Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08

"Rob Wilton (rwilton)" <rwilton@cisco.com> Tue, 06 February 2024 13:11 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DF4DC15171B; Tue, 6 Feb 2024 05:11:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.905
X-Spam-Level:
X-Spam-Status: No, score=-11.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NzTkjiNCgvQG; Tue, 6 Feb 2024 05:11:09 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30B1DC14CF13; Tue, 6 Feb 2024 05:11:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=93257; q=dns/txt; s=iport; t=1707225069; x=1708434669; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=164ryPKoGmD7Tv5CjqKQBerk0osb3wm0tFhMXgYugAI=; b=LZH/sQvw5iuCvCPLRic0vrIFDtA3hyGCTIkNTFfOemRZILKppvrkWULs rsvUtz5PlmkX2Dz7dQCeu5bRybylE1xgl9LsbNc03+mQkI/ewL7I9nnPv GVGsX35us+6YwPEJ8a2JxPGvmUO/ZcWfL9WRTjbT1HY53/PZRxPC2GlRy w=;
X-CSE-ConnectionGUID: VZkIHVdKQmu7qGhkwj8SpA==
X-CSE-MsgGUID: XXTbVvLiSA6i+u7n/8nF8Q==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:eIPjBBYMYEP7inOh/yMMTkP/LTDmhN3EVzX9orI9gL5IN6O78IunZ wrU5O5mixnCWoCIo/5Hiu+Dq6n7QiRA+peOtnkebYZBHwEIk8QYngEsQYaFBET3IeSsbnkSF 8VZX1gj9Ha+YgBOAMirX1TJuTWp6CIKXBD2NA57POPwT5TNjsCr0Oaa8JzIaAIOjz24Mvt+K RysplDJv9INyct6f7w8yBbCvjNEev8Dw2RuKBPbk0P359y7+9ho9CE4hg==
IronPort-Data: A9a23:wJ0MQKt5vFOB/MJlu61QunZJCOfnVGNeMUV32f8akzHdYApBsoF/q tZmKWyDOavcM2GgLt0lbI+z9xlX7MWAydBnHlFlrXhgFHkQgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0rrav656yAkiclkf5KkYMbcICd9WAR4fykojBNnioYRj5Vh6TSDK1vlV eja/YuHZTdJ5xYuajhIs/jb9ks11BjPkGpwUmIWNKgjUGD2zxH5PLpHTYmtIn3xRJVjH+LSb 44vG5ngows1Vz90Yj+Uuu6Tnn8iG9Y+DiDS4pZiYJVOtzAZzsAEPgnXA9JHAatfo23hc9mcU 7yhv7ToIesiFvWkdOjwz3C0HgkmVZCq9oMrLlCBg8+y73PKUELp3qp3I0E1Io9Iwf5eVDQmG fwwcFjhbziZjO6whbm8UOQp14IoLdLgO8UUvXQIITPxVKl9B8ucBfSRo4YEgV/chegWdRraT 9AGaD5zaxLoaBxUMVBRA5U79AutriCvL2AC9Q3J+8Lb5UDj/DB77qbJMeH8JN3JWJpT2Raei DL/qjGR7hYyb4HHlmHfrRpAnNTnmjvgUZ0dPLy16vAsh0ecrkQfEhQYSR66rOW3z0mmQNtAJ AkR5yZrrK8usUCtVZz2WBujoXKJpBcAWt1WCMU75R2DjK3O7G6k6nMsVDVNbpkts9U7AG1s3 V6SlNSvDjtq2FGIdZ6D3ommrhKSByQ2FGofOjYrTQga4YnYuKhm23ojUe1fOKKyi9T0HxT5z DaLsDUyit0vYSgjivrTEbfv3mLEm3TZcjPZ8Dk7SY5M0++UTJSua4rt4l/B4LMRao2YVVKG+ nMDnqByDdzi77nSzERho81UQNlFAspp1hWH3TaD+LF6p1yQF4aLJ9w43d2HDB4B3jw4UTHoe lTPngha+YVeOnCnBYcuPNruUppyk/e+T4m1PhwxUjaoSsUhHONg1Hw/DXN8I0iz+KTRufhmZ sfFK5rE4YgyWf42pNZJewvt+eR2nn9lnzy7qWHTxBW82r3Wf2+OVboAKxOPaOt/hJ5oUy2Lm +uzw/Cikk0FOMWnO3G/2ddKcTgicyNhbbio8JM/SwJ2Clc8cI3XI6WPkepJlk0Mt/k9q9okC VnkChAGkQOm1COXQehIA1g6AI7SsV9EhStTFQQnPE2j3D4oZoPH0UvVX8JfkWUPnAC78cNJc g==
