Podcast
Root Causes 356: Will MPDV Eliminate Email-based DCV?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 23, 2024
Multi-perspective Domain Validation (MPDV) is a necessary evolution of Domain Control Validation (DCV) to protect against Border Gateway Protocol (BGP) attacks. We explore how MPDV may affect accepted DCV methods, especially the email method.
Podcast Transcript
Lightly edited for flow and brevity.
So one of the questions that I think is worth asking is, are there methods of DCV that are not going to be MPDV tolerant? Or are there going to be methods of DCV, where MPDV is insufficient to protect against a BGP attack? And if there are, perhaps those methods need to change or go away, which I think is an interesting thing that the industry needs to think about.
Tim, whenever I am doing a DCV, a domain control validation, I pretty much without exception, will use the DNS method. And I like it because even though I don't like shared secrets, it is a really nice easy way of taking a shared secret, and essentially proving to my CA of choice that yes, I have control over the DNS of this domain, which means man, I own the domain, man. I do.
Another one, of course, is the HTTP method, which is where you basically install a file with the shared secret in it and the CA goes and they find that. Another method is using ACME. The ACME protocol. And yet another method, the one that I think is most interesting to me, is the email method.
So how the email method works is there are a set of constructed email addresses that are allowed to be used and it's things like postmaster@, webmaster@. There's about seven of them, or so. And the CA can send the shared secret to one or all of these and then the subscriber, if they're able to receive that message, and close the loop on the secret, are deemed to be in control of that domain name. And this is the one that worries me because all I have to do is get that email and if I can use a BGP attack to cause that email to be delivered to me, then I have circumvented the DCV process using BGP.
Within the context of BGP, in particular, it strikes me that this could be solved, right? I could send you a series of emails from three different places with three different shared secrets, and make you return all of those shared secrets. That would knock out the fundamental point behind how a BGP attack works, or three, or whatever the number, right. I'm making that number up. We don't know what the number is. But let's pretend for now that it's three. But would the subscriber be tolerant of this? Would they understand what's going on? Would they actually open and respond to three different emails? Or would they open and respond to the first one, and promptly ignore the other two because in their mind, they checked it off as being complete, right? I don't know about you but if I receive, you know, what appears to be two emails from the same source with what looks like the same thing, I just shrug and figure, ok, something stuttered somewhere and I respond to one of them, and I get on with my life.
And so even if we could make it BGP resistant, I'm not clear that it works in the world of pragmatic use cases. It's a different matter when you're doing a DNS based DCV where my servers that are located on three different continents, go and look at DCV, or sorry, go look at your DNS and you don't know. You don't know how many servers are looking at your DNS and you don't care. Right? The email thing requires action from the subscriber in a very proactive and considered way and that strikes me as something that in the real world might have a very low success rate.
And what we said was, you don't have to go off and do anything. And you're absolutely right in saying that on the email side of things, you'd be forcing people to do something unnatural and from a security standpoint, how do you guarantee that the practitioner who's sending an email has done it from, you know, truly independent locations?
And I think with BGP, I think your initial question is the right one, which is, will it survive the MPDV era? Because it'll just seem like, well, here's another Achilles heel in the whole system.
And, you know, let's say BGP attacks, get, you know, people get really good at it because right now, it's hard. Right?
But like every other type of attack, it can get kiddie scripted, you know, to some level. You know, there can be libraries written by real sharp people that just make it incredibly easy to implement. And I think, Tim, I remember playing with metasploit and, you know, I've had my hands on Kali, you know, umpteen number of billion times over the past X number of years and it's a lot of fun because it's the white hats completely blowing the doors off of insecure systems. So the argument of security through obscurity just is never able to be used because it puts the attack in the hands of anybody with basic skills.
And BGP is one of those things where you just don't see it because it's just too scary right now. We're not ready.

