> -----Original Message-----
> From: Olafur Gudmundsson <o...@ogud.com>
> Sent: Wednesday, July 10, 2019 6:29 PM
> To: Hollenbeck, Scott <shollenb...@verisign.com>
> Cc: dnsop@ietf.org
> Subject: [EXTERNAL] Re: [DNSOP] Security Considerations Suggestion for
> draft-ietf-dnsop-rfc7816bis
>
>
> Hi Scott, some nits below
> > On Jul 8, 2019, at 3:00 PM, Hollenbeck, Scott
> <shollenbeck=40verisign....@dmarc.ietf.org> wrote:
> >
> > I've recently been reading draft-ietf-dnsop-rfc7816bis and I'd like to
> propose some additional text for the Security Considerations section in the
> spirit of this sentence from the abstract:
> >
> > "Future versions of this draft will contain descriptions of different
> minimisation implementation choices that have been made since the RFC
> 7816 first came out, as well as deployment experience."
> >
> > QNAME minimization has the consequence of reduction in the amount of
> information seen by authoritative name server operators. Active
> consideration of that consequence is worth capturing as a factor to be
> weighed when making the choice to implement QNAME minimization,
> especially if there are other ways to gain privacy protection. Here's 
> suggested
> text:
> >
> > In addition to the performance considerations described in Section 4,
> > there's also a security risk associated with the reduction of  data
> > sent to authoritative name servers: they lose some of their ability to
> > assess
>
> “data sent to authoritative name servers”
> The zone authoritative name servers get the same query with and without
> Query Minimization (QM) I think you want to say “parental name servers” i.e.
> servers for zones above the zone.

Thanks for the feedback, Olafur. I'm Ok with "parental" instead of 
"authoritative".

> > security threats [Kaliski-Minimum].  This ability  has proven to be useful 
> > in,
> for example, studies of name collision vulnerabilities [MitM-Attack-Name-
> Collisions]  [Client-Side-Name-Collision].  It was also instrumental in the
> research that led to the discovery of the JASBUG vulnerability  [ICS-ALERT-15-
> 041-01]. The reduction will also have an impact on the level of detail 
> available
> for research studies such as DNS-OARC's annual Day in the Life of the
> Internet (DITL) data collection exercise [DITL].
>
>
> Your arguments about visibility to researchers are true but not exclusive i.e.
> the same information can be derived from recursive resolvers, and from the
> pool of queries that still arrive without QMr.
> As for using the DITL as argument against query-minimization I think there
> should be some arguments that DITL collection serves a useful purpose.

OK, so let's see what others have to say about the utility of mentioning DITL 
data collection.

> > For this reason, implementers should also consider the potential impact on
> threat analysis and research when reducing the level of detail included in
> queries to authoritative name servers. Without such consideration, a
> collection of individual decisions to reduce query information, over time, may
> well have the unintended consequence of "deciding" to no longer support
> threat analysis and research that the operational DNS community has
> historically relied on.  Alternative mechanisms for facilitating threat 
> analysis
> and research are beyond the scope of this document.
>
> again object to the word “authoritative”
> I think this statement is not needed, it assumes that such research can only
> be done by operators of parental domains.
> What QM does is to disrupt operating models and data collection by
> intermediaries ==> that was an explicit goal The target of your advise is not
> JUST implementers of software but operators of resolvers as most resolver
> implementations provide a configuration option to select QM

So how about this?

In addition to the performance considerations described in Section 4, there's 
also a security risk associated with the reduction of  data sent to parental 
name servers: they lose some of their ability to assess security threats 
[Kaliski-Minimum].  This ability  has proven to be useful in, for example, 
studies of name collision vulnerabilities [MitM-Attack-Name-Collisions]  
[Client-Side-Name-Collision].  It was also instrumental in the research that 
led to the discovery of the JASBUG vulnerability  [ICS-ALERT-15-041-01]. The 
reduction will also have an impact on the level of detail available for 
research studies such as DNS-OARC's annual Day in the Life of the Internet 
(DITL) data collection exercise [DITL].

For this reason, operators should consider the potential impact on threat 
analysis and research when reducing the level of detail included in queries to 
parental name servers. Without such consideration, a collection of individual 
decisions to reduce query information, over time, may well have the unintended 
consequence of "deciding" to no longer support threat analysis and research 
that the operational DNS community has historically relied on.  Alternative 
mechanisms for facilitating threat analysis and research are beyond the scope 
of this document.

Scott
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to