IronPort-HdrOrdr: A9a23:PhzTvqGO/UsPtH3UpLqFoZLXdLJyesId70hD6qkvc203TiXIra CTdaogtCMc0AxhJk3I+ertBEGBKUmsk6KdkrNhTItKPTOW9FdAQ7sSl7cKrweQfxEWs9Qtqp uIEJIOR+EYb2IK8PoSiTPQe71Psbv3lZxAx92us0uFJjsaEp2Imj0JcTpzZXcGPDWua6BJc6 a0145snRblU3IRaciwG3kCWMb+h/CjrvjbSC9DLSQKrC2Vgx2VyJOSKXWlNxElPA9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDLNbksLlVFhzcziKTIKhxUbyLuz445Mu17kwxrd XKqxA8e+xu9nLqeH2vqxeF4Xih7N9u0Q6g9baruwqnnSXLfkN/NyOHv/MfTvLt0TtjgDi76t MM44vWjesPMfqKplWM2zGBbWAYqqPzmwttrQbW5EYvCrf3r9Rq3NQi1VIQH5EaEC3g7oc7VO FoEcHH/f5TNUiXdnbDowBUsZeRt1kIb167q3I5y4So+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+ CBNqhzjrlBQsIfcKo4XY46MIaKI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw4O2xYpQHwJY7hZ yEWlJFsmw5fV7oFKS1rdd22wGIRH/4USXmy8lY6ZQ8srrgRKDzOSnGU1wqm9vImYRoPiQaYY fFBHt7OY6WEYK1I/c64+TXYegmFUUj
X-Talos-CUID: 9a23:6xjp92hpUo0kqyr802cro9JcqzJuTE/e7VfuL2yBDHs2UZKVSkCSqJh8up87
X-Talos-MUID: 9a23:KvrsbwyLOzFYHnuSRQJO/TxzxmGaqJSeNEozj7EHgODaNG9tZDHa3DKZErZyfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Feb 2024 13:11:08 +0000
Received: from rcdn-opgw-3.cisco.com (rcdn-opgw-3.cisco.com [72.163.7.164]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 416DB7eH032287 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 6 Feb 2024 13:11:07 GMT
X-CSE-ConnectionGUID: 4qi5JoG0Qe2ZK+Tt4ioxaA==
X-CSE-MsgGUID: 96lUNrPQSjuYQ6sUxpF45A==
Authentication-Results: rcdn-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.05,247,1701129600"; d="scan'208,217";a="12406492"
Received: from mail-co1nam11lp2169.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.169]) by rcdn-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Feb 2024 13:11:06 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Zv7xtKRhQEszivwhx03LyM4QMeVqV/Rtn2yZvrlAb352Q9RQtZSA0HFbtwNZvi6OUHhh7tE5h1GpPt6L5Q2CbyVvm4QLv1tjnxAfeLDs9BXp7ZyxuosKtg/lyFbe29hZqw2tg+3VY2KDsX9w4me3/NNYli+vtRIOti+TB5TojZVdmvHMxcyVUa+Wx/n+MqyPdOJrkZgKvNNi5M6lZ+isvec8mcwARiQccFq2ICEaOpYQkoouzdKmWExJC8dT/CNMzP0LBNH70BBpjf69IvpMwkkuk2ol9IOb/W1TnUp6s9MVwq+iqGSZGrJWVOhzmuH2SfJK52QhGP1J/TPnfI7eQQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=164ryPKoGmD7Tv5CjqKQBerk0osb3wm0tFhMXgYugAI=; b=XFrCwvj6YzRUb88+IVChSXkGsZf7Hk8UmPMI/nujGwa3wuLYK60ZYxz6KhSuRmhgJ/dI/cbO6vUxJdLXp7YzfCEXIP7Ju7Hcy7Xe9QLmMO9M5fM7E3Wdm3kXC834//05gMZ+5pICh5zOfSnPnBMWWsmiRP1yOu60KXZe8NztVZitdD7rQPhXU52Q8892HT2MKpH+kf29uDsHKnPCG+VacAByDX1tBz9CxBgm+8+dGBFXJFqDmsxIDr+7Az07ZExRFKt93cJ3C6m+QNCmcc7xUJ9TUHg+whDA/60lrKBoB/tj+GCcT6NiKQnEaQz2omgkxxj20YGiw0+TXkJHviT0zw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from LV8PR11MB8536.namprd11.prod.outlook.com (2603:10b6:408:1ec::19) by DS0PR11MB8161.namprd11.prod.outlook.com (2603:10b6:8:164::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.36; Tue, 6 Feb 2024 13:11:04 +0000
