Oops. I manually entered the review result in the datatracker form. The intended review result is “Not Ready."
> On Mar 6, 2022, at 4:21 PM, Christopher Wood via Datatracker > <nore...@ietf.org> wrote: > > Reviewer: Christopher Wood > Review result: Not Ready > > Reviewer: Christopher Wood > Review result: Has issues > > General comments: > > In general, the problem statement and motivation for this draft -- and the > techniques in Section 3 in particular -- seems underspecified. For example, > what are the requirements for the firewall or MUD controller name<>address > mappings? Is this mapping ever allowed to be stale? If so, how stale can it > be? > What is the threat model for the controller when trying to enforce a > name-based > policy and update its mappings? Does it consider an attacker that tries to > interfere with how the mappings are constructed, either via direct queries to > DNS or via reverse DNS queries through in-addr.arpa? What privacy > considerations are relevant in the presence of this (or other) attackers? What > sort of assumptions are made about the content or service that is accessed > after these DNS queries complete? > > Specific comments: > > Section 1. > > Use of a DNS name rather than IP address in the ACL has many > advantages: not only does the layer of indirection permit the mapping > of name to IP address to be changed over time, it also generalizes > automatically to IPv4 and IPv6 addresses, as well as permitting > loading balancing of traffic by many different common ways, including > geography. > > I might generalize this a bit to also include multi-CDN deployments for > services, wherein load balancing might account for geography, load, etc. > > Section 3. > > In order to compensate for this, the MUD controller SHOULD regularly > do DNS lookups. These lookups need to be rate limited in order to > avoid load. It may be necessary to avoid recursive DNS servers in > order to avoid receiving cached data. > > This seems to suggest that controllers should, in the name of "security", > intentionally bypass resolver caches to ensure their view of the name<>address > mappings is never stale. This doesn't seem like great advice, considering (1) > the data should always be assumed to be stale (this is a distributed system, > after all) and (2) any benign firewall operator may simply try to increase the > rate of queries to drive down the probability of working with stale data. That > may in turn either overload the authoritative server, or cause the MUD > controller to be rate limited, yielding the opposite of the desired effect. > > Section 4.2 > > Those names are often within some third-party Content-Distribution- > Network (CDN) system, or may be arbitrary names in a cloud-provider > storage system such as Amazon S3 (such [AmazonS3], or [Akamai]). > > Does this mean to say that the names are unpredictably chosen by the content > provider, and not by the content owner? If so, I might rephrase it as such. > > Section 4.3 > > Some CDNs make all customer content at a single URL (such as > s3.amazonaws.com). This seems to be ideal from a MUD point of view: > a completely predictable URL. The problem is that a compromised > device could then connect to any S3 bucket, potentially attacking > other buckets. > > What does "attacking other buckets" mean here? Does it mean increasing number > of reads to those buckets? Or perhaps _writing_ to those buckets? I don't know > what sort of access control techniques are typically used here, but the > latter, > i.e., people writing to arbitrary buckets, would be surprising to me. In any > case, I would clarify what is meant here, along with what assumptions are made > about the content providers themselves. > > Section 5. > > There are significant privacy issues with having IoT devices sending > their DNS queries to an outside entity. Doing it over a secure > transport (DoT/DoH) is clearly better than doing so on port 53. The > providers of the secure resolver service will, however, still see the > IoT device queries. > > This seems to be assuming a particular threat model that may not be > universally > applicable. It may not be the case that using a public resolver will lead to > "significant privacy issues." I might clarify the assumed threat model here, > rather than prescribe one for all users of this document. > > Moreover, if something like Oblivious DoH were used, would this still be an > issue? ODoH is mentioned later on in the privacy considerations, but I think > it > warrants mention here as well. > > Section 6.5. > > Use of public QuadX resolver instead of the provided DNS resolver, > whether Do53, DoT or DoH is discouraged. Should the network provide > such a resolver for use, then there is no reason not to use it, as > the network operator has clearly thought about this. > > I would push back on this. As I understand the situation, some ISP recursive > resolvers essentially forward queries onwards to public (QuadX) resolvers. > What's the difference, then, between using the public resolver directly and > the > network-provided resolver? (This points back to the previous comment on the > assumed threat model.) > > Section 6.5. > > The recommendation here is to do this only when the provided > resolvers provide no answers to any queries at all, and do so > repeatedly. The use of the operator provided resolvers SHOULD be > retried on a periodic basis, and once they answer, there should be no > further attempts to contact public resolvers. > > I think this needs a better description of the threat model in order to make > sense. What if, for example, some attacker basically blocked all answers from > provided resolvers, forcing usage of public resolvers? Is that in scope or > not? > > > _______________________________________________ > secdir mailing list > sec...@ietf.org > https://www.ietf.org/mailman/listinfo/secdir > wiki: https://trac.ietf.org/trac/sec/wiki/SecDirReview _______________________________________________ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg