Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Tue, 15 May 2012 11:22 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2869B21F87F1 for <dane@ietfa.amsl.com>; Tue, 15 May 2012 04:22:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.624
X-Spam-Level:
X-Spam-Status: No, score=-2.624 tagged_above=-999 required=5 tests=[AWL=-0.025, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1JZgYWBHJqfx for <dane@ietfa.amsl.com>; Tue, 15 May 2012 04:22:01 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 99E8421F877D for <dane@ietf.org>; Tue, 15 May 2012 04:22:01 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id D7EF61ECB41C for <dane@ietf.org>; Tue, 15 May 2012 11:21:59 +0000 (UTC)
Date: Tue, 15 May 2012 07:21:58 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120515112154.GA20521@mail.yitter.info>
References: <CABcZeBMY26xrfvAx=UsYN2XnuONZ2vPy9tNwHQALudd=yQDvgA@mail.gmail.com> <643D87CD-D01E-47B8-82E5-D3F57D50C80B@vpnc.org> <alpine.LFD.2.02.1205142229552.10990@bofh.nohats.ca> <CABcZeBMS9cJ3m6JwJED7XAqdsF=zbTUUU_o3-opiZvqMyr7mdw@mail.gmail.com> <alpine.LFD.2.02.1205142352010.10990@bofh.nohats.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <alpine.LFD.2.02.1205142352010.10990@bofh.nohats.ca>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 May 2012 11:22:02 -0000

On Tue, May 15, 2012 at 12:23:13AM -0400, Paul Wouters wrote:
> 
> if you expect a dnssec signed answer (eg because you have a validated
> parental DS) but you did not, the reseult is what? bogus? 

Yes.

> But if there
> might be a zone cut in between the parental DS you have (eg the root)
> and the zone, it is indeterminate? 

If you're not sure whether there is a zone cut because you fell off
the end of a chain without determining that you were into provably
insecure space, then it's bogus.  Otherwise, it's insecure, not
indeterminate.  (DLV or a TA could make the space secure again, of
course, across a probably insecure boundary, in which case it's a
matter of the validation state again.)  For our purposes, you can
think of "Indeterminate" as "I don't have a trust anchor".  This is
the meaning in RFC 4033, which discusses the matter from the POV of
the resolver.

> Right now, a browser can just query for TLSA records to its local
> resolver, and make a decision based on the AD bit. If any filtering
> of DNSSEC is taking place, the local resolver should be returning
> SERVFAIL. Do we want the browser to extract more details with CD? Or
> should they just hard/soft fail based on their local settings? Should
> they find out if this would be "bogus" or "indeterminate", or is there
> no point?

It is possible that the browser could also use some future
to-be-invented API that provided the details without having to have a
full service resolver built in.

> warnings. It's really the same as disabling TLSA. Or else we're going to
> have to teach browsers to remember previous TLSA state and only warn
> when we knew the site used to publish TLSA, but now we are
> indeterminate.

Surely, that's just as bad an idea; the fact that the DNS used to
contain a AAAA record is no guide to whether a site is supporting
IPv6 today, by way of analogy.

Best,

A

-- 
Andrew Sullivan
ajs@anvilwalrusden.com