Received: from LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d]) by LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d%2]) with mapi id 15.20.7249.035; Tue, 6 Feb 2024 13:11:04 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, "draft-ietf-opsawg-mud-iot-dns-considerations@ietf.org" <draft-ietf-opsawg-mud-iot-dns-considerations@ietf.org>
CC: Eliot Lear <lear@lear.ch>, "opsawg@ietf.org" <opsawg@ietf.org>, Toerless Eckert <tte@cs.fau.de>, Mahesh Jethanandani <mjethanandani@gmail.com>
Thread-Topic: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08
Thread-Index: Adn9uohvN+3E1lC3TL27lly1AEZWBQEHmbYAAF7pIlAAnDtFgAAAS9kAAHM/2oAAH7H7gAAAiFgAABBpiAAAAR3OABPxphCs
Date: Tue, 06 Feb 2024 13:11:04 +0000
Message-ID: <LV8PR11MB853690BAFD9A35FFBA745C9BB5472@LV8PR11MB8536.namprd11.prod.outlook.com>
References: <BY5PR11MB419663E50375EFC179E7CE65B5D2A@BY5PR11MB4196.namprd11.prod.outlook.com> <12876.1697643420@localhost> <BY5PR11MB4196CE6084B4DC26BD0EC11EB5DBA@BY5PR11MB4196.namprd11.prod.outlook.com> <25964.1698074879@localhost> <a730368b-886c-402a-9fcb-717622c0cce4@lear.ch> <ZTmYaTXQDphVbR5n@faui48e.informatik.uni-erlangen.de> <3097919.1698327837@dyas> <ZTpwsJsn0aBcJkai@faui48e.informatik.uni-erlangen.de> <17967.1698356948@localhost> <ZTrmUnxmtdu6phZa@faui48e.informatik.uni-erlangen.de>
In-Reply-To: <ZTrmUnxmtdu6phZa@faui48e.informatik.uni-erlangen.de>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LV8PR11MB8536:EE_|DS0PR11MB8161:EE_
x-ms-office365-filtering-correlation-id: 3949c447-8348-437b-dbda-08dc271512b6
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV8PR11MB8536.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(366004)(136003)(346002)(39860400002)(396003)(230922051799003)(230273577357003)(451199024)(64100799003)(186009)(1800799012)(41300700001)(86362001)(66574015)(66899024)(30864003)(5660300002)(478600001)(2906002)(91956017)(54906003)(110136005)(38070700009)(76116006)(66476007)(66446008)(66946007)(66556008)(316002)(64756008)(52536014)(4326008)(8676002)(8936002)(9686003)(7696005)(53546011)(33656002)(6506007)(55016003)(122000001)(71200400001)(38100700002)(83380400001)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_LV8PR11MB853690BAFD9A35FFBA745C9BB5472LV8PR11MB8536namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV8PR11MB8536.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3949c447-8348-437b-dbda-08dc271512b6
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Feb 2024 13:11:04.1401 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NR7KXxtViluQmKGeLfHqjJpFAw0PMW1zUvIP3vKY+jV4qAOzeFgVYjO3edyx5clyANM7xO44FdY8lIIy9J8DHw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB8161
X-Outbound-SMTP-Client: 72.163.7.164, rcdn-opgw-3.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/310sRHqg7PK5dkEhj5J95xx0npU>
Subject: Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2024 13:11:14 -0000

