Hi,
Ted made a valid point about "running code" in this thread.
So I've been experimenting with various configurations.
My conclusions:
1) We definitely need to properly secure communication between the HNA
and the DM for control traffic.
This needs to be an explicit part of the draft.
2) Authentication based on the physical connection, plus source IP
address, plus correlation of the source address against the contents of
the RR *might* be sufficient for transactions between the HNA and the DM
for reverse zones - all communication is guaranteed to be contained
within a single AS.
Current best practice of using IP ACL's + BCP 38 for filtering
communication could work in this case. The DM would then check whether
the contents of the PTR updates arrived from a source address associated
with the HNA.
We'd need to add some text saying the HNA should select source addresses
for reverse zone updates appropriately (to make sure the updates came
from an address issued via IA-PD from this ISP).
3) for communication between the HNA and a DM for forward zones, we
definitely need to specify something stronger, because the DM
potentially has to serve HNA's scattered over the entire Internet.
4) TSIG isn't going to scale operationally IMHO.
Too many keys to manage. Keys have to be stored on line within the DM.
Losing keys means compromising the whole service, and it is difficult to
recover from.
5) SIG(0) has similar problems.
Bootstrapping the trust might mean the expiration time would have to be
so large that replay attacks will come into play.
And recovery is difficult.
6) DNS over an existing standard FOO secure transport looks promising.
The amount of traffic arriving at a DM should not be so large or time
critical as the traffic to the resolvers, and capacity can be scaled by
increasing the numbers of DM's.
There is also existing front-end hardware acceleration available. So the
secure transport could theoretically be terminated on an dedicated
acceleration box, and the DM only then needs to speak native DNS.
7) DNS over TLS can almost certainly be made to work without any new
standards, but it will require extensive coding as support seems pretty
limited off the shelf.
It also has the added benefit that client authentication can be built
into the transport.
So I've been playing around with the DM being authenticated by public
certificates to the HNA (HNA would incorporate root certificates burned
in at the factory), and the HNA being authenticated to the DM by a
client-specific certificate that is signed using a self-signed
intermediate CA certificate from the DM. The DM then trusts the
certificates it has issued to the client HNA's simply by installing the
root CA cert on the DM: there's no client specific configuration required.
Since the HNA anyway has to be configured to use the DM, and some trust
has to be established, I don't see this as an onerous burden in the
sign up process.
8) DNS over HTTPS doesn't bring us anything extra in this case IMHO.
It actually presents additional challenges with coding alternate
transports and parsing (POST or GET HTTP1.1 HTTP2) etc.
Others may disagree, so the draft could use a "recommend DNS over TLS"
9) IMHO we should also standardize the trust-booting process into a JSON
file, that can either be fetched via HTTPS or pasted into the HNA.
This for the same reasoning for inter-operability that DNS standardized
the file representation of the zone file in RFC1035 Section 5.
For a start, I came up with the following, although I'm sure we can
improve as we get more experience in what parameters are needed for each
implementation.
I came up with 4 parameters:
dm_axfr fqdn of the DM for axfr (so the HNA can apply IP filters on
inbound requests)
dm_ctrl fqdn of the DM for ctrl (so the HNA can send updates to the
DM control channel e.g. if the HNA renumbers it would send an NS record
and AAAA record update)
zone the zone that is being delegated
hna_certificate client certificate encoded as a single line with
literal '\n' replacing cr and lf characters (common practice in existing
equipment when pasting certificates)
This would also work for a reverse zone, although obviously it's a
different DM etc.
Sample:
{"dm_axfr":"dm.homenetdns.com","dm_ctrl":"dm.homenetdns.com","zone":"sub.homenetdns.com","hna_certificate":"-----BEGIN
CERTIFICATE-----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\n0zC9KEHHRDJM8HiivyB0RaI9vmKc08MBThU0OBvJgQ==\n-----END
CERTIFICATE-----\n"}
Thoughts?
Daniel Migault wrote on 12/06/2019 04:20:
Hi Jacques,
I agree the HNA cannot generate the full zone out of the box and needs
some information such as the NS. It also needs some information to
configure the primary / secondary relation such as the the IP of what
we now call the Distribution Master. DNS update on a specific zone
seems tempting especially as it is available code for it. Though I
might be biased, but i am not sure we need TSIG. I need more thoughts.
Yours,
Daniel
On Tue, Jun 11, 2019 at 3:00 PM Jacques Latour <jacques.lat...@cira.ca
<mailto:jacques.lat...@cira.ca>> wrote:
Daniel,
In trying to setup our secure home gateway project to have the
external zone & primary DNS server setup and managed on the
gateway itself and to XFR back to secondary name servers somewhere
turned out not be functional or practical, first, the gateway does
not know for sure which external NS are use by the secondary DNS
service, second, the IPs of the WAN port might not be the internet
facing IPs and this could break inbound connectivity. We’re
looking at using dynamic DNS updates for things that need internet
connectivity, and have the primary DNS server on the main land.
TSIG & DNS over TLS look like a good option to look at.
Jacques
*From:*homenet <homenet-boun...@ietf.org
<mailto:homenet-boun...@ietf.org>> *On Behalf Of *Daniel Migault
*Sent:* June 7, 2019 4:03 PM
*To:* homenet <homenet@ietf.org <mailto:homenet@ietf.org>>
*Subject:* [EXT] [homenet] securing zone transfer
Hi,
The front end naming architecture uses a primary and a secondary
dns server to synchronize a zone. The expected exchanges are (SOA,
NOTIFY, IXFR, AXFR. We would like to get feed backs from the
working group on what are the most appropriated way to secure this
channel.
Options we have considered are TSIG, IPsec, TLS, DTLS. TSIG does
not provide confidentiality, and we would rather go for user space
security. Are there any recommendation for using TLS or DTLS in
that case ?
Any thoughts would be helpful.
Yours,
Daniel
_______________________________________________
homenet mailing list
homenet@ietf.org <mailto:homenet@ietf.org>
https://www.ietf.org/mailman/listinfo/homenet
_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet
--
regards,
RayH
<https://www.postbox-inc.com/?utm_source=email&utm_medium=siglink&utm_campaign=reach>
_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet