I've recently been reading draft-ietf-dnsop-rfc7816bis and I'd like to propose 
some additional text for the Security Considerations section in the spirit of 
this sentence from the abstract:

"Future versions of this draft will contain descriptions of different 
minimisation implementation choices that have been made since the RFC 7816 
first came out, as well as deployment experience."

QNAME minimization has the consequence of reduction in the amount of 
information seen by authoritative name server operators. Active consideration 
of that consequence is worth capturing as a factor to be weighed when making 
the choice to implement QNAME minimization, especially if there are other ways 
to gain privacy protection. Here's suggested text:

In addition to the performance considerations described in Section 4, there's 
also a security risk associated with the reduction of  data sent to 
authoritative name servers: they lose some of their ability to assess security 
threats [Kaliski-Minimum].  This ability  has proven to be useful in, for 
example, studies of name collision vulnerabilities 
[MitM-Attack-Name-Collisions]  [Client-Side-Name-Collision].  It was also 
instrumental in the research that led to the discovery of the JASBUG 
vulnerability  [ICS-ALERT-15-041-01]. The reduction will also have an impact on 
the level of detail available for research studies such as DNS-OARC's annual 
Day in the Life of the Internet (DITL) data collection exercise [DITL].

For this reason, implementers should also consider the potential impact on 
threat analysis and research when reducing the level of detail included in 
queries to authoritative name servers. Without such consideration, a collection 
of individual decisions to reduce query information, over time, may well have 
the unintended consequence of "deciding" to no longer support threat analysis 
and research that the operational DNS community has historically relied on.  
Alternative mechanisms for facilitating threat analysis and research are beyond 
the scope of this document.

[Client-Side-Name-Collision] Qi Alfred Chen, Matthew Thomas, Eric Osterweil, 
Yulong Cao, Jie You, and Z. Morley Mao.  "Client-side Name Collision 
Vulnerability in the New gTLD Era: A Systematic Study".  In ACM Conference on 
Computer and Communications Security (CCS '17), pp. 941-956.  ACM, November 
2017.
<https://acmccs.github.io/papers/p941-chenA.pdf>

[DITL]  CAIDA, "A Day in the Life of the Internet (DITL)", 
<http://www.caida.org/projects/ditl/>

[ICS-ALERT-15-041-01] NCCIC/ICS-CERT, "Microsoft Security Bulletin MS15-011 
JASBUG", February 10, 2015, revised August 23, 2018.
<https://ics-cert.us-cert.gov/alerts/ICS-ALERT-15-041-01>

[Kaliski-Minimum] Kaliski, B., "Minimum Disclosure: What Information Does a 
Name Server Need to Do Its Job?", March 2015, 
<http://blogs.verisigninc.com/blog/entry/minimum_disclosure_what_information_does>

[MitM-Attack-Name-Collisions] Qi Alfred Chen, Eric Osterweil, Matthew Thomas, 
and Z. Morley Mao.  "MitM Attack by Name Collision: Cause Analysis and 
Vulnerability Assessment in the New gTLD Era".  In 37th IEEE Symposium on 
Security and Privacy (S&P '16), pp. 675-690.  IEEE, May 2016.
<https://cs.gmu.edu/~eoster/doc/MitM-Attack-by-Name-Collision-Cause-Analysis-and-WPAD-Vulnerability-Assessment-in-the-New-gTLD-Era.pdf>

Scott

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to