After thinking about the response below a bit, my question would be - when a 
receiver expects a record to be present, but it isn’t, what is the proper 
response?

The proper response will depend on the reason - more accurately the presumed 
(lacking any out-of-band signals) reason - why the record is absent.

From observations of the deployment of DNSSEC, most of the time that needed 
records weren’t present have been from operational errors and not malicious 
activity.  This has led to a mindset that makes new deployments seen as high 
risk.

It’s very important that a secured protocol be able to thwart or limit damage 
due to malicious behavior, but it also needs to tolerate benign operational 
mistakes.  If mistakes are frequent and addressed by dropping the guard, then 
the security system is a wasted in investment.

I’ve not yet equated a missing DELEG record to a sign of a malicious attack.  I 
can see that during a transitional phase, the absence/presence of a DELEG 
record may be a matter of one or more operators experiencing roll-out jitters.  
Or even caching effects, where (apparently) overly long TTLs on existing 
resource record sets for a zone might have pinned them into memory while 
servers are now publishing DELEG.

That is why the protocol definition needs to treat this as ‘set expectations’ 
and how to react, rather than assume a mindset of addressing ‘downgrade 
attacks.’  How one reacts to a benign error is different than the reaction to a 
malicious attack, in the past protocol definitions have been written as if 
everything unexpected was malicious.

The question remains - can a receiver distinguish between a benign error and a 
malicious attack?

From: Ben Schwartz <bem...@meta.com>
Date: Tuesday, January 30, 2024 at 13:59
To: Edward Lewis <edward.le...@icann.org>, "dnsop@ietf.org" <dnsop@ietf.org>
Subject: [Ext] Re: General comment about downgrades vs. setting expectations in 
protocol definitions

In this line of reasoning, let's remember the "herd immunity" effect.  If 
receivers mostly respond to expectation violations by transparent fallback, an 
attacker on the wire has more incentive to attempt the downgrade attack.  If 
receivers mostly "fail closed", this incentive is reduced.  This is a 
collective security effect, not something that can be determined unilaterally 
by each receiver.

--Ben Schwartz
________________________________
From: DNSOP <dnsop-boun...@ietf.org> on behalf of Edward Lewis 
<edward.le...@icann.org>
Sent: Tuesday, January 30, 2024 1:21 PM
To: dnsop@ietf.org <dnsop@ietf.org>
Subject: [DNSOP] General comment about downgrades vs. setting expectations in 
protocol definitions

!-------------------------------------------------------------------|
  This Message Is From an External Sender

|-------------------------------------------------------------------!

I hear talk about "downgrade attacks" frequently, across different ideas.  
Hearing it again in the context of DELEG, I had this thought.

We often wind up mired in discussions about downgrades, what they mean, the 
consequences.  I'd suggest, as definers of protocols, we think in terms of 
ensuring that receivers of messages have an expectation of something.  Inside 
protocol rules, data may be expected and arrive, expected and not, unexpected 
and arrive, or unexpected and not arrive.  A downgrade attack is a diagnosis of 
"expected and not".

A protocol ought to be documented to set up the receiver's expectations and 
define what the receiver does when they are not met.

Apologies for this generic message, when looking at the DELEG documents again, 
it'll be something I'll keep in mind.  I.e., the proposal to define one of the 
flags in the DNSKEY resource record format is setting up an expectation....

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop 
[ietf.org]<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/dnsop__;!!PtGJab4!9Kib5s7byH9knE7jhrQHwMERW6OMcWPfc55IGNZKu9OARR3qQfUc8Jef5Vv0DwibGVBtaVRpbgZ6N2ssZQkVyQ$>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to