On Jan 9, 2020, at 7:41 PM, Eric Rescorla <e...@rtfm.com> wrote:
>>>> Section 3.5.1.2
>>>> 
>>>> I admit that I don't understand the purpose of this section. Concentrating 
>>>> on minutiae, like the details of DHCP or ARP/NDP spoofing, is far too low 
>>>> level. If we were to simply assume the usual threat model [RFC3552], then 
>>>> the conclusions here are obvious: if you fail to authenticate the server, 
>>>> then you get the server that an attacker chooses.
>>>> 
>>>> I would remove this section in favour of improving Section 3.5.1.4, which 
>>>> addresses the most pertinent question.
>>> 
>>> RFC7626 included Section 2..5.3 
>>> https://tools.ietf.org/html/rfc7626#section-2.5.3 ‘Rogue Servers’. This 
>>> section is just an update of that text to improve context and remove the 
>>> phrase ’rogue server’.  Since the majority of OS implementations still use 
>>> these mechanisms today it seems to still be relevant. 
>>> 
>>> Well, as MT says, this is just the 3552 threat model.  The basic fact is 
>>> that you need a reference to a server that is (1) securely obtained and (2) 
>>> verifiable against the server itself. Absent that, you are subject to 
>>> attack by the network.
>> 
>> Suggest adding a sentence at the start of the section “[RFC3552] provides 
>> guidelines for describing Internet threat models. This section specialises 
>> the discussion to the case of DNS resolver configuration.”
>> 
>> Well, that's a start, but the problem is still that it's too low level. If 
>> you insist on having this section, you should lay out the implications of 
>> the situation rather than (or at least in advance of) digging into the 
>> details.
> 
> The level is detail is entirely comparible to that in the original RFC (much 
> of the text is still the same).
> 
> That doesn't seem like a particularly strong argument. We're revising this 
> document and the question is what is good now.
> 
> 
> 
> As I said to Martin, the section focusses on the impact on the DNS resolution 
> path that results from the attack: diversion of traffic and traffic capture.. 
> Are there other implications you think should be included? Please suggest 
> text. 
> 
> I would replace the entirety of this section with:
> 
> The Internet Threat model, as described in RFC 3552, assumes that the 
> attacker controls the network. Such an attacker can completely control any 
> insecure DNS resolution, both passively monitoring the queries and responses 
> and substituting their own responses. Even if encrypted DNS such as DoH or 
> DoT is used, unless the client has been configured in a secure way with the 
> server identity, an active attacker can impersonate the server. This implies 
> that opportunistic modes of DoH/DoT as well as modes where the client learns 
> of the DoH/DoT server via in-network mechanisms such as DHCP are vulnerable 
> to attack. In addition, if the client is compromised, the attacker can 
> replace the DNS configuration with one of its own choosing.

Given that this topic is one where there is rampant confusion, I think brevity 
and clarity are best for this document. I believe Ekr's words cover exactly 
what is needed here, and agree that the rest of the section should be 
eliminated.

I aslo agree with earlier comments that this document referring to 
draft-arkko-arch-infrastructure-centralisation is a bad idea. We have no idea 
what that document will end up saying when published as an RFC.

--Paul Hoffman

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to