Re: [OPSAWG] 🔔 WG Last Call for draft-ietf-opsawg-mud-iot-dns-considerations-05

tirumal reddy <kondtir@gmail.com> Tue, 24 January 2023 09:06 UTC

Return-Path: <kondtir@gmail.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B292C14CEFC for <opsawg@ietfa.amsl.com>; Tue, 24 Jan 2023 01:06:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rkoi228Qcc0c for <opsawg@ietfa.amsl.com>; Tue, 24 Jan 2023 01:06:43 -0800 (PST)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 353D5C14CE32 for <opsawg@ietf.org>; Tue, 24 Jan 2023 01:06:43 -0800 (PST)
Received: by mail-lj1-x236.google.com with SMTP id g14so15969352ljh.10 for <opsawg@ietf.org>; Tue, 24 Jan 2023 01:06:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=ihZZu8K69Bl0V+c9jph3zyo4SF9cWpC9mYKvT8+8xuE=; b=e2UanxZ+H1pu2qrR4dZXB77TbKZsB566SnmJWaI/gPt76HZb8AHA2Is98ZCIKjzsFu NSfzsRTlGhXiXoYvIUbYxQF11LN0FFtTTXLuTzxz2UuBnRbpgrf3kfdXSVNha7YGMP60 nyncHll3lHVSn3Nw5baOOSMcnCCMyfqHzVTo+kCpfOEKqOPmzkY6B40pqPVnV1ZJhZ5L OPup0I8C7ashRyNMQdVqBG7OUeK6O52Urq6+XPsDqEOvoWV558A1vp0eXT14EfYPBk55 durG0h18F7EY0m/T8IWts6snVWrZFuSbX+Ix2WJJjUlfOs1senve/gMjxz1AU3PGpFUb m4Xw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ihZZu8K69Bl0V+c9jph3zyo4SF9cWpC9mYKvT8+8xuE=; b=fO++LvrJfs5NUbjeBYllLMnEdz993nNJo1ZKVSkEYpC2fwwX3bzl5EZMsmfIUC0uul w15bDVKYcUbgkGi6Z+X0ahI27NqDXvJudVQib+f5Wd7VxnEJkwkVk5B/mqGhwvkFnKNN m2Ldssd//kXRRWCdXa2ajeULrItfgtIQE2g304hxiwG67xDuxM6gfyPlaPk8WyMwkun5 GUh7chR1Cq91KxhpPf1mbw3YR/BenYx7Z7fKG2IW4LULEnw5wI7IZiC1DHU8nmuvrk99 b26Pqqc3kno5WDz8GYReBZyZspeu39rWSeAt8f6xVfgGo9qAKDevfZIw/ycucj8pHe5H C9Qw==
X-Gm-Message-State: AFqh2kqRxkBRjSIavCZKqSkNYZEFjhGNQK3AvPDrVW5fGK4RY46kslpZ LPztznQBdTz2MqgltD8WcpxKOFxIYIrILiV0qtFCvf0pju4=
X-Google-Smtp-Source: AMrXdXv6F/Th76x2w9wzQoiuStUFiHJ1FbNathAgGuf83H6mOXRdXTWVI+2WMh9aKg/jrZ/Pc6SSSURkp9MaaJwIrK4=
X-Received: by 2002:a05:651c:1315:b0:28b:8da3:57b0 with SMTP id u21-20020a05651c131500b0028b8da357b0mr2265660lja.403.1674551200045; Tue, 24 Jan 2023 01:06:40 -0800 (PST)
MIME-Version: 1.0
References: <fb4c37ad-870f-c462-c876-e85e38892c57@sit.fraunhofer.de> <CAFpG3ge2-Q1=zCbJud=Xrh8UG-vvomWfid8cJRoJYANgDGAuqQ@mail.gmail.com> <26470.1674407823@localhost>
In-Reply-To: <26470.1674407823@localhost>
From: tirumal reddy <kondtir@gmail.com>
Date: Tue, 24 Jan 2023 14:36:28 +0530
Message-ID: <CAFpG3gcGRMwQsMHAoKsYYNzrZ=FH=pacGWWJdhiHbNdev6+nsw@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: opsawg <opsawg@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006fdf4705f2fed55b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/AadyM9SdLb2a6Hz2oGMYViZxZCM>
Subject: Re: [OPSAWG] 🔔 WG Last Call for draft-ietf-opsawg-mud-iot-dns-considerations-05
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jan 2023 09:06:47 -0000

