On 7/16/13 9:08 AM, Lloyd Hilaiel wrote:
> On Jul 15, 2013, at 9:34 AM, Dan Callahan <
dcal...@mozilla.com> wrote:
>
>> On 7/15/13 9:05 AM, Francois Marier wrote:
>>> Now, there is one new attack that "HTTPS, then unsigned DNS" opens up
>>> compared to the current "HTTPS only":
>>>
>>> 1. block all traffic tohttps://
idpexample.com
>> You're presuming the site is serving something on HTTPS.
>>
>> DNS based delegation opens up a dead simple attack on domains that are not serving anything on HTTPS, and are currently handled by our fallback.
>
> tl;dr; I'm not yet convinced that DNS delegation when deferred to only in the absence of a response on port 443 adds meaningful risk to users.
I think my "serve something on HTTPS" comment was a bit overly broad.
Specifically, I'm worried about distinguishing between malicious
delegation and legitimate delegation via DNS. Let's run with that a
little bit more.
(Unless you're suggesting that a response of any kind to
https://example.com/ invalidates DNS-based delegation? That seems like a
really strange dance to encode into the protocol, but it's worth
considering.)
> Which domains are those and what percentage of our users do they represent?
The set is basically every domain that doesn't server a well-known file.
Which is effectively all of them.
Regardless, many universities, business, and startups don't use SSL at
all, nor do many Google Apps for your Domain customers.
> We don't care about the raw number of domains. We care about domains prioritized by usage that users type in as part of their email addresses.
Gmail, Hotmail, and Yahoo are all in the null state, per the absence of
a /.well-known/browserid file.
Should
yahoo.co.uk be allowed to delegate to
yahoo.com via DNS? Our life
would've been slightly easier if
mozilla.com had been allowed to
delegate to
signin.mozilla.com via DNS, right?
> First, why wouldn't I just take control of your email directly? If I can poison DNS such that a specific data center would see it, then I can change the MX record to
restmail.net and I can read your email.
Because that only gives you temporary access. Phishing your email
password is the gift that keeps on giving. When's the last time you
changed yours?
> Second, why wouldn't I just phish you more directly?
Because that requires known a user/site intersection, and it's a lot of
work.
With unsigned DNS delegation, I could just sit in a coffee shop with
open WiFi near a university and send everyone @
example.edu to my evil
IdP, regardless of the RP they're trying to get into.
> 1. Based on community feedback (mozilla IT folks included) this is a really high value feature
Absolutely. I'd love to find a sensible way to make this work without
degrading the overall security of Persona.
> 2. (to be vetted) we can design this in such a way that the majority of users are not at risk
Disagree -- see the other thread between me and Warner:
http://thread.gmane.org/gmane.comp.mozilla.identity.devel/5317
> 3. (to be vetted) the additional risk delta to the remainder from the status quo is null
Disagree, per the same.
> 4. If we don't implement high value features with low risk, then persona won't be adopted into the main stream and it's all moot anyway.
Agree. Just not sure this constitutes "low risk" :)
I'm not sure it's high risk, either. I think it may be an acceptable
risk given the reward, but I want to make sure we agree on what risk
exists and its quantification before doing something like this.
-Dan