Whither DANE?

By on 5 Jul 2019

Category: Tech matters

Tags: , , ,

1 Comment

Blog home

At the recent DNS-OARC workshop, I gave a short talk on current prospects for DANE adoption. This generated a fair amount of subsequent commentary, including a blog post by Geoff Huston, so I thought I’d elaborate in this post.

Some background first …

DNSSEC (DNS Security Extensions) is a system to verify the authenticity of data in the Domain Name System (DNS). One of the more exciting prospects for DNSSEC has always been the possibility that it might be used by applications for core security functions.

DANE, which stands for ‘DNS-based Authentication of Named Entities’, is one framework for doing this. It uses signed DNS records to securely associate domain names with cryptographic keying material such as public keys and X.509 certificates (or hashes of them). In theory, at least, DANE could provide an alternative to the existing Internet Public Key Infrastructure (PKI) system that has had a long history of security problems. Many of these problems are quite fundamental to the design of this system.

Applications need to be configured to absolutely trust a very large number of public Certification Authorities (CAs). These CAs have no constraints on the namespace for which they can issue certificates. Any of them can issue a certificate for any of our services, whether we have a business relationship with them or not. So the collective security of the system is equivalent to the CAs with the laxest policies and worst security. It gets worse — many of these CAs, in turn, issue subordinate CA certificates to other organizations (mostly) without any name constraints. An excellent paper from 2013, ‘Analysis of the HTTPS Certificate Ecosystem’, describes the extent of the problem.

Additionally, there are functional deficiencies. Today’s Public CAs are only capable of issuing certificates with the most basic capabilities. If you need to deploy a certificate with some more advanced features — such as a URI or Service Name field to better compartmentalize the security of an application — you are basically out of luck.

Great effort has been expended on designing and deploying band-aids such as the Certificate Transparency system, where Public CAs are now required to log all certificates they issue into verifiable logs operated by yet another set of additional trusted parties — so that mis-issuance of fraudulent certificates can be detected after the fact. But it would be far better to have a more proactive system that can prevent these kinds of mis-issuances in the first place.

Application services on the Internet are identified by their DNS names. If the DNS is secured by DNSSEC, then it’s very natural to consider using that same system to authenticate these applications, and DANE provides exactly this capability. DNSSEC is truly hierarchical with a single trusted root, operated with a high degree of security and transparency. In contrast, the Web PKI is flat and has far too many roots with unlimited authority — this exposes a much larger attack surface that is very challenging to defend. Delegation and trust in DANE already follow the existing DNS delegation hierarchy, and critically, we automatically inherit namespace constraints — zone owners can designate certificates only for their own portion of the DNS namespace.

The vast majority of certificates issued these days are ‘domain validated’ anyway, so the WebPKI ultimately relies on the security of the DNS infrastructure.

(Note: For folks that distrust a hierarchical system, the solution is not a reversion to the WebPKI, but to move to fully decentralized trust architectures. Such systems do exist today in various forms, and I sometimes advocate for them myself, but they are not currently in a state where they are ready for mass adoption and mass usability).

Back to the subject of my talk …

Whenever I attend DNS focused conferences or meetings, I often hear discussions of DANE, and there is usually an air of inevitability about them — DANE will comprehensively solve such and such set of problems, and it’s only a matter of time before it is adopted and deployed. Having been involved in some lengthy struggles to standardize the use of DANE in applications, I knew this was not the case. So, at OARC-30, I delivered a short lightning talk on the topic to highlight the adoption challenges.

The one area where DANE has had some deployment success to date is in SMTP Transport Security, where it provides a downgrade-resistant way to perform TLS authentication of an SMTP server. Viktor Dukhovni publishes a monthly report on DANE uptake in this arena, and the numbers are quite impressive. There are over one million domains with mail servers that can be authenticated with DANE, and adoption is growing over time. Many of these domains are hosted on large shared email hosting providers — so the actual number of zones hosting mail servers that publish DANE records is far smaller though (around 4,500).

The killer application that could have a major positive impact on DNSSEC and DANE adoption, of course, is the Web. This was always going to be a challenging proposition since it involves introducing a competitor to the Web PKI, a highly dominant authentication system with many entrenched interests.

DANE and the Web have a bit of history

Nevertheless, there have actually been a number of attempts to design DANE solutions for the Web. An early attempt by Google in the Chrome browser, which was ultimately abandoned, involved publishing certificate data in the DNS and DNSSEC record chains inside X.509 certificates. Building on this work, I was involved, with collaborators from both the DNS and web communities, in a newer, more complete effort within the Internet Engineering Task Force (IETF) — the organization that standardizes Internet protocols. This was to develop the ‘TLS DNSSEC Chain Extension’ — an extension to the TLS protocol that allows a web server to deliver its DANE record(s) and associated DNSSEC authentication chain inside the TLS handshake, which the web browser then authenticates.

You might be curious why such a mechanism is needed instead of the web browser just querying the DANE and DNSSEC records itself? There are a number of reasons. The first is that browsers often find themselves behind middleboxes that impede their ability to lookup DANE and DNSSEC records. Another reason is latency reduction. DANE authentication involves additional queries, and having the TLS server deliver all the (pre-built and cached) chain of DNS answers in one shot eliminates any additional latency. Finally, delivering the DNSSEC chain via the TLS channel and having the browser directly authenticate it, means there is no requirement for the end system to run a validating stub resolver (which isn’t common) or to have a channel protected connection to an external validating resolver (also not very common).