On Sun, 22 Jan 2023 at 22:47, Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> tirumal reddy <kondtir@gmail.com> wrote:
>     > I support progressing the draft and I have the following
> comments/nits
>     > which should be straightforward to address:
>
>     > 1.
>
>     > It has been suggested that one answer to this problem is to provide a
>     > forced
>     > intermediate for the TLS connections. This could in theory be done
> for TLS
>     > 1.2 connections.
>
> I totally agree.  But, did you want more said here?
> I think that Ben's suggestion was to do everything via SOCKSv5, which would
> not have quite the same problems, but I think that is completely
> undeployable.
>

Agreed. My suggestion is to update the text as follows:

In TLS 1.3 with or without the use of ECH, middlebox cannot rely on SNI
inspection because a malware could lie about the SNI and middlebox without
acting as a TLS proxy does not have visibility into the server
certificate.


>
>     > I would say SNI inspection is not useful in TLS 1.3 (with or without
> ECH).
>
>     > 2.
>     > XXX --- explain in detail how this can fail.
>     > XXX --- explain N:1 vs 1:1 for virtual hosting.
>
> Nit> You may want to remove "XXX".
>
> I have expanded the contents.  I had feared this work would be impossible,
> but with sufficient coffee on a snowy Sunday morning, I think that I
> succeeded.
> Please see, and comment on:
>
> https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-mud-iot-dns-considerations/commit/6162d432cbc8395fa79b759f6ee9636a278ef800
>
> I've also appended the text to the end of this message, after my other
> actions.
>
>     > 3.
>     > The third section of this document details how current trends in DNS
>     > presolution
>     > such as public DNS servers, DNS over TLS (DoT), and DNS over HTTPS
> (DoH)
>     > cause
>     > problems for the strategies employed. Poor interactions with
>     > content-distribution
>     > networks is a frequent pathology that can result.
>
>     Comment> You may also want to refer to DoQ.
>
> Done.
>
>     > 4.
>     > A third problem involves the use of HTTPS. IP address literals do not
>     > provide enough
>     > context for TLS ServerNameIndicator to be useful [RFC6066]. This
> limits the
>     > firmware repository to be a single tenant on that IP address, and
> for IPv4
>     > (at least),
>     > this is no longer a sustainable use of IP addresses.
>
>     tiru> You may want to look into
>     tiru> https://www.rfc-editor.org/rfc/rfc8738.html, it will address
> the limitation
>     tiru> with IP address as an identifier in certificates.
>
> I don't think that automating IP address inclusion in certificates is
> useful or the point here.
> During a big distribution even, a supplier might massively increase the
> number of servers that serve particular content.  (Netflix among others
> does this)
> If HTTPS is to be used, the servers need certificates, and if the servers
> are
> referenced by IP address, then they can't do virtual hosting of any time.
>
> This is contrasted to systems like Amazon S3, where a single *name* could
> be
> distributed among hundreds of servers, and at the same time, those servers
> (IP address end-points) could also be hosting content for hundreds of
> names.
>

Got it, Thanks.


>
>     > 5. Section 6.5> I suggest replacing the references by the drafts
> adopted by
>     > ADD WG (DNR and DDR)..
>
> okay.
>
>    Secure discovery of network provided DoH/DoT resolver is possible using
>    the mechanisms discussed in {{?I-D.ietf-add-split-horizon-authority}}
>    section-4.
>
> Is this still the right reference?  It seems that section 4 is still
> correct.
>

No, you will have to refer to DDR
(https://datatracker.ietf.org/doc/draft-ietf-add-ddr/) and DNR
(https://datatracker.ietf.org/doc/draft-ietf-add-dnr/).
The draft ietf-add-split-horizon-authority is specific to establishing
local DNS authority in Split-Horizon Environments. I don't think it is
relevant to this document.

