Re: [regext] Security Lock anyone? (Was: Preliminary agenda for Prague, and call for agenda items)

Kal Feher <ietf@feherfamily.org> Fri, 08 March 2019 01:47 UTC

Return-Path: <ietf@feherfamily.org>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC20B1311D2 for <regext@ietfa.amsl.com>; Thu, 7 Mar 2019 17:47:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ujFDX_3iR6K2 for <regext@ietfa.amsl.com>; Thu, 7 Mar 2019 17:46:59 -0800 (PST)
Received: from indigo.securenic.net (li90-55.members.linode.com [74.207.248.55]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C646A1311E8 for <regext@ietf.org>; Thu, 7 Mar 2019 17:46:59 -0800 (PST)
Received: from localhost (localhost.localdomain [127.0.0.1]) by indigo.securenic.net (Postfix) with ESMTP id 244D56701D for <regext@ietf.org>; Fri, 8 Mar 2019 12:46:59 +1100 (AEDT)
X-Virus-Scanned: amavisd-new at securenic.net
Received: from indigo.securenic.net ([127.0.0.1]) by localhost (indigo.securenic.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pW3ab7qfsHWG for <regext@ietf.org>; Fri, 8 Mar 2019 12:46:58 +1100 (AEDT)
Received: from Brussels.local (c49-177-68-250.eburwd8.vic.optusnet.com.au [49.177.68.250]) by indigo.securenic.net (Postfix) with ESMTPSA id 8373867014 for <regext@ietf.org>; Fri, 8 Mar 2019 12:46:57 +1100 (AEDT)
To: regext@ietf.org
References: <19F54F2956911544A32543B8A9BDE0759FBF8765@NICS-EXCH2.sbg.nic.at> <8175501f-3365-c8d1-7a76-a4584e76734e@centralnic.com> <C4A68CA3-1ADE-4959-A51E-A73F4A4914DC@sidn.nl> <395DD26B-B2D1-4144-87BD-8DBCD772A8A5@lansing.dk> <34c35e4c575a4e338215b919c102cdfc@cira.ca> <2BE5D16A-F8A6-4609-9420-19BA1CE89185@nic.br> <alpine.DEB.2.20.1902261744450.19193@grey.csi.cam.ac.uk> <8C80C383-1EA7-484E-B0C8-F85089A16D6A@nic.br>
From: Kal Feher <ietf@feherfamily.org>
Openpgp: preference=signencrypt
Autocrypt: addr=ietf@feherfamily.org; keydata= mQENBFtz9XEBCAD2uTgg4OvehOlyellLS2prQpjmrMP6eck6Ow40GNZrqsM9XTCF1KRh1XmE qHHSEswbyoHia6mYfXrG/5lHjeisgVK6cqw2CpzyR+i/PhFbqjtiEQsWuiKa72hcW6J95TNL XEBvbcNHIkl1VOCbfKuMhqbtqoEfUWlsPdM/W5Vk/6OboY81VIPxpIws5Db8TIODjBEcKmhe BmkoIcsztHbo+p2uM7B2kyi9MzBFVYMeGF6IQTdinCw7WCBE8Jrmx645oQ/TNGT+//WXXTrU 5wajmHdNEYWa0muT/IhKstvU6K0/fWRfwQaQ4sdKAzJ+/8xu+A7xiPYBJq/7MHcpTIUfABEB AAG0IEthbCBGZWhlciA8aWV0ZkBmZWhlcmZhbWlseS5vcmc+iQFUBBMBCAA+FiEEce3bjehV CDyQmzspY20IgJ75NrcFAltz9XICGwMFCQHhM4AFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AA CgkQY20IgJ75Nrekgwf/Ubn9ADzWrkcdAx3UAbhpA0SSrnKA5KaZrzDdjQf85nUfw2hWLARs zEyhpgqcPoU6mSAcdUHcmufHPf2ovOpIzHlHNrsDmGbcU1ScLaVBrGcZJ3J9W5SbyJH5Repa bKildHVY5wn/FyB+KTBUD3pJ6VUhVqUvQhfBi3KN0moCfe77W8EpdCOifZ6m6mv8o9/xDArY xLJR9PAJto1wxMz1WznhTz5A7QiMTgHeeh5OYKz79pihUZPUCQY0oxhBDeK+bAtNl7I07vR6 XSqtM4chm6Zr4YV/QeugX8/Xj2OMxnQLqdnnwC8YhwNConEKalW7XEKb962ZS8/jbitkSaFq VbkBDQRbc/VxAQgAwwHuWHsRk+56J3XACM4H0uZsunNU+Ic1nDQ/eVSLbHoYU3slSk+TbV/Z CV+pzYAJL3aRVDUFIlpeN7M3cmx23kgtIjzL9KdbZYKJ9QdFOrGht1S/iyFApmEWHVOjPegb gnaHzLKyJJGwTofjfhoz2yQG4JidRt11yGpsJ+Yd3FR7NeQiJy8gVmzcnmqBtw18nJstrEmE tIg4QGMgvSw4SfenoQh4S/kTW3aD1fQyFVDr/dhNuWdZom6D8GeOLvcpviLnFtcPyl7w4KuQ zwZPDhDTOt4eY8VKsyPdc3o8K5oL4hIx9IUVioQglxb5SRlLm+ihhUwp78+S0PxfzjBo6wAR AQABiQE8BBgBCAAmFiEEce3bjehVCDyQmzspY20IgJ75NrcFAltz9XECGwwFCQHhM4AACgkQ Y20IgJ75NrfSIQf+KshlrOAryQNJqAb2p+9XGamIHWvk/r6KVSDx16WI3F6VxlPCvnzKcOkM Lo8yBR28065fodAK6FWiK/PGv6wSNm5rXoEdishAtn4aH36hwFsNeQ3t5zbzj8LhuP0wf/xf 1I/5rSY8YSg2eW0/dMRKA+PTjLwlj/6nbVgjf9C3p2GiAPMDl49XVGpb5G8+C0GNarl7CFZz 7T9DVbwFKaM9u/a5ZVky9wZF6HzVxTkxPse28R1XvHfAafnfj+zWfiI8q0i/ALKDUOXxBpLY BGwWeqxIsnl6C4v65nHpGjeRfWwx+Nk8T85fI7aANsbIbmwAbX/hkzRd8tLLftUa2K3gqA==
Message-ID: <32acc0f8-5350-54f1-e224-3a37fb6d7fcd@feherfamily.org>
Date: Fri, 08 Mar 2019 12:46:53 +1100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.1
MIME-Version: 1.0
In-Reply-To: <8C80C383-1EA7-484E-B0C8-F85089A16D6A@nic.br>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="39uQTCwEnPZsKFafiY8mNM7oL5B0lfs3W"
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/XnWGjMzUKeJM4k1rrJj4TfDRxKs>
Subject: Re: [regext] Security Lock anyone? (Was: Preliminary agenda for Prague, and call for agenda items)
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Mar 2019 01:47:03 -0000

