> On 20 Nov 2018, at 12:45 am, Mukund Sivaraman <m...@mukund.org> wrote:
> 
> Hi Stephen, Francis
> 
> On Mon, Nov 19, 2018 at 04:56:50AM -0800, internet-dra...@ietf.org wrote:
>> 
>> A New Internet-Draft is available from the on-line Internet-Drafts 
>> directories.
>> This draft is a work item of the Domain Name System Operations WG of the 
>> IETF.
>> 
>>        Title           : Secret Key Transaction Authentication for DNS (TSIG)
>>        Authors         : Francis Dupont
>>                          Stephen Morris
>>                          Paul Vixie
>>                          Donald E. Eastlake 3rd
>>                          Olafur Gudmundsson
>>                          Brian Wellington
>>      Filename        : draft-ietf-dnsop-rfc2845bis-02.txt
>>      Pages           : 26
>>      Date            : 2018-11-19
> 
> First, I want to point out that this is a bis document and not errata,
> so it need not (and should not) be limited to just fixing the TSIG
> authenication bypass attack. I strongly feel that RFC 2845 is unclearly
> specified, and TSIG (the protocol) is over-specified. This bis revision
> should make amends.
> 
> Two points that I request this WG to discuss are:
> 
> 1. Sparsely TSIG signed TCP continuation messages (section 6.4 in draft)

I would accept not generating sparsely TSIG signed TCP continuation messages
(except for test code) immediately.  It will take many years before one could
remove the validation side as you need to ensure that all you current peers
don’t generate that style of stream.  Time of publication +10 years if you
want to remove the validation side.  By that time there should be very few
legacy peers.

Add a bit about logging when STSTCM is seen on a connection so it becomes
noisy.  Include the cut off date.  This logging will unfortunately be on
the wrong end of the connection but will give some indication of the expected
breakage.  Start logging at publication date +8 years so the noise is around
the breakage time and not immediately.

> 2. Truncated MACs
> 
> I feel both should be obsoleted now to reduce implementation complexity
> and scope for errors causing authentication bypass. I have talked about
> these on this list before, but won't restate comments in support here to
> prejudice discussion.

This is more complicated.  Removing code support will break existing
configurations that are using truncated hashes.  This would require
deciding a cut off date (publication +10 years), logging when used
including the cut off date.  This is basically human to human rather
than machine to machine.  Code gets updated.  Humans don’t.

> I previously reviewed this bis draft here:
> https://www.ietf.org/mail-archive/web/dnsop/current/msg21227.html
> 
> Many of my review comments were responded to with the terse "17y"
> comment by one of the authors.
> 
> However, ome of the comments from my previous review have been
> incorporated into the current document, but some have not. I
> specifically request Stephen to read the comments in my previous review
> carefully comparing against the current text in context, because I feel
> some of those changes still have to be made.
> 
> Soon after this TSIG authentication bypass attack was reported, during a
> review of the BIND TSIG implementation by Ray Bellis and me, we found a
> couple of other issues. One of them is not a real-world issue (to do
> with under-specification of what to do with full MAC length having
> non-integral number of octets - there are no such common HMACs
> currently), and another that I'm not able to remember that had to do
> with an off-by-1 (or something similar) on the fudge and time signed
> fields. Do you have any recollection of it Ray?
> 
>               Mukund
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to