Re: CNAME/DNAME - Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME

Michael StJohns <mstjohns@comcast.net> Mon, 13 October 2008 17:11 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B0C813A67B0; Mon, 13 Oct 2008 10:11:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.005
X-Spam-Level:
X-Spam-Status: No, score=-1.005 tagged_above=-999 required=5 tests=[AWL=-0.569, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611, HTML_MESSAGE=0.001, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gw1b+se7yMpL; Mon, 13 Oct 2008 10:11:09 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 82E933A68DC; Mon, 13 Oct 2008 10:11:09 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KpQtC-0002tk-60 for namedroppers-data@psg.com; Mon, 13 Oct 2008 17:07:26 +0000
Received: from [76.96.62.56] (helo=QMTA06.westchester.pa.mail.comcast.net) by psg.com with esmtp (Exim 4.69 (FreeBSD)) (envelope-from <mstjohns@comcast.net>) id 1KpQsz-0002qR-G2 for namedroppers@ops.ietf.org; Mon, 13 Oct 2008 17:07:23 +0000
Received: from OMTA11.westchester.pa.mail.comcast.net ([76.96.62.36]) by QMTA06.westchester.pa.mail.comcast.net with comcast id SF421a00d0mv7h056H72U2; Mon, 13 Oct 2008 17:07:02 +0000
Received: from MIKES-LAPTOM.comcast.net ([69.140.151.110]) by OMTA11.westchester.pa.mail.comcast.net with comcast id SH6d1a0012P9w053XH6dGH; Mon, 13 Oct 2008 17:06:38 +0000
X-Authority-Analysis: v=1.0 c=1 a=-SHtGfL_fv4A:10 a=4POudkrwpe0A:10 a=h5gJkh8D07ueZ6VX6CAA:9 a=b7_s-70N1BbycZwfW286_QS96zQA:4 a=h9s5Ru71U4oA:10 a=fsDBreADarvPLUIPsM0A:9 a=0iJQjT4BF6hvOhkV8gJYpd5h37gA:4 a=37WNUvjkh6kA:10
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Mon, 13 Oct 2008 13:07:11 -0400
To: Edward Lewis <Ed.Lewis@neustar.biz>
From: Michael StJohns <mstjohns@comcast.net>
Subject: Re: CNAME/DNAME - Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME
Cc: Edward Lewis <Ed.Lewis@neustar.biz>, Ben Laurie <ben@links.org>, namedroppers@ops.ietf.org
In-Reply-To: <a06240804c5192a5f04e8@[10.31.201.38]>
References: <Your message of "Mon, 22 Sep 2008 15:12:44 -0400." <E1KhqqB-000CE1-QD@psg.com> <200809230016.m8N0GS9E069236@drugs.dv.isc.org> <E1Khwdp-000J3V-QJ@psg.com> <a06240804c4ffc42abc16@[10.122.105.108]> <E1KicTm-000ANO-PO@psg.com> <a06240800c50fd3decd5b@[192.168.1.101]> <48F2DE42.1060209@links.org> <STNTEXCH128BYXifWoq0000431f@stntexch12.cis.neustar.com> <a06240801c518fed0b4c7@[192.168.1.101]> <STNTEXCH12dnsODFRq000004489@stntexch12.cis.neustar.com> <a06240804c5192a5f04e8@[10.31.201.38]>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=====================_1045147750==.ALT"
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
Message-Id: <E1KpQtC-0002tk-60@psg.com>

At 12:44 PM 10/13/2008, Edward Lewis wrote:
>At 12:30 -0400 10/13/08, Michael StJohns wrote:
>>Hi Ed -
>>
>>I agree that you can determine the security state of X and the security
>>state of Y by examining trust anchors, dlv etc.  But that's not the question.
>>The question is "What is the security state of the compound answer XY?"
>
>The security state - in the eyes of DNS that is easy.  If the X passes the DNSSEC test, Y passes the test as being unsigned, and Z passes the DNSSEC test, the answer is "AD."  IOW, there's nothing suspicious about the result as far as the DNS is concerned.

You sure about that answer?  Pretend all you're doing is looking up Y.  Since Y is UNSECURE,  shouldn't you get an answer with the AD bit cleared? So shouldn't the compound answer also clear the AD bit?

Let's go a bit further.  Let's say that the validating intermediate resolver queried without the CD bit set gets SECURE, UNSECURE and BOGUS for the three legs of the triad.  Should it return the SECURE and UNSECURE parts and also do a SERVFAIL?  RFC 4035 - 5.5 is unclear on this:


>5.5.  Resolver Behavior When Signatures Do Not Validate
>
>   If for whatever reason none of the RRSIGs can be validated, the
>   response SHOULD be considered BAD.  If the validation was being done
>   to service a recursive query, the name server MUST return RCODE 2 to
>   the originating client. 

*SOME* of the RRSIGs can be validated... *sigh*  Does the response still return an RCODE 2?




>It's fair to ask though "what's the value" of piecemeal checking.  My answer is that "it's out of scope" for DNS.