On 4/3/19 11:47 pm, Rubens Kuhl wrote:
>
>> On 26 Feb 2019, at 14:46, Tony Finch <dot@dotat.at> wrote:
>>
>> Rubens Kuhl <rubensk@nic.br> wrote:
>>> I imagine that DNS as a communication channel to assure registrant
>>> willingness to change something, similar to CDNS/CDNSKEY, could be quite
>>> useful. For instance, if the name servers that are delegated on the
>>> registry are now pointing to new name servers, and this response is
>>> signed by the current DS/DNSKEY on the delegation, changing the DNS
>>> servers for that domain is pretty safe.
>> There is RFC 7477 CSYNC, but I don't know of any implementations.
>
> It's possibly something in that direction, but CSYNC sounds a bit more complicated by requiring support of a new RR-type on the user-side. Using the same existing RRs would make it easier for end-user adoption.
>
> I believe an OOB mechanism signalling the user intent of changing name server or in-bailwick glue records, with registry then fetching those records, would have more traction. The nature of that OOB would be policy-realm dependent; for some TLDs it could be as easy as flushing recursive DNS cache (https://developers.google.com/speed/public-dns/cache , https://www.verisign.com/en_US/security-services/public-dns/dns-cache/index.xhtml , https://cachecheck.opendns.com/), for some it might require a domain:update transaction from registrar.
>
> In all cases, any name server change not coming from a synchronous EPP transaction should trigger a poll message informing the name servers have been changed and to which ones. This is likely something to regext to work on, possibly augmenting the existing draft-ietf-regext-change-poll- or using it as it is.

I had previously read 7477 as being a useful tool for registrars, since
the 'parent agent' (section1.1) description seemed to fit them. That
would allow error handling to remain unchanged between EPP server and
client and no need to deploy registry logic to the csync ingestion tool.

The implications of adding or removing registry objects based only on
DNS signalling might be quite challenging to overcome in common manner.
The out of band error signalling imagined in RFC7477 would get much more
complex if CSYNC were deployed at the registry, but registrars
maintained the relationship with registrants.

>
> Security-wise, considering the limited adoption of DNSSEC, for non-signed delegation one alternative would be using only TCP queries to verify the new records.  This is far from perfect, but counters some threat vectors.
>
I know I'm probably being snobbish or dismissive, but I can't think of a
reasonable case where a domain name is import enough to a registrant to
server lock, but not important enough to deploy DNSSEC.
>
> Rubens
>
>
based on the users of the various server lock products I know,
delegation changes are rare enough and planned ahead enough to not
require bypassing the EPP update prohibitions without an explicit
unlock/re-lock sequence. DNSSEC keyrolls on the other hand seem like an
activity that should be able to continue and not require removal of
server lock states. So my ideal server lock product would be:

- supports CDS/CDNSKEY while locked

- server states applied OOB between RR and Ry

- server state change requests are standardised between Rt and RR, but
are not reliant on established Rt - RR systems, otherwise server lock is
no different to client lock in terms of risk.


>
> _______________________________________________
> regext mailing list
> regext@ietf.org
> https://www.ietf.org/mailman/listinfo/regext

-- 
Kal Feher
Melbourne, Australia