On Sun, Dec 16, 2018 at 11:45 AM Paul Wouters <p...@nohats.ca> wrote:

> On Fri, 14 Dec 2018, Eric Rescorla wrote:
>
> > However, in a large number of cases (e.g., an attacker on your local
> network,
> > there are non-DNSSEC ways of obtaining this property, such as using DoH.
>
> Data origin authenticity is not the same as transport security.
>

Yes, I'm quite aware of this fact.


DoH offers no guarantee that the non-dnssec protected information you
> received is not modified.
>

As with all things security, it depends on your threat model. If the
attacker you
are concerned with is between you and the DNS server, then in fact it does
provide protection.


Unfortunately, I keep needing to say this on various IETF lists. The
> move towards "blindly trusting DNS over HTTPS/TLS" servers is misguided
> and just moving the goal post.
>

I don't think this is a very accurate characterization of the situation. At
present,
the vast majority of DNS information is not DNSSEC protected [0], and yet we
have to rely on it. If there's a "blindly trusting" in this discussion,
it's that. DNS
over HTTPS is designed to improve the situation, though of course it's not
a panacea.

However in *this* case, it actually covers a pretty large fraction of the
threat
model, because (1) many attackers are close to the user and (2) if the
attacker
controls your DNS server, then they learn which site you are going to in
any case even before you send SNI. Even if all the attacker can do is
*modify*
records rather than observe queries, this is often enough. For censorship
applications,
they just serve a blackholed IP address, and for surveillance applications,
an
attacker with significant network capabilities can serve a dedicated IP for
each
server name and then forward the traffic.

Note that DNSSEC does not help very much in this case. If the attacker is
the server, they don't need to modify records, and if they are not the
server,
then DNSSEC protection relies upon the client hard-failing on DNSSEC
failures,
which generic clients do not do because it would cause unacceptable failure
rates.

-Ekr

[0] https://www.cs.umd.edu/~dml/papers/dnssec_imc17.pdf provides an overview
of the extremely depressing state of play; only 1% of .com is properly
signed
and about 30% of domains which have DNSSEC don't publish all the records
needed to verify the domain.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to