TLS seems like a poor choice for any new cryptographic transport, it is a
very complicated protocol with a considerable amount of implementation
complexity, computational and network costs. DTLS seems poorer still, as it
is an adaptation of primitives never intended for datagram transmission.

But feedback on the draft:

   * It's unclear how your protocol would really mitigate an active
attacker sending bogus responses. Won't the attacker still be able to
disrupt the DTLS session? Allowing session multiplexing by query-id likely
amplifies this risk.

   * In DTLS, the ClientHello is in the plain - this presents opportunities
for downgrade attacks and inference making. Considering the proposal
advocates for hardcoding the certificate, why not just use a key from the
off?

   * Some nameservers definitely don't just "not respond" when they get
messages they don't understand :/

   * Is the entire protocol subject to the simplest downgrade attack of
all? Just cause the first server response to be dropped and regular DNS
will be used?

   * How long should session state persist?

   * The network costs of certificate transmission probably pale in
comparison to the computational costs of key negotiation. How should
trivial key-exchange ddos attacks be prevented?

   * TLS Heartbeat messages do not permit asymmetric MTU discovery.

On Wed, Apr 23, 2014 at 6:47 AM, Dan Wing <d...@danwing.org> wrote:

> For discussion.
>
>    DNS queries and responses are visible to network elements on the path
>    between the DNS client and its server.  These queries and responses
>    can contain privacy-sensitive information which is valuable to
>    protect.  An active attacker can send bogus responses causing
>    misdirection of the subsequent connection.
>
>    To counter passive listening and active attacks, this document
>    proposes the use of Datagram Transport Layer Security (DTLS) for DNS,
>    to protect against passive listeners and certain active attacks.  As
>    DNS needs to remain fast, this proposal also discusses mechanisms to
>    reduce DTLS round trips and reduce DTLS handshake size.  The proposed
>    mechanism runs over the default DNS port and can also run over an
>    alternate port.
>
> http://tools.ietf.org/html/draft-wing-dnsop-dnsodtls
>
> -d
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>



-- 
Colm
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to