Hi Michael, authors,

I’ve just re-reviewed -10.I still think that the English to be cleaned up further.  I know that the RFC editor would likely find and fix most of these, but improving the English now will likely improve the overall quality and also help the IETF LC reviewers and ADs and also save the authors work in terms of the amount of comment that comes back from the reviews.

Hence, I’ve done a full read through of -10 and my comments are below.  Please can you address all these along with checking the grammar warnings and post a -11, and then I should be able to initiate IETF LC.  As before, I’m running out of time as an AD, hence addressing these quickly makes it more likely that this will get approved by the IESG before I step down …

Minor level comments:



(1) p 2, sec 1.  Introduction



   [RFC8520] provides a standardized way to describe how a specific

   purpose device makes use of Internet resources.  Access Control Lists

   (ACLs) can be defined in an RFC8520 Manufacturer Usage Description

   (MUD) file that permit a device to access Internet resources by DNS

   name.



"specific purpose device" sounds like slight strange phrasing to me.





(2) p 2, sec 1.  Introduction



   Use of a DNS name rather than IP address in the ACL has many

   advantages: not only does the layer of indirection permit the mapping

   of name to IP address to be changed over time, it also generalizes

   automatically to IPv4 and IPv6 addresses, as well as permitting

   loading balancing of traffic by many different common ways, including

   multi-CDN deployments wherein load balancing can account for

   geography and load.



"many different common ways" sounds like strange phrasing to me.  How

can something be both different and common, which do you mean?





(3) p 2, sec 1.  Introduction



   At the MUD policy enforcement point -- the firewall -- there is a

   problem.  The firewall has only access to the layer-3 headers of the

   packet.  This includes the source and destination IP address, and if

   not encrypted by IPsec, the destination UDP or TCP port number

   present in the transport header.  The DNS name is not present!



"önly access" -> "äccess only"





(4) p 2, sec 1.  Introduction



   It has been suggested that one answer to this problem is to provide a

   forced intermediate for the TLS connections.  This could in theory be

   done for TLS 1.2 connections.  The MUD policy enforcement point could

   observe the Server Name Identifier (SNI) [RFC6066].  Some Enterprises

   do this already.  But, as this involves active termination of the TCP

   connection (a forced circuit proxy) in order to see enough of the

   traffic, it requires significant effort.



"This could in theory be done" => "In theory, this could be done", or "This could, in theory, be done".





(5) p 3, sec 1.  Introduction



   The second section of this document details how common manufacturer

   anti-patterns get in the way of this mapping.

   The third section of this document details how current trends in DNS

   resolution such as public DNS servers, DNS over TLS (DoT), DNS over

   QUIC (DoQ), and DNS over HTTPS (DoH) cause problems for the

   strategies employed.  Poor interactions with content-distribution

   networks is a frequent pathology that can result.



Do you really mean pathology here?





(6) p 3, sec 1.  Introduction



   The fourth section of this document makes a series of recommendations

   ("best current practices") for manufacturers on how to use DNS and IP

   addresses with specific purpose IoT devices.