In the early days of this effort, Mozilla had even funded an implementation of this extension in the Firefox browser. The extension was on the verge of being approved as an IETF standard in March 2018, when a huge technical fight broke out in the working group. A few DANE proponents argued that this extension did not provide downgrade resistance against Web-PKI attacks (that is, an attacker that is able to fraudulently obtain a valid Web-PKI certificate can strip away the extension and preclude DANE authentication). Ironically, I had long ago described this limitation in the protocol along with possible workarounds (Section 8 of the spec), but it was only after the DANE proponents were made aware of this that it suddenly became a show-stopping technical issue.

A pinning mechanism was proposed, whereby web clients would remember whether a server had offered DANE authentication, and then subsequently require it from that server, unless the server could provide proof that they had removed DANE. But the Web browser folks were unanimously opposed to this mechanism. A protracted argument ensued in the TLS working group, with opposing sides unwilling to compromise and ultimately there was a decision to abandon the work. The unfortunate result is that DANE, as an authentication option, is effectively dead for the Web for the foreseeable future.

DNSSEC proponents will naturally desire a DANE authentication mechanism that always trumps the Web-PKI (and provides downgrade resistance against Web-PKI attacks). But we need to consider the objections of the other side seriously.

What were the objections

First, many Web folks do not agree with the premise that DANE needs downgrade protection against the Web-PKI, because they do not see DANE authentication as inherently superior to the Web-PKI. You will often hear the argument that the Web-PKI has moved to 2048-bit RSA keys as a security floor, whereas today’s DNSSEC deployment is still littered with weak 1024-bit RSA keys. This is a real problem. The DNSSEC authentication chain is only as strong as its weakest link.

Of the nearly 1,400 DNS top-level domains that are signed at the current time, 65% of them use 1024-bit or smaller RSA Zone Signing Key, and only 9% have a 2048-bit or greater RSA key (ECDSA keys are still in the extreme minority in this landscape). 1024-bit RSA keys are believed to be in the realm of attack by nation-state actors and/or very large corporations, and the fact that 1024-bit RSA remains in widespread use by DNSSEC is frequently criticized, and rightly so. Anyone trying to position DANE as a superior alternative to the Web-PKI will need to figure out a solution to this problem. (Can we get ICANN to mandate the elimination of weak keys in the generic TLD infrastructure, for example?)

Second, even if the web community agreed with the premise, they have strong objections to pinning, based on their negative experiences with other pinning mechanisms that they have attempted, such as HPKP (HTTP Public Key Pinning). Admittedly, the object of the pinning mechanism that was proposed here (knowledge of DANE existence) was not quite as fraught as pinning public keys. But recovery from incorrect pins remains a challenging issue. The DANE pinning proponents eventually did back down partially by proposing that the pinning behaviour could be optional or specified later, as long as the extension contained a pinning field, but the Web camp was not swayed by this either.

Was there a way forward?

Given there is no easy way to reconcile these fundamental disagreements, one side was going to have to compromise, and it should have been the DNSSEC side. It can be argued that there were intransigent positions in both camps. But like it or not, the reality is that the adoption of new features in the Web is highly dependent on the actions of a small number of organizations that dominate the web browser market. This is just one aspect of the increasing centralization of the Internet, which is a concerning topic in its own right.

The strategy I advocated was to give up on the downgrade protection requirement, get our foot in the door with DANE first, and then pursue a strategy of gradual improvement. Some web browsers work by introducing a new feature tentatively, collecting telemetry on the use of the feature, and, if positive, proceeding on subsequent enhancements. This could have worked in favour of DANE. If DANE usage was taking off, the user community could have come back and asked for enhancements that mandate DANE usage, whether that be a pinning mechanism or even something such as a DANE preload list (similar to what has been done with HSTS). The adoption of DANE, even in one browser, might cause others to later follow suit by peer or market pressure.

If DNSSEC/DANE proponents are so insistent and uncompromising in our stance that we can’t even get our foot in the door of an important and widespread application community, then we’ve lost the battle even before it’s begun. As it stands today, the prospects for DANE authentication in the web are quite bleak.

What’s next?

The TLS DNSSEC Chain Extension is not completely dead. While it failed to be standardized in the IETF’s TLS working group, we have a plan to publish a version of it through the IETF’s Independent Stream. The first likely use case for it will be for DNS over TLS servers, to allow inband DANE authentication of a DNS server. There may be other possible applications such as IMAP, POP, and SMTP submission. I’ll try to be optimistic and hold out hope that Web browsers can be persuaded to look at DANE again at some point in the future.

Shumon Huque is a software engineer and technologist at a large American cloud computing company.

Rate this article

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.

One Comment

  1. arsen stasic

    Thank you for this nice summery of DNSSEC/DANE/TLS.
    Viktor Dukhovni and Wes Hardaker see an increasing number of DNSSEC algorithm 13 (ECDSAP256SHA256) usage. It’s currently almost as widely used as DNSSEC algorithm 8 (RSASHA256) [0]. Their measurements are internet wide and not just limited to TLDs.

    [0] https://stats.dnssec-tools.org/#parameter

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Top