Re: [dane] DNSSEC debug advice (TLSA lookup problem).

Viktor Dukhovni <ietf-dane@dukhovni.org> Mon, 08 September 2014 13:38 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A3771A87E3 for <dane@ietfa.amsl.com>; Mon, 8 Sep 2014 06:38:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.8
X-Spam-Level:
X-Spam-Status: No, score=0.8 tagged_above=-999 required=5 tests=[BAYES_50=0.8] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iHicB_bjqT6s for <dane@ietfa.amsl.com>; Mon, 8 Sep 2014 06:38:14 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F13F91A87D1 for <dane@ietf.org>; Mon, 8 Sep 2014 06:38:13 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 69E0F2AB2D3; Mon, 8 Sep 2014 13:38:12 +0000 (UTC)
Date: Mon, 08 Sep 2014 13:38:12 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: dane@ietf.org
Message-ID: <20140908133812.GW26920@mournblade.imrryr.org>
References: <20140904202137.GD26920@mournblade.imrryr.org> <20140904210017.09E4D1E6A231@rock.dv.isc.org> <20140904213730.GE26920@mournblade.imrryr.org> <20140904230533.ED33E1E6D2FC@rock.dv.isc.org> <20140905151149.GO26920@mournblade.imrryr.org> <20140905213934.E12C61E806B5@rock.dv.isc.org> <20140905215545.GA26920@mournblade.imrryr.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20140905215545.GA26920@mournblade.imrryr.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/Jlcv8FGtJdji46oU6EwB6ai1C14
Subject: Re: [dane] DNSSEC debug advice (TLSA lookup problem).
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dane@ietf.org
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Sep 2014 13:38:16 -0000

On Fri, Sep 05, 2014 at 09:55:45PM +0000, Viktor Dukhovni wrote:

> On Sat, Sep 06, 2014 at 07:39:34AM +1000, Mark Andrews wrote:
> 
> > The problem is the wildcard and the broken wildcard processing, not
> > the CNAME.  The rcode is wrong as a result, NOERROR != NXDOMAIN.
> 
> Yes, that's it, as I eventually also figured out...

The DNS server in question is djbdns.  Corrected wildcard processing
may be available at <http://www.tinydnssec.org/>, but I've not tested
that software or looked at it in any detail beyond the claim in the
list of improvements that the issue is resolved:

    The interpretation of wildcard records now matches the description
    in RFC-1034 section 4.3.3. Specifically, if there's a wildcard
    *.x and a record for a.x, then a query for y.a.x will not be
    answered using the wildcard (for a label 'a' and series of
    labels 'x' and 'y').  This change is required for signed domains,
    because authentication of negative responses requires a common
    understanding between client and server about the meaning of
    wildcards.

There is an important note about running that software as a secondary:

    Be careful with publishing signed zones as a secondary nameserver:
    the modified tinydns/axfrdns require certain helper RRs in the
    database to simplify locating NSEC3 records. Without these
    helpers, tinydns cannot generate valid negative response nor
    valid wildcard responses.

-- 
	Viktor.