Re: [perpass] DNS confidentiality

Stephen Farrell <stephen.farrell@cs.tcd.ie> Sat, 28 September 2013 15:31 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4632311E80D7 for <perpass@ietfa.amsl.com>; Sat, 28 Sep 2013 08:31:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zFIHxd7DXmhl for <perpass@ietfa.amsl.com>; Sat, 28 Sep 2013 08:31:35 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id DCC4421F91B7 for <perpass@ietf.org>; Sat, 28 Sep 2013 08:31:34 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id ABAE9BE61; Sat, 28 Sep 2013 16:31:33 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6xjgmGoIH+ya; Sat, 28 Sep 2013 16:31:32 +0100 (IST)
Received: from [10.87.48.11] (unknown [86.41.60.159]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 0FD2CBE5D; Sat, 28 Sep 2013 16:31:32 +0100 (IST)
Message-ID: <5246F653.2040300@cs.tcd.ie>
Date: Sat, 28 Sep 2013 16:31:31 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.0
MIME-Version: 1.0
To: Karl Malbrain <malbrain@yahoo.com>
References: <524150C7.2020602@cs.tcd.ie> <1380054665.62304.YahooMailNeo@web125505.mail.ne1.yahoo.com> <006a01ceb96a$335c1df0$9a1459d0$@rozanak.com> <1380137874.48631.YahooMailNeo@web125502.mail.ne1.yahoo.com> <005901ceba2a$f854c1a0$e8fe44e0$@rozanak.com> <1380218914.85280.YahooMailNeo@web125502.mail.ne1.yahoo.com> <003901cebba5$b2762c10$17628430$@rozanak.com> <1380307285.91976.YahooMailNeo@web125501.mail.ne1.yahoo.com> <001b01cebbb6$d5565550$8002fff0$@rozanak.com> <C25E0D41-CDCB-4E53-8661-53E5F0E2B47E@isi.edu> <1380382072.12590.YahooMailNeo@web125504.mail.ne1.yahoo.com>
In-Reply-To: <1380382072.12590.YahooMailNeo@web125504.mail.ne1.yahoo.com>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
Cc: 'perpass' <perpass@ietf.org>
Subject: Re: [perpass] DNS confidentiality
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Sep 2013 15:31:42 -0000

Karl,

The subject line is about confidentiality. If you (or others)
want to disucss other security issues with DNS, please first
read up on DNSSEC and then start new threads.

Now, can we get back to discussion of subject of the subject
line?

Thanks,
S.

On 09/28/2013 04:27 PM, Karl Malbrain wrote:
> The routers being controlled by the larger adversary are the ones that take traffic into and out of the geographic area.  The adversary is re-routing all traffic to DNS ports to his bogus DNS server and replying with IP address spoofing -- e.g. a MITM attack on DNS traffic.
>  
> DNS needs some means of authentication to prevent this.  Certificates can be forged. TOFU doesn't work either.
>  
> The routers are completely programmable by MITM -- they don't have any security that I know of.
>  
>    
> 
> ________________________________
>  From: manning bill <bmanning@isi.edu>
> To: Hosnieh Rafiee <ietf@rozanak.com> 
> Cc: 'perpass' <perpass@ietf.org>; 'Karl Malbrain' <malbrain@yahoo.com>; 'Stephen Farrell' <stephen.farrell@cs.tcd.ie> 
> Sent: Saturday, September 28, 2013 3:02 AM
> Subject: Re: [perpass] DNS confidentiality
>   
> 
> you are conflating routing security/authentication with DNS service opaque capabilities.
> there already exist a number of methods for securing the DNS channel,  [SIG(0), TSIG, DNSCurve…]
> and we can add your technique to the list.  
> 
> protecting the service is very different than protecting the channel.
> 
> /bill
> 
> 
> On 27September2013Friday, at 12:21, Hosnieh Rafiee wrote:
> 
>>
>>   
>>> 1.  Passive surveillence of traffic going to DNS resolvers yielding
>> meta-data.
>>
>> Again not possible, at least not in IPv6 if your resolvers and recursive
>> resolvers are using cga-tsig. The signature and the CGA/SSAS algorithm
>> prevent it.
>>   
>>> 2.  MITM who inserts himself between a particular DNS client and a
>> particular DNS resolver, and provids false addresses and certificates for
>> use in MITM attacks.
>>
>> Again this is not possible if you are using cga-tsig.
>>
>>   
>>> 3. A larger adversary who installs his own DNS resolver for a given
>> geographic area by controlling the traffic at the router level into and out
>> of that area to redirect DNS traffic to his DNS resolver, and then inserts
>> MITM attacks on any connection out of the area he desires by supplying bogus
>> addresses and/or server certificates.
>>
>> If you are using SeND with SSAS or centralized RPKI you can retrieve and
>> verify your router in a local link. RA can include the
>> (http://tools.ietf.org/html/rfc6106) DNS server options. This means that you
>> receive a signed message from a router that was previously authorized via
>> the centralized local RPK1. I am not sure whether or not DHCPv6 also
>> includes security approaches that can be used for authentication. I believe
>> that there was a draft about secure authentication using CGA in DHCPv6 as
>> well.
>> You can also us a scenario, like SSL, to verify your router certificate
>> where the client has already configured the list of CAs.
>>
>>   
>>> The client is trying to retrieve the IP address and public key for an
>> arbitrary server from the DNS resolver.  This is subject to MITM attack.
>>
>> I guess that you did not quite understand the reasoning behind CGA and that
>> is why you are asking a question about an issue that I have already
>> explained. Your client retrieves this IP address from the RA message that is
>> generated by the use of SeND with the DNS RA option (. Since this RA message
>> is already signed and we assume that this client has already verified this
>> router (centralized local RPKI that is explained in SSAS or other RPKI
>> approaches) the attacker has no way of spoofing this message as it cannot
>> spoof the content (due to the signature) and it cannot spoof the public key
>> due to the binding between the public key and the source IP address
>>
>>
>>> How does this prevent MITM from inserting himself between the client and
>> the resolver on the first connection to the resolver?
>>
>> Your node already knows the IP address of your resolver.
>>   
>>>   This is actually a capability of CGA (RFC 3972) or SSAS
>>> (http://tools.ietf.org/html/draft-rafiee-6man-ssas),  which also provides
>>> for the proof of address ownership. So, the client stores the public key of
>>> the resolver in its cache. It will subsequently not accept any messages
>> from
>>> attackers.
>>   
>>> What if the public key being stored belongs to MITM and not the resolver?
>> All client traffic is going to MITM.
>>
>> As I explained, you retrieve the IP address of your DNS server using a safe
>> means after having authorized your router in the local link. Now if your
>> MITM node is somewhere in the other network and tries to intercept the
>> connection between your node and the resolver, since you node already knows
>> the IP address of the resolver, it will reject the connection because the
>> CGA/SSAS verification process fails.
>>   
>>> Whom does the client "ask for the public key of the DNS server" from?  This
>> is the step that is subject to MITM attack.
>>
>> I guess I have already responded this.
>>
>>
>> Hosnieh
>>
>> _______________________________________________
>> perpass mailing list
>> perpass@ietf.org
>> https://www.ietf.org/mailman/listinfo/perpass
> 
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
> 
> 
> 
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>