I've recently been reading draft-ietf-dnsop-rfc7816bis and I'd like to propose some additional text for the Security Considerations section in the spirit of this sentence from the abstract:
"Future versions of this draft will contain descriptions of different minimisation implementation choices that have been made since the RFC 7816 first came out, as well as deployment experience." QNAME minimization has the consequence of reduction in the amount of information seen by authoritative name server operators. Active consideration of that consequence is worth capturing as a factor to be weighed when making the choice to implement QNAME minimization, especially if there are other ways to gain privacy protection. Here's suggested text: In addition to the performance considerations described in Section 4, there's also a security risk associated with the reduction of data sent to authoritative name servers: they lose some of their ability to assess security threats [Kaliski-Minimum]. This ability has proven to be useful in, for example, studies of name collision vulnerabilities [MitM-Attack-Name-Collisions] [Client-Side-Name-Collision]. It was also instrumental in the research that led to the discovery of the JASBUG vulnerability [ICS-ALERT-15-041-01]. The reduction will also have an impact on the level of detail available for research studies such as DNS-OARC's annual Day in the Life of the Internet (DITL) data collection exercise [DITL]. For this reason, implementers should also consider the potential impact on threat analysis and research when reducing the level of detail included in queries to authoritative name servers. Without such consideration, a collection of individual decisions to reduce query information, over time, may well have the unintended consequence of "deciding" to no longer support threat analysis and research that the operational DNS community has historically relied on. Alternative mechanisms for facilitating threat analysis and research are beyond the scope of this document. [Client-Side-Name-Collision] Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, and Z. Morley Mao. "Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study". In ACM Conference on Computer and Communications Security (CCS '17), pp. 941-956. ACM, November 2017. <https://acmccs.github.io/papers/p941-chenA.pdf> [DITL] CAIDA, "A Day in the Life of the Internet (DITL)", <http://www.caida.org/projects/ditl/> [ICS-ALERT-15-041-01] NCCIC/ICS-CERT, "Microsoft Security Bulletin MS15-011 JASBUG", February 10, 2015, revised August 23, 2018. <https://ics-cert.us-cert.gov/alerts/ICS-ALERT-15-041-01> [Kaliski-Minimum] Kaliski, B., "Minimum Disclosure: What Information Does a Name Server Need to Do Its Job?", March 2015, <http://blogs.verisigninc.com/blog/entry/minimum_disclosure_what_information_does> [MitM-Attack-Name-Collisions] Qi Alfred Chen, Eric Osterweil, Matthew Thomas, and Z. Morley Mao. "MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era". In 37th IEEE Symposium on Security and Privacy (S&P '16), pp. 675-690. IEEE, May 2016. <https://cs.gmu.edu/~eoster/doc/MitM-Attack-by-Name-Collision-Cause-Analysis-and-WPAD-Vulnerability-Assessment-in-the-New-gTLD-Era.pdf> Scott _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop