Re: [dnsext] stub validation

Phillip Hallam-Baker <hallam@gmail.com> Mon, 25 October 2010 04:19 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 453D03A692C; Sun, 24 Oct 2010 21:19:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.403
X-Spam-Level:
X-Spam-Status: No, score=-2.403 tagged_above=-999 required=5 tests=[AWL=0.195, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5p2qpoCQZROg; Sun, 24 Oct 2010 21:19:11 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 971303A6359; Sun, 24 Oct 2010 21:19:10 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.72 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1PAEUe-000Nsi-FE for namedroppers-data0@psg.com; Mon, 25 Oct 2010 04:17:08 +0000
Received: from mail-gw0-f52.google.com ([74.125.83.52]) by psg.com with esmtp (Exim 4.72 (FreeBSD)) (envelope-from <hallam@gmail.com>) id 1PAEUa-000NsJ-VU for namedroppers@ops.ietf.org; Mon, 25 Oct 2010 04:17:05 +0000
Received: by gwj22 with SMTP id 22so2753138gwj.11 for <namedroppers@ops.ietf.org>; Sun, 24 Oct 2010 21:17:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=pEZrv2R8zg1FrlJNIuVl1TZT+11rGVWlZGSLEhnOh6Q=; b=v3gsrrxubQbZoWFDBLT5NXscj6KRcubmRJe+8PioQnpbJtItf/dq8Q0eX6+cHkjv4M 0G/cjV04r2dcX4s39ZiOVfUCJXYegbhaOXXVtTLMxB1FDy+SqgV7aslO0EG2h2/QkaiX pVIxl8+Kyweu2qwg84MCUZhMjf7OhStM8+Eoc=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=hJG1r00E7q7euQzPv+QpMj/Z+hq+x5g0rX8HRBk1SEKDKlhZn5epS1B93a/sVjP7s+ NIbzu12jtx4Ts7j9m5N2uyRUlRP+ZZiQM2j+3Vx9jzFPgYObXIXF3A+yge91Liwi9E2M hDPlKRMIbFVg80YlUACwtKGVRXljsnVqD3ApM=
MIME-Version: 1.0
Received: by 10.100.17.4 with SMTP id 4mr5035700anq.119.1287980223593; Sun, 24 Oct 2010 21:17:03 -0700 (PDT)
Received: by 10.100.41.14 with HTTP; Sun, 24 Oct 2010 21:17:03 -0700 (PDT)
In-Reply-To: <88612.1287969841@nsa.vix.com>
References: <C8EA875A.83BA%roy@nominet.org.uk> <8D01F5E3-F863-4873-BB0E-654FA89983F7@virtualized.org> <88612.1287969841@nsa.vix.com>
Date: Mon, 25 Oct 2010 00:17:03 -0400
Message-ID: <AANLkTint8qrGfP_x2ZsCApza6YimznDHdvcJtHDP6HzZ@mail.gmail.com>
Subject: Re: [dnsext] stub validation
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Paul Vixie <vixie@isc.org>
Cc: "namedroppers@ops.ietf.org" <namedroppers@ops.ietf.org>
Content-Type: multipart/alternative; boundary="0016e646984ab47ce904936943cd"
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

You probably don't want Starbucks to manage your network security.

But what about Symantec, MacAfee, Comodo, Kaspersky and the other companies
who specialize in providing security services?


The problem with making sense of DNSSEC data is that very little of it makes
much sense on its own. Any given observation can be the result of a
misconfiguration of a DNS server or an actual attack. It is very difficult
to decide how to react at the client end.

If instead we view a DNS recursive resolver as being a form of spam filter,
DNSSEC becomes one way to authenticate one form of input to that filter.
Cached data from previous requests becomes another. Blacklist and whitelist
data are yet more sources.

In this model the DNS resolver is not merely caching the result of a DNS
lookup, it is caching the result of a security risk analysis. And because it
is able to amortize that cost over multiple connections it is able to
perform a rather more thorough analysis than is possible in the pure end to
end discovery model.


In the PKI model we distinguish between path discovery and path validation.
For most purposes it is sufficient for the recursive resolver to perform
both. But for certain applications and certain platforms it makes better
sense to have discovery performed at the resolver and for the endpoint to
re-validate the path that is returned.

I agree on the problem of DNSSEC not being there until it is being used. One
of the problems has been that until the root was signed there were many
questions that many people did not want to hear raised lest they cast doubt
on the viability of DNSSEC as a whole.




On Sun, Oct 24, 2010 at 9:24 PM, Paul Vixie <vixie@isc.org> wrote:

> among many critical defects in DNSSEC as specified, there's no good model
> for stub validation, and as time goes on there are fewer and fewer
> trustworthy rdns servers.  as kaminsky said, "i'm not going to trust
> starbucks rdns to tell me the TLS key hash for my bank's HTTPS server".
>
> so...
>
> > From: David Conrad <drc@virtualized.org>
> > Date: Sun, 24 Oct 2010 16:24:54 -0700
> >
> > The problem with applications doing their own resolving is that the 'real
> > control' implies there is someone at the other end of the application
> > that has the understanding and knowledge to make use of that control.
> > Haven't we seen the implications of this approach with browsers that ask
> > the end user whether or not to accept an SSL cert?
>
> ...at the risk of being that guy who just won't shut up about something,
> let me say that until DNSSEC is commonplace, DNSSEC is a failure.  when
> every apple and microsoft and google and RIM platform including every
> mobile phone can either validate end-to-end based on trust anchors (using
> DNSSEC), or validate hop-by-hop based on transaction signatures (using
> TSIG) from a trusted (and reachable!) rdns, then DNSSEC won't have been
> worth its (considerable) engineering cost.
>
> and it'll have to just work, out of the box, for nontechnical users, with
> no more or at least no different popups than we get from X.509 failures.
>
> but please everybody, don't dilute the DMNF thread with this argument.
>
>


-- 
Website: http://hallambaker.com/