Perhaps just "with MUD supporting IoT devices".  Otherwise what is the difference between a general purpose IoT device and a specific purpose IoT device?





(7) p 3, sec 3.  Strategies to map names



   The most naive method is to try to map IP addresses to names using

   the in-addr.arpa (IPv4), and ipv6.arpa (IPv6) mappings.



For readability, it might be helpful to indicate when this mapping would occur.





(8) p 4, sec 3.1.1.  Too slow



   While subsequent connections to the same site (and subsequent packets

   in the same flow) will not be affected if the results are cached, the

   effects will be felt.  The ACL results can be cached for a period of

   time given by the TTL of the DNS results, but the lookup must be

   performed again in a number of hours to days.



Please consider whether it would read better as: "but the DNS lookup must be repeated, e.g., in a few hours or days, when the cached IP address to name binding expires."





(9) p 4, sec 3.1.2.  Reveals patterns of usage



   By doing the DNS lookups when the traffic occurs, then a passive

   attacker can see when the device is active, and may be able to derive

   usage patterns.  They could determine when a home was occupied or

   not.  This does not require access to all on-path data, just to the

   DNS requests to the bottom level of the DNS tree.



Is it worth mentioning that there are now mechanisms available (like DoH, or Ohttp that can be used to mitigate this)?





(10) p 6, sec 3.2.  A successful strategy



   In order to compensate for this, the MUD controller SHOULD regularly

   perform DNS lookups in order to never have stale data.  These lookups

   must be rate limited to avoid excessive load on the DNS servers, and

   it may be necessary to avoid local recursive resolvers.  The MUD

   controller SHOULD incorporate its own recursive caching DNS server.

   Properly designed recursive servers should cache data for many

   minutes to days, while the underlying DNS data can change at a higher

   frequency, providing different answers to different queries!



I suggest changing "for many minutes to days" to "for at least some number of minutes, up to some number of days".





(11) p 8, sec 4.1.  Use of IP address literals in-protocol



   The second reason to avoid a DNS in the URL is when an inhouse

   content-distribution system is involved that involves on-demand

   instances being added (or removed) from a cloud computing

   architecture.



Should it be "avoid in IP address literal in the URL"?  Also, inhouse => in-house.





(12) p 9, sec 4.1.  Use of IP address literals in-protocol



   Finally, third-party content-distribution networks (CDN) tend to use

   DNS names in order to isolate the content-owner from changes to the

   distribution network.

   A non-deterministic name or address that is returned within the

   update protocol, the MUD controller is unable to know what the name

   is.  It is therefore unable to make sure that the communication to

   retrieve the new firmware is permitted by the MUD enforcement point.



The first sentence above doesn't make sense to me, please can it be rephrased.





(13) p 10, sec 4.2.  Use of non-deterministic DNS names in-protocol



   The firmware vendor is therefore likely to be asked to point a CNAME

   to the CDN network, to a name that might look like "g7.a.example",

   with the expectation that the CDN vendors DNS will do all the

   appropriate work to geolocate the transfer.  This can be fine for a

   MUD file, as the MUD controller, if located in the same geography as

   the IoT device, can follow the CNAME, and can collect the set of

   resulting IP addresses, along with the TTL for each.  The MUD

   controller can then take charge of refreshing that mapping at

   intervals driven by the TTL.

   In some cases, a complete set of geographically distributed servers

   is known at ahead of time, and the firmware vendor can list all of

   those addresses in the name that it lists in the MUD file.  As long

   as the active set of addresses used by the CDN is a strict subset of

   that list, then the geolocated name can be used for the firmware

   download itself.  This use of two addresses is ripe for confusion

   however.



Where are the addresses being listed?  In the DNS or with the CDN?





(14) p 10, sec 4.3.  Use of a too generic DNS name



   Some CDNs make all customer content at a single URL (such as

   s3.amazonaws.com).  This seems to be ideal from a MUD point of view:

   a completely predictable URL.



