[Uta] Re: Seeking Input on Secure Service Delegation
Michel Le Bihan <michel@lebihan.pl> Mon, 08 September 2025 13:57 UTC
Return-Path: <michel@lebihan.pl>
X-Original-To: uta@mail2.ietf.org
Delivered-To: uta@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 6FA215F48AF9 for <uta@mail2.ietf.org>; Mon, 8 Sep 2025 06:57:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=lebihan.pl
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6RRzQe5MeDjp for <uta@mail2.ietf.org>; Mon, 8 Sep 2025 06:57:51 -0700 (PDT)
Received: from lebihan.pl (lebihan.pl [146.59.80.63]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 0BF635F48A2E for <uta@ietf.org>; Mon, 8 Sep 2025 06:56:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=lebihan.pl; s=mail; t=1757339813; bh=O00AbjW/D7qSyR9SDxIp26v9JPUdcaA64mMaynwh5nU=; h=Date:Subject:To:References:From:In-Reply-To:From; b=NHgK4QbmNwKUWvFMm1XFi1+QMgIsowY9oK35JikQ6VuxRX9qIqHq4KaauHkjyChEs a6/Pp+VFoFep9tlYWuAxnGlhkGEGyGsTf9JdrT3Aayc8Umry944s8VS2hsZCyDl8v1 +HkjIdLNhVCtvGyf5mam/MwWEY3jEpbt3zOvlCbA=
Received: from [192.168.0.120] (83.9.144.111.ipv4.supernova.orange.pl [83.9.144.111]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange x25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by lebihan.pl (Postfix) with ESMTPSA id 1654928DA30 for <uta@ietf.org>; Mon, 08 Sep 2025 15:56:53 +0200 (CEST)
Message-ID: <0f44c55c-4f7b-4569-9a74-79ce39aa85c5@lebihan.pl>
Date: Mon, 08 Sep 2025 15:56:52 +0200
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: uta@ietf.org
References: <39e81484-b99d-4ce9-91f6-5d0e885e5391@lebihan.pl> <aLUWbgcOZXNxoelP@chardros.imrryr.org>
Content-Language: en-US
From: Michel Le Bihan <michel@lebihan.pl>
In-Reply-To: <aLUWbgcOZXNxoelP@chardros.imrryr.org>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Message-ID-Hash: Y4BJYV4XTLVNVPEXLE4RTK6APM3KEJOH
X-Message-ID-Hash: Y4BJYV4XTLVNVPEXLE4RTK6APM3KEJOH
X-MailFrom: michel@lebihan.pl
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-uta.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Uta] Re: Seeking Input on Secure Service Delegation
List-Id: UTA working group mailing list <uta.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/qJUVaUhp3cvijMRnu5IVV04FbO0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Owner: <mailto:uta-owner@ietf.org>
List-Post: <mailto:uta@ietf.org>
List-Subscribe: <mailto:uta-join@ietf.org>
List-Unsubscribe: <mailto:uta-leave@ietf.org>
Hi Viktor,
Apologies for the late reply.
While DNSSEC adoption is strong in some ccTLDs, two issues prevent it
from being a complete solution:
1.
*TLD limitations*: Some TLDs don't support DNSSEC at all (e.g., .im,
popular for XMPP services). Organizations using these domains cannot
deploy DNSSEC regardless of how motivated they are. For XMPP,
changing domains isn't feasible since they're part of user
identifiers (user@example.im)
2.
*Infrastructure breakage*: Some DNS forwarders, particularly home
routers, truncate responses and lack EDNS support (see Table 2, p.
583: https://www.usenix.org/system/files/sec20-zheng.pdf) This
breaks DNSSEC validation even for domains that properly support it.
These limitations affect a significant portion of services that need
secure delegation today. The SRV-ID certificate approach could provide a
practical alternative where DNSSEC isn't viable.
Best regards,
Michel Le Bihan
Le 01/09/2025 à 05:43, Viktor Dukhovni a écrit :
> On Sun, Aug 31, 2025 at 09:18:38PM +0200, Michel Le Bihan wrote:
>
>> The Security Problem
>>
>> Without DNSSEC (which has very limited deployment according to Cloudflare
>> and SIDN statistics),
> Global average fraction of DNSSEC signed domains is ~6.5%, it is however
> rather unevenly distributed. The below ccTLDs have 20% or more of their
> delegations DNSSEC-signed:
>
> https://stats.dnssec-tools.org/#/?top=tlds&tld_tab=3
>
> TLD #Zones #Signed %Signed #DANE %DANE
> TOTAL 370990810 23951119 6.46 4277775 17.86
> er 53 40 75.47 0 0.00
> dk 1303448 863667 66.26 367844 42.59
> cz 1504173 945604 62.87 137880 14.58
> nl 6109695 3817016 62.47 1054927 27.64
> se 1386049 837283 60.41 338179 40.39
> sk 466674 266802 57.17 22761 8.53
> no 855870 488932 57.13 150899 30.86
> nu 203088 114855 56.55 33337 29.03
> ch 2535106 1325679 52.29 587647 44.33
> li 68737 22104 32.16 7182 32.49
> be 1704076 499395 29.31 143082 28.65
> fo 8414 2465 29.30 233 9.45
> ee 174818 43054 24.63 18794 43.65
> re 39807 9705 24.38 931 9.59
> yt 5453 1179 21.62 214 18.15
> tf 4001 841 21.02 209 24.85
> fr 4256065 887877 20.86 77439 8.72
> br 5501608 1147110 20.85 2494 0.22
> eu 3681490 758904 20.61 115688 15.24
>
> where the DANE counts are for SMTP (_25._tcp TLSA RRs for the
> domain's MX hosts) and %DANE is as a fraction of the *signed*
> domains. [ Yes, the .er (Eritrea) outlier is not a compelling data
> point, but that's also not a compelling reason to exclude it. ]
>
>> these SRV-based delegations are vulnerable to DNS spoofing attacks. An
>> attacker who can manipulate DNS responses can redirect users to
>> malicious servers, potentially intercepting credentials and
>> communications.
> One obvious suggestion for those facing the issue is to deploy DNSSEC,
> which is now a well-established technology.
>
>> I've evaluated several approaches, each with significant drawbacks:
>>
>> DANE (RFC 6698): Requires DNSSEC, which remains impractical due to low
>> adoption
> Can you explain what makes generally modest adoption rates a barrier for
> those who are motivated to take advantage of DANE.
>
- [Uta] Re: Seeking Input on Secure Service Delegat… Viktor Dukhovni
- [Uta] Seeking Input on Secure Service Delegation Michel Le Bihan
- [Uta] Re: Seeking Input on Secure Service Delegat… Michel Le Bihan
- [Uta] Re: Seeking Input on Secure Service Delegat… Viktor Dukhovni