On Mon, 16 Mar 2015, Jacob Appelbaum wrote:
Subject: [DNSOP] discussion for draft-appelbaum-dnsop-onion-tld-00.txt
Is this meant to replace or augment draft-grothoff-iesg-special-use-p2p-names ?
- most importantly is the date October 1st. On that date we'll have a death day for currently issued certifcates with .onion names. This makes the onion name issue rather time sensitive and without further action, some stuff will likely break.
How does the certificate "dead line" affect (non-)DNS for .onion? I have reviewed the document and I'm not sure what is intended? I think it is meant as advise to DNS implementors? I guess it is an attempt to reduce .onion leaks if those happen to hit the DNS infrastructure? If so, I would think a much shorter document could be written that only talks about stub resolvers and caching resolvers, stating they should never forward any of these queries but return something - and I'm not sure if NXDOMAIN is the best answer if these resolvers cannot go out to fetch the real DNSSEC proof needed to authoritatively say so. SERVFAIL might be better. Although, if draft-ietf-dnsop-qname-minimisation becomes an RFC, and I'm pretty sure that it will, then actually processing the query would not leak that much information anymore, as only the "onion." request will go out (and get cached) and proper DNSSEC proof will come back denying its existance, without leaking the fake FQDN onion address.
Htmlized: http://tools.ietf.org/html/draft-appelbaum-dnsop-onion-tld-00
The Tor network [Dingledine2004] has the ability to host network services using the ".onion" Top-Level Domain. Well, it does not because there is no Top-Level Domain of ".onion" and we have the cryptographic proof of that in the root zone. Applications that do not implement the Tor protocol SHOULD generate an error upon the use of .onion, and SHOULD NOT perform a DNS lookup. If an application does not implement tor, and is not tor aware, it _will_ do a DNS lookup. You can't really go ask the world to stop doing that. You need to deal with that fact. Resolvers that implement the Tor protocol MUST either respond to requests for .onion names by resolving them (see [tor-rendezvous]) or by responding with NXDOMAIN. Other resolvers SHOULD respond with NXDOMAIN. Again, stating what software that is not TOR aware should do is a lost cause. They will just think it is a real DNS query and process it that way. Resolvers that do support Tor and that for some "tor reason" are returning NXDOMAIN are going to hit DNSSEC validation failures if the application using that resolver is DNSSEC aware. The NXDOMAIN has to come with some NSEC/NSEC3 proof. In a way, you are lucky because there is such a the proof - because it _really_ does not exist. But it means any resolver can return that proof for "legitimate" tor domains as well, which I would guess is some kind of a security issue for tor aware applications using a system or network bassed resolver? 4. Caching DNS Servers: Caching servers SHOULD NOT attempt to look up records for .onion names. They SHOULD generate NXDOMAIN for all such queries. 5. Authoritative DNS Servers: Authoritative servers SHOULD respond to queries for .onion with NXDOMAIN. Well, they already do? Because it does not exist! Users must take special precautions to ensure that the .onion name they are communicating with is correct, as attackers may be able to find keys which produce service names that are visually or apparently semantically similar to the desired service. Also, users need be aware of the difference between a .onion name used and accessed directly via Tor-capable software, versus .onion subdomains of other TLDs and providers (e.g., the difference between example.onion and example.onion.tld). I don't think an RFC can tell enduers what to do or expect? If client software attempts to resolve a .onion name, it can leak the identity of the service that the user is attempting to access to DNS resolvers, authoritative DNS servers, and observers on the intervening network. This can be mitigated by following the recommendations in Section 2 It could also be mitigated by actually configuring a .onion zone, but your document states that's really unwanted. Why? Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop