Re: [dane] DNSSEC debug advice (TLSA lookup problem).

Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 05 September 2014 21:55 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CB8C1A01A5 for <dane@ietfa.amsl.com>; Fri, 5 Sep 2014 14:55:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eN8wLYzVu_6L for <dane@ietfa.amsl.com>; Fri, 5 Sep 2014 14:55:47 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDA221A0352 for <dane@ietf.org>; Fri, 5 Sep 2014 14:55:46 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 1CE5E2AB2C0; Fri, 5 Sep 2014 21:55:46 +0000 (UTC)
Date: Fri, 05 Sep 2014 21:55:46 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: dane@ietf.org
Message-ID: <20140905215545.GA26920@mournblade.imrryr.org>
References: <20140904202137.GD26920@mournblade.imrryr.org> <20140904210017.09E4D1E6A231@rock.dv.isc.org> <20140904213730.GE26920@mournblade.imrryr.org> <20140904230533.ED33E1E6D2FC@rock.dv.isc.org> <20140905151149.GO26920@mournblade.imrryr.org> <20140905213934.E12C61E806B5@rock.dv.isc.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20140905213934.E12C61E806B5@rock.dv.isc.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: http://mailarchive.ietf.org/arch/msg/dane/M7fzLBBLqfo_6pvcQhlIpqruoDE
Subject: Re: [dane] DNSSEC debug advice (TLSA lookup problem).
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dane@ietf.org
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Sep 2014 21:55:50 -0000

On Sat, Sep 06, 2014 at 07:39:34AM +1000, Mark Andrews wrote:

> The problem is the wildcard and the broken wildcard processing, not
> the CNAME.  The rcode is wrong as a result, NOERROR != NXDOMAIN.

Yes, that's it, as I eventually also figured out...

> Alternatively adding a non TLSA records at the expected TLSA names
> should work as it should prevent the attempted wilcard lookup in
> the server and the resulting mis-match.
> 
> _tlsa._tcp.mail.clarion-hotels.cz TXT "-"
> _tlsa._tcp.mail2.clarion-hotels.cz TXT "-"

Right, indeed:

    _25._tcp.mail.clarion-hotels.cz  IN TXT "No TLSA RRs here yet"
    _25._tcp.mail2.clarion-hotels.cz IN TXT "No TLSA RRs here yet"

should do the job.  Thanks, I'll suggest this to them as a better
interim solution.

-- 
	Viktor.