On Mon, 9 Jan 2017, Ted Lemon wrote:
On Jan 8, 2017, at 11:49 PM, Paul Wouters <p...@nohats.ca> wrote:
It is actually the other way around. If an end-node performs DNSSEC
validation, it can only see RPZ modified answers as an attack. It is
in the interest of RPZ to give such clients the confidence that the RPZ
produced answer is not an attack but a handbreak action in the user's
interest.
I think you missed what Barry was saying: you are correct that an end-node that
performs DNSSEC validation will see RPZ on a domain that is signed as an
attack. The point Barry is making is that this only
matters if they sign their zones, and they won't, because doing so produces a
clear audit trail leading back to them.
Apple is getting ready to drop port 80 support. unsigned/unencrypted
transports are dying. I hope we are moving to a word where DNS without
DNSSEC will also be seen as bad. So yes, I am assuming in the future,
attackers will have to sign DNS and that domains without DNSSEC are seen
as "rogue domains that don't have clear audit trails".
I think this is actually not true: why is a DS record any more of an audit
train than an NS record?
Because it proves ownership of the domain. My nohats.ca DS record cannot
be modified by the UK ISPs forced to filter my domain. But they can
spoof NS records. See the recent discovery that Heathrow Airport runs a
MITM TLS server on torproject.org. Do we want them to run RPZ where they
can disappear torproject.org alltogether? No. Do we want them to run RPZ
to prevent travelers from getting malware installed? Yes.
Nevertheless, let's be clear on what RPZ does and does not do. I think the
main reason attackers won't
sign is that it's too much trouble, and provides no real benefit in the
presence of an effective RPZ block.
It's fine for "attackers" not to sign domains. That is not the point.
Your point here, that in order for RPZ to function in the presence of
widespread DNSSEC signing, there has to be some mechanism for authenticating
RPZ answers _as_ RPZ answers, doesn't seem clearly true. It
may be perfectly functional for RPZ answers to look like an attack. But it's
certainly worth considering, and has been talked about earlier in this thread.
The question is, does it make sense to add code
to the validating resolver to detect and validate an RPZ block, so the user can
be informed that a block occurred, and who did it? Would people actually code
this up? Would it be better or worse?
To me that is quite obvious "yes". If we allow the DNS protocol to
randomly rewrite DNS, then why _do_ we have DNSSEC?
To me it seems like a bad idea: it's a larger attack surface, more complexity,
a single point of attack: if I can compromise the RPZ keys, I can make an
attack look like protection to the end user.
Excellent! It means if the RPZ/DNS provider screws up, they are
accountable. And they will properly maintain such systems that
are golden opportunity for hackers to compromise. Also, the
danger you are describing "I can make an attack look like protection to
the end user" is exactly what the current RPZ spec already allows!
I guess you really meant to say "a compromised RPZ system can unblock
a malicious and previously blocked side". Well yes. You are describing
a weakness, not a strength, of the RPZ solution.
Ultimately, if we were to specify a solution for this, I think we doul actually
be doing something harmful to human rights. Isn't blocking the domain enough?
Just blocking the domain is "too much". And in my view that _is_ the
human rights issue.
If we change this discussion and replace DNS and DNSSEC with BGP and
RPKI, would you still think it is fine to allow random parties to
change BGP announcements in a world of secure BGP so that users can
be prevented to go to certain IP ranges?
Paul
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop