Re: [openpgp] [dane] The DANE draft

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Wed, 05 August 2015 19:32 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7260C1A0196; Wed, 5 Aug 2015 12:32:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.3
X-Spam-Level:
X-Spam-Status: No, score=-1.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_46=0.6] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oi4ZSiwMj0XP; Wed, 5 Aug 2015 12:32:35 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [209.234.253.108]) by ietfa.amsl.com (Postfix) with ESMTP id 222341A01E7; Wed, 5 Aug 2015 12:32:26 -0700 (PDT)
Received: from fifthhorseman.net (unknown [38.109.115.130]) by che.mayfirst.org (Postfix) with ESMTPSA id B6665F984; Wed, 5 Aug 2015 15:32:24 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 2EEAE2010F; Wed, 5 Aug 2015 21:32:14 +0200 (CEST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Paul Hoffman <paul.hoffman@vpnc.org>
In-Reply-To: <55C22AD4.5010709@cs.tcd.ie>
References: <CAMm+LwhYdBLXM8Td8q8SCnzgwywRgMx3wNKeS_Q0JSN4Lh7rZQ@mail.gmail.com> <87bnf1hair.fsf@alice.fifthhorseman.net> <alpine.LFD.2.11.1507250832510.854@bofh.nohats.ca> <87bnem2xjq.fsf@alice.fifthhorseman.net> <alpine.LFD.2.11.1508050331340.1451@bofh.nohats.ca> <55C1F35A.5070904@cs.tcd.ie> <B7419740-25C9-4F8D-85AE-FC6E11BCC038@vpnc.org> <55C22AD4.5010709@cs.tcd.ie>
User-Agent: Notmuch/0.20.2 (http://notmuchmail.org) Emacs/24.5.1 (x86_64-pc-linux-gnu)
Date: Wed, 05 Aug 2015 15:32:14 -0400
Message-ID: <874mkd1qgx.fsf@alice.fifthhorseman.net>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/3hTWs7sJ7nUiewKZstEhL8y1LpM>
Cc: Paul Wouters <paul@nohats.ca>, dane WG list <dane@ietf.org>, IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] [dane] The DANE draft
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Aug 2015 19:32:36 -0000

On Wed 2015-08-05 11:25:08 -0400, Stephen Farrell wrote:
> Tempora. That on-path attacker has a far easier time reversing the
> b32 than anything based on the hash. Even with DPRIVE, we don't know
> how to handle the recursive to authoritative part.
>
> So a "putative other protocol that copies this" could well do a great
> job on hiding identifiers only to be caught out by following this b32
> convention.
>
> I do accept that hashing doesn't make much difference for PGP or SMIME
> since the DNS answer in the success case almost certainly gives the
> game away, but I don't think that has to be true in general.
>
> The failure case may also be of interest though, with hashing, that DNS
> answer doesn't immediately tell the attacker to whom I'd like to send
> email. And I guess if some MUA adopts this there'll be quite a few
> negative answers for quite some time, so there's a privacy difference
> there I think. (Not sure if that was raised before - apologies if so.)

yep, i raised that concern too, thanks for reinforcing it :)

the cost of inverting a digest is definitely more than the cost of
inverting b32, but it's unlikely to be difficult for an interested
attacker to invert otherwise low-entropy domain names or localparts of
e-mail addresses.

see djb's writeup on nsec3walker for a related example of how low the
bar is for doing large-scale hashing with the kind of low-entropy input
spaces found in DNS:

 http://dnscurve.org/nsec3walker.html

It's not exactly the same problem, but a good example of how small the
protection is against a motivated adversary in this context.

           --dkg