"Make all customer content at" => "Make all customer content available at"





(15) p 11, sec 6.  Recommendations to IoT device manufacturer on MUD and DNS usage



   The difficult part is determining what to put into the MUD file

   itself.  There are currently tools that help with the definition and

   analysis of MUD files, see [mudmaker].  The remaining difficulty is

   now the semantic contents of what is in the MUD file.  An IoT

   manufacturer must now spend some time reviewing the network

   communications by their device.



Could "The remaining difficulty is now the semantic contents of what is in the MUD file." is a bit vague, could it be more precisely explained please?





(16) p 12, sec 6.5.  Prefer DNS servers learnt from DHCP/Route Advertisements



   The ADD WG has written [I-D.ietf-add-dnr] and [I-D.ietf-add-ddr] to

   provided.



This sentence doesn't scan.





(17) p 12, sec 7.  Privacy Considerations



   The use of DoT and DoH eliminates the threat from passive

   eavesdropping, but still exposes the list to the operator of the DoT

   or DoH server.  There are additional methods, such as described by

   [RFC9230].



Perhaps "There are additional methods to help preserve privacy, such as ..."





(18) p 13, sec 7.  Privacy Considerations



   The use of DoT and DoH eliminates the threat from passive

   eavesdropping, but still exposes the list to the operator of the DoT

   or DoH server.  There are additional methods, such as described by

   [RFC9230].

   The use of unencrypted (Do53) requests to a local DNS server exposes

   the list to any internal passive eavesdroppers, and for some

   situations that may be significant, particularly if unencrypted WiFi

   is used.  Use of Encrypted DNS connection to a local DNS recursive

   resolver is a preferred choice.



Use of an Encrypted ...  is the preferred choice.







Nit level comments:



(19) p 4, sec 3.1.3.  Mappings are often incomplete



   In some cases there are multiple layers of CNAME between the original

   name and the target service name.  This is often due to a layer of

   load balancing in DNS, followed by a layer of load balancer at the

   HTTP level.



"Load balancing layer in the DNS" and "Load balancing layer at the HTTP level" would probably read better.





(20) p 7, sec 3.2.  A successful strategy



   3.  if any addresses have been omitted in a round-robin DNS process,

       the cache will have the set of addresses that were returned.



Possibly, "the same set of addresses"?





(21) p 10, sec 4.2.  Use of non-deterministic DNS names in-protocol



   The firmware vendor is therefore likely to be asked to point a CNAME

   to the CDN network, to a name that might look like "g7.a.example",

   with the expectation that the CDN vendors DNS will do all the

   appropriate work to geolocate the transfer.  This can be fine for a

   MUD file, as the MUD controller, if located in the same geography as

   the IoT device, can follow the CNAME, and can collect the set of

   resulting IP addresses, along with the TTL for each.  The MUD

   controller can then take charge of refreshing that mapping at

   intervals driven by the TTL.

   In some cases, a complete set of geographically distributed servers

   is known at ahead of time, and the firmware vendor can list all of

   those addresses in the name that it lists in the MUD file.  As long

   as the active set of addresses used by the CDN is a strict subset of

   that list, then the geolocated name can be used for the firmware

   download itself.  This use of two addresses is ripe for confusion

   however.



at ahead of time => ahead of time.  all of those => all those





(22) p 13, sec 7.  Privacy Considerations



   The use of a publically specified firmware update protocol would also

   enhance privacy of IoT devices.  In such a system the IoT device

   would never contact the manufacturer for version information or for

   firmware itself.  Instead, details of how to query and where to get

   the firmware would be provided as a MUD extension, and an Enterprise-

   wide mechanism would retrieve firmware, and then distribute it

   internally.  Aside from the bandwidth savings of downloading the

   firmware only once, this also makes the number of devices active

   confidential, and provides some evidence about which devices have

   been upgraded and which ones might still be vulnerable.  (The

   unpatched devices might be lurking, powered off, lost in a closet)



