Re: [dane] Behavior in the face of no answer?

Andrew Sullivan <ajs@anvilwalrusden.com> Fri, 04 May 2012 20:21 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F91D21F8539 for <dane@ietfa.amsl.com>; Fri, 4 May 2012 13:21:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.629
X-Spam-Level:
X-Spam-Status: No, score=-2.629 tagged_above=-999 required=5 tests=[AWL=-0.030, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N33bbSqurmBg for <dane@ietfa.amsl.com>; Fri, 4 May 2012 13:21:30 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by ietfa.amsl.com (Postfix) with ESMTP id 5287921F856A for <dane@ietf.org>; Fri, 4 May 2012 13:21:30 -0700 (PDT)
Received: from mail.yitter.info (69-196-144-227.dsl.teksavvy.com [69.196.144.227]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 54C281ECB41C for <dane@ietf.org>; Fri, 4 May 2012 20:21:29 +0000 (UTC)
Date: Fri, 4 May 2012 16:21:27 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: dane@ietf.org
Message-ID: <20120504202121.GJ7394@mail.yitter.info>
References: <20120504023602.GA4683@mail.yitter.info> <CABcZeBO93n_C5detefBcOjAoswe2inGKDj65gQPDQmREyGnhAw@mail.gmail.com> <20120504112922.GB4929@mail.yitter.info> <CABcZeBPTTa07iUHo9XL5WrHGMYHwaQzs6xYtiF25O4Jek8E3RQ@mail.gmail.com> <20120504144426.GD4929@mail.yitter.info> <CABcZeBOM_0L42Rng75AsVda9u4G=FH8=OB8Qg=nQpL-BzRoBuQ@mail.gmail.com> <20120504165512.GC7394@mail.yitter.info> <CABcZeBO4zRSa=JexqZ8uw7o26tM4SZk2GDivTAWD5ZF1pZR9Og@mail.gmail.com> <20120504194132.GF7394@mail.yitter.info> <alpine.LFD.2.02.1205041553030.7798@bofh.nohats.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <alpine.LFD.2.02.1205041553030.7798@bofh.nohats.ca>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [dane] Behavior in the face of no answer?
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 May 2012 20:21:31 -0000

On Fri, May 04, 2012 at 04:03:54PM -0400, Paul Wouters wrote:
> 
> How many months until Rogers (or OpenDNS, or...) starts spitting out AD=1
> on their DNS rewriting schemes?

I wasn't arguing that you should trust it, or that this is a good
state of affairs.  But we can't write the specification such that it
is incompatible with DNSSEC as specified, however little I personally
like the AD bit.

> So your scenario really only happens when you bring up a VPN and connect
> back to a trusted network. At that point, you can trust the AD bit, but
> you also no longer have DNS breakage/filtering happening, so the point
> is moot.

As Martin Rex argues elsewhere in this thread, a NOTIMP response to an
RR you don't know is not obviously inconsistent with RFCs 1034 and
1035.  Ekr's position would cause a system that depended on
intermediate-resolver validation, the AD bit, and a resolver that can't
handle unknown RRTYPEs, to cause all TLS negotiation to fail for
TLSA-aware clients.  This isn't "will cause TLSA not to work", it's
"can't use TLS at all on that system".  I have no idea whether there
are such configurations in the wild, but they're pefectly acceptable
under the standards we have.  It seems to me, therefore, that one
needs to be able to turn off TLSA use under such circumstances, if
we're going to say that such failures must "fail hard".

> The other scenario is an application talking to the local resolver that
> returns the AD bit, which just moves the DNS connectivity problem from the
> application to the local resolver, but runs into the same hard/soft
> fail issue, except the browser knows even less about the reasons for
> the failure or success, and can give less feedback to the user to make
> an educated guess as to the severity of the failure to be hard or soft.

Yes.

A


-- 
Andrew Sullivan
ajs@anvilwalrusden.com