-Tiru


>
> ===
> the "it won't work" text:
>
> The most naive method is to try to map IP addresses to names using the
> in-addr.arpa (IPv4), and ipv6.arpa (IPv6) mappings.
>
> ## Failing strategy
>
> Attempts to map IP address to names in real time fails for a number of
> reasons:
>
> 1. it can not be done fast enough,
>
> 2. it reveals usage patterns of the devices,
>
> 3. the mapping are often incomplete,
>
> 4. even if the mapping is present, due to virtual hosting, it may not map
> back to the name used in the ACL.
>
> This is not a successful strategy, its use is NOT RECOMMENDED for the
> reasons explained below.
>
> ### Too slow
>
> Mapping of IP address to names requires a DNS lookup in the in-addr.arpa
> or ip6.arpa space.
> For a cold DNS cache, this will typically require 2 to 3 NS record lookups
> to locate the DNS server that holds the information required.  At 20 to
> 100ms per round trip, this easily ads up to significant time before the
> packet that caused the lookup can be released.
>
> While subsequent connections to the same site (and subsequent packets in
> the same flow) will not be affected if the results are cached, the effects
> will be felt.  The ACL results can be cached  for a period of time given by
> the TTL of the DNS results, but the lookup must be performed again in a
> number of hours to days.
>
> ### Reveals patterns of usage
>
> By doing the DNS lookups when the traffic occurs, then a passive attacker
> can see when the device is active, and may be able to derive usage
> patterns.  They could determine when a home was occupied or not.  This does
> not require access to all on-path data, just to the DNS requests to the
> bottom level of the DNS tree.
>
> ### Mappings are often incomplete
>
> A service provider that fails to include an A or AAAA record as part of
> their forward name publication will find that the new server is simply not
> used.
> The operational feedback for that mistake is immediate.
> The same is not true for reverse names: they can often be incomplete or
> incorrect for months or even years without visible affect on operations.
>
> Service providers often find it difficult to update reverse maps in a
> timely fashion, assuming that they can do it at all.
> Many cloud based solutions dynamically assign IP addresses to services,
> often as the service grows and shrinks, reassigning those IP addresses to
> other services quickly.
> The use of HTTP 1.1 Virtual Hosting may allow addresses and entire
> front-end systems to be re-used dynamically without even reassigning the IP
> addresses.
>
> In some cases there are multiple layers of CNAME between the original name
> and the target service name.
> This is often due to a layer of load balancing in DNS, followed by a layer
> of load balancer at the HTTP level.
>
> The reverse name for the IP address of the load balancer usually does not
> change.
> If hundreds of web services are funnelled through the load balancer, it
> would require hundreds of PTR records to be deployed.
> This would easily exceed the UDP/DNS and EDNS0 limits, and require all
> queries to use TCP, which would further slow down loading of the records.
>
> The enumeration of all services/sites that have been at that load balancer
> might also consistitute a security concern.
> To liimt churn of DNS PTR records, and reduce failures of the MUD ACLs,
> operators would want to  add all possible names for each reverse name,
> whether or not the DNS load balancing in the forward DNS space lists that
> end-point at that moment.
>
> ### Names can have wildcards
>
> In some large hosting providers content is hosted under some URL that
> includes a wildcard.
> For instance, github.io, which is used for hosted content, including the
> Editors' copy of internet drafts stored on github, does not actually
> publish any names.
> Instead a wildcard exists to answer.
>
> github would be unable to provision all infinity of possible names into
> the PTR records.
>
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>            Sandelman Software Works Inc, Ottawa and Worldwide
>
>
>
>
>