publically => publicly





(23) p 13, sec 7.  Privacy Considerations



   The use of a publically specified firmware update protocol would also

   enhance privacy of IoT devices.  In such a system the IoT device

   would never contact the manufacturer for version information or for

   firmware itself.  Instead, details of how to query and where to get

   the firmware would be provided as a MUD extension, and an Enterprise-

   wide mechanism would retrieve firmware, and then distribute it

   internally.  Aside from the bandwidth savings of downloading the

   firmware only once, this also makes the number of devices active

   confidential, and provides some evidence about which devices have

   been upgraded and which ones might still be vulnerable.  (The

   unpatched devices might be lurking, powered off, lost in a closet)



In such a system the => In such a system, the


Spellings:
inhouse,
inprotocol,
middleboxes

Grammar Warnings:

Section: 3.1.3, draft text:
To limit churn of DNS PTR records, and reduce failures of the MUD ACLs, operators would want to add all possible names for each reverse name, whether or not the DNS load balancing in the forward DNS space lists that end-point at that moment.
Warning:  Consider shortening this phrase to just 'whether', unless you mean 'regardless of whether'.
Suggested change:  "whether"

Section: 3.1.4, draft text:
For instance, github.io, which is used for hosted content, including the Editors' copy of internet drafts stored on github, does not actually publish any names.
Warning:  The official name of this software platform is spelled with a capital "H".
Suggested change:  "GitHub"

Section: 3.1.4, draft text:
For instance, github.io, which is used for hosted content, including the Editors' copy of internet drafts stored on github, does not actually publish any names.
Warning:  The official name of this software platform is spelled with a capital "H".
Suggested change:  "GitHub"

Section: 3.1.4, draft text:
Instead a wildcard exists to answer all potential names: requests are routed appropriate once they are received.
Warning:  A comma may be missing after the conjunctive/linking adverb 'Instead'.
Suggested change:  "Instead,"

Section: 3.2, draft text:
The MUD controller and the device get a matching set, and the ACLs that are setup cover all possibilities.
Warning:  The verb 'set up' is spelled as two words. The noun 'setup' is spelled as one.
Suggested change:  "set up"

Section: 3.2, draft text:
The simplest is when the round robin does not return all addresses.
Warning:  This word is normally spelled with a hyphen.
Suggested change:  "round-robin"

Section: 4.1, draft text:
A common pattern for a number of devices is to look for firmware updates in a two step process.
Warning:  This word is normally spelled with a hyphen.
Suggested change:  "two-step"

Section: 4.1, draft text:
An initial query is made (often over HTTPS, sometimes with a POST, but the method is immaterial) to a vendor system that knows whether or not an update is required.
Warning:  Consider shortening this phrase to just 'whether', unless you mean 'regardless of whether'.
Suggested change:  "whether"

Section: 4.1, draft text:
The current firmware model of the device is sometimes provided and then the authoritative server provides a determination if a new version is required, and if so, what version.
Warning:  Use a comma before "and" if it connects two independent clauses (unless they are closely connected and short).
Suggested change:  ", and"

Section: 4.2, draft text:
Even if the content provider chosen names are deterministic they may change at a rate much faster then MUD files can be updated.
Warning:  Did you mean faster than?
Suggested change:  "faster than"

Section: 4.2, draft text:
This use of two addresses is ripe for confusion however.
Warning:  Consider inserting a comma before 'however'.
Suggested change:  ", however"

Section: 4.3, draft text:
Exactly what the risk is depends upon what the other customers are doing: it could be limited to simply causing a distributed denial of service attack resulting in high costs to those customers, or such an attack could potentially include writing content.
Warning:  It appears that hyphens are missing.
Suggested change:  "denial-of-service"

Section: 6, draft text:
It can even be done without code changes via the use of a QR code affixed to the packaging (see [RFC9238].
Warning:  Unpaired symbol: ')' seems to be missing

