df08f44-69625f89aa2so981516d6.3 for <mud@ietf.org>; Wed, 27 Mar 2024 10:50:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20230601.gappssmtp.com; s=20230601; t=1711561837; x=1712166637; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=zGmkDDzBHfVTh5Byr1AdAImRtUDZkkyRmYX3ZZF6D+c=; b=ctMY1AcXWLtu8EUuqVK6cPEj0TBzdidLAM3Gvl3evN49UGzOYs6YG1kr2T4tWEclnx 1li1w7S4sT50Uart/tBq87O8m7Wk8Xd3WQqycKvfFTxmrl1ASq00ymZotaC4/ZJCyMng fE1kSBT4FpF5h27EPT+bPS9ZYOEvjFGCSBRroq3kVd+aA0axsTjrHshTiroEv1+NEenG JY8F/CRiCfQTHDDbDZwMhMS2BKh2sxvsjhkEN7ddeDTi9g98UqPhjTYn9jWNIT4oYjU9 aB+nfph6MO93atU/br+2L3kQpFqYlNTIG3jx31RRjor29MrpNJHYpxz6IAggtOG9EimQ 431A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711561837; x=1712166637; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=zGmkDDzBHfVTh5Byr1AdAImRtUDZkkyRmYX3ZZF6D+c=; b=mTRmQ8UOrGag5zQgZT2WM80t3kivr6hQuVwdAptPTDi+ZIqBTGUzlogBLLyiy1P4XY JLBMNSr8OZPJghZoqOnwwWgOuvQHWWx782Julx/g5EzuEzeRGdWDfXieC0OzYYbKR/xl nATL489cdukYZmSjgNdez9d7oTTdWoZFnRBGdjHN9H5kySGyHlxkLCtKmum33/OleUKQ VKhjZWegv8enKQgdK27vpeUmIUZJD5MR3gddiK0BiGB59/gCktYQU7k3NBSxc0wqSeae kS3lnyV02Ag9ztIERSAeyr+NrvqD9NlemxMzGPfDnFTcUOzRNLw2Tn45bNGmiNGo5UWu cgQg==
X-Gm-Message-State: AOJu0Yy2zlVR1H2Lpa8A8WjH2uwnI3C3D0shquLsj5SrUDmbgFZ0F+fJ fdY49a6Eae50gYSpB+xY4ZKdI9TaVREYh2fMFroE6/bjwM8BKIC0wwvFCu1y3JMx+66I1x0rItR 9T3xLrw0PmSqclLyY/bM/ldftj2hwTLtzk318HQ6Djr/PDUyXVgY=
X-Google-Smtp-Source: AGHT+IErMWrBAhzBozEg8c1dyDV6o9EjdAaI/Ze1gBf2DSJWUOfmnM3qFZp2xa+AXXWRjqiYM7tDzOiG/ukuY/w4Hlg=
X-Received: by 2002:a05:6214:14b4:b0:696:8c86:b51e with SMTP id bo20-20020a05621414b400b006968c86b51emr259303qvb.1.1711561837571; Wed, 27 Mar 2024 10:50:37 -0700 (PDT)
MIME-Version: 1.0
References: <509926.1711538321@dyas>
In-Reply-To: <509926.1711538321@dyas>
From: Ted Lemon <mellon@fugue.com>
Date: Wed, 27 Mar 2024 13:50:01 -0400
Message-ID: <CAPt1N1mSjTYbx-ugggCaTwz15P3SrWH022WyOdg8BBAMBjkUzg@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: mud@ietf.org
Content-Type: multipart/alternative; boundary="000000000000570bc80614a80be8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mud/cvsuZ2EMKZURLpnvmRelhZhT_gk>
Subject: Re: [Mud] review of mDNS vs IoT DNS
X-BeenThere: mud@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of Manufacturer Ussage Descriptions <mud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mud>, <mailto:mud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mud/>
List-Post: <mailto:mud@ietf.org>
List-Help: <mailto:mud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mud>, <mailto:mud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Mar 2024 17:50:43 -0000

It's totally valid for an mDNS advertisement to contain a non-local
address. Uncommon, but valid. Which doesn't contradict your concern that
this could be used as an attack.

I think that you need to have a MUD policy for IP address separately from
the MUD policy for domain name. I noticed in a related message that you
were talking about having the MUD server be the DNS resolver for MUD
Devices, which makes sense; you can do the same thing for mDNS by having it
act as a discovery proxy. This is probably a win for MUD devices since they
can make the MUD server do the heavy lifting and don't have to implement
mDNS themselves.

So that would let you have controls on names-permitted-to-connect and
subnets-permitted-to-connect.

You could get more fancy than that, but that's how I'd implement it, all
things being equal.

On Wed, Mar 27, 2024 at 7:18 AM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Éric Vyncke asked in his COMMENTS:
>
>     > ## Absence of mDNS
>     > Is mDNS used in the context of MUD ? If so, then it should be
> mentioned here.
>
> I've tried to answer this as:
>
> https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-mud-iot-dns-considerations/pull/17
>
> which I paste below, but if you have edits, do a github suggestion please.
>
> Ted: I'd particularly like your opinion here.
> I think that I a device could ask for printer.local and then receive some
> internet address as an AAAA record, 2001:db8::1234, which would send the
> device out there.  I think that would only be the result of malware.
> But... DNS-SD could well answer some
> not-local-to-this-subnet-but-still-internal answer right?
> Which might well pass through the MUD policy enforcement point
> ("firewall").
> I think... tough... internal addresses need to be acceptlisted.
>
> # Interactions with mDNS and DNSSD
>
> Unicast DNS requests are not the only way to map names to IP addresses.
> IoT devices might also use mDNS {{?RFC6762}}, both to be discovered by
> other
> devices, and also to discover other devices.
>
> mDNS replies include A and AAAA records, and it is conceivable that these
> replies contain addresses which are not local to the link on which they are
> made.
> This could be the result of another device which contains malware.
> An unsuspecting IoT device could be led to contact some external host as a
> result.
> Protecting against such things is one of the benefits of MUD.
>
> In the unlikely case that the external host has been listed as a legitimate
> destination in a MUD file, then communication will continue as expected.
> As an example of this, an IoT device might look for a name like
> "update.local" in order to find a source of firmware updates.
> It could be led to connect to some external host that was listed as
> "update.example" in the MUD file.
> This should work fine if the name "update.example" does not require any
> kind
> of tailored reply.
>
> In residential networks there has typically not been more than one network
> (although this is changing through work like {{?I-D.ietf-snac-simple}}),
> but
> on campus or enterprise networks, having more than one network is not
> unusual.
> In such networks, mDNS is being replaced with DNS-SD {{?RFC8882}}, and in
> such a situation, connections could be initiated to other parts of the
> network.
> Such connections might traverse the MUD policy enforcement point (an
> intra-department firewall), and could very well be rejected because the MUD
> controller did not know about that interaction.
>
> {{RFC8250}} includes a number of provisions for controlling internal
> communications, including complex communications like same manufacturer
> ACLs.
> To date, this aspect of MUD has been difficult to describe.
> This document does not consider internal communications to be in scope.
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-                      *I*LIKE*TRAINS*
>
>
>
>