Re: (short version) Re: Last Call: <draft-faltstrom-uri-10.txt> (The Uniform Resource Identifier (URI) DNS Resource Record) to Proposed Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Feb 24, 2015 at 08:49:29AM -0800, Paul Hoffman wrote:

> On Feb 23, 2015, at 8:33 AM, Sam Hartman <hartmans-ietf@xxxxxxx> wrote:
> > Yes, I see significant security problems with this URI.
> 
> It sounds like you have issues with URIs in general, not in a DNS RTYPE
> that carries a URI. That is, any URI that has a domain name that can lead
> to redirection (though CNAME, DNAME, or SRV) would have the properties
> that worry you. It that a fair summary?

That's not how I read it.  The issue here is that the draft introduces
a DNS-based rewrite of the TLS reference identifier.

	_mumble.example.com. IN URI "https://example.net/";

The draft language stipulates (correctly I think given that DNS
also specifies the URI scheme) that DNSSEC is required and the TLS
reference identifier becomes "example.net".  This is not the case
for HTTP with either CNAME or DNAME, and HTTP does not use SRV
records.

When pre-DANE MTAs use MX records with TLS securely (rather than
just going through the motions), they use the nexthop domain (not
the MX host domain) as the reference identifier.

Similar considerations come into play with RFC 6186 indirection of
IMAP and SMTP server locations.  RFC 6186 just drops the ball in
the user's lap.  A more comprehensive solution is hinted at in:

    http://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-14#section-7

but I'm not sure where we are whether DNSSEC last-mile is as yet
sufficiently addressed for that.

Of course with the document under discussion, if mobile applications
are in scope, then of course we again need DNSSEC to be usable in
last-mile environments.

-- 
	Viktor.





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]