Section: 6.2, draft text:
While it used to be costly to have a large number of aliases in a web server certificate, this is no longer the case.
Warning:  Specify a number, remove phrase, or simply use many or numerous
Suggested change:  "many"

Section: 6.5, draft text:
The ADD WG has written [I-D.ietf-add-dnr] and [I-D.ietf-add-ddr] to provided.
Warning:  The verb after "to" should be in the base form.
Suggested change:  "provide"

Section: 7, draft text:
The use of unencrypted (Do53) requests to a local DNS server exposes the list to any internal passive eavesdroppers, and for some situations that may be significant, particularly if unencrypted WiFi is used.
Warning:  Did you mean Wi-Fi? (This is the officially approved term by the Wi-Fi Alliance.)
Suggested change:  "Wi-Fi"

Regards,
Rob





From: Toerless Eckert <tte@cs.fau.de>
Date: Thursday, 26 October 2023 at 23:21
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: Eliot Lear <lear@lear.ch>, Rob Wilton (rwilton) <rwilton@cisco.com>, opsawg@ietf.org <opsawg@ietf.org>, draft-ietf-opsawg-mud-iot-dns-considerations@ietf.org <draft-ietf-opsawg-mud-iot-dns-considerations@ietf.org>
Subject: Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-iot-dns-considerations-08
On Thu, Oct 26, 2023 at 05:49:08PM -0400, Michael Richardson wrote:
>     > Sure, but that DNSSEC issue equally applies to TLS proxies, right ?
>     > DNSSEC is not mentioned in the docs paragraphs discussing TLS.
>
> TLS proxies do not change/break DNS(SEC).
> They "attack" at the TCP layer (in the same way NAT44 does), forcing traffic
> through their engine.

If they do, sure. I don't think that there is an actual definition that
says so, and i thought i've seen different ones as well.

> The TLS validation step is really a separate thing, and with what you
> suggested, an IP address per destination, and a circuit-layer forward proxy,
> then the device would actually be connected (at layer-4) to the real target.
> So whatever TLS certificate validation they do would just continue to work.

That was the idea. Obvious the experience from BRSKI proxy popped up reading this
thread..

>     > Of course, one could always extend MUD to explicitly allow clients
>     > to look for local-domain domain names to explicitly support TCP/UDP or TLS
>     > proxies in case such proxies are desired. TLS proxies of course still
>     > being a highly desirable option to support (likely independent of this draft),
>     > to allow the operator of the MUD devices to actually inspect the traffic
>     > between te devices the operator owns and their cloud services.
>
> I don't really understand what you are saying here.
> Yes, some people would like to inspect traffic from their IoT devices.
> Others see that as a serious risk to the device, and specifically do not want
> the liability.  Even enterprises that do forced TLS inspection are apparently
> recognizing that they MUST exempt banking and health traffic; or face serious
> legal consequences.

Once personal devices of factory floor workers start to have MUD profiles,
we can start worrying about privacy right violations in TLS proxies in the context of MUD.
I was thinking about devices for which those don't apply.

For industrial devices, especially those coming from all type of international vendors
it could easily start becoming a simple security requirement that the operator of
a factory installation must be able to verify the traffic to that (foreign) manufacturers
cloud devices. And use of standardized encoding protocols/semantics wouldn't make that
a big deal for a good application layer firewall. And provisioning LDevID so the
private key of the industrial devices can be shared with the installation firewall is certainly
possible with some enrollment protocols.

Aka: I think the actual TLS proxy case should not be dismissed as the draft currently
does. It's certainly not something one may want to recommend solely to solve the DNS
issue, but if it's required for security of the opeational deployment, then MUD should
not stand in its way. For example, if the TLS proxy just intercepts at L4 as you
say, then it seems it should actually work pretty well with SNI: The firewall
will act as TLS proxy, read the SNI, validate it, and break the connection if
not allowed by MUD.

Cheers
    Toerless
>
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>            Sandelman Software Works Inc, Ottawa and Worldwide
>
>
>
>



--
---
tte@cs.fau.de