Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?

Brian Dickson <briand@ca.afilias.info> Fri, 25 July 2008 18:44 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91E0328C17B; Fri, 25 Jul 2008 11:44:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.266
X-Spam-Level:
X-Spam-Status: No, score=-3.266 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_INFO=1.448, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rLPNgA5jTMo9; Fri, 25 Jul 2008 11:44:46 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id A989528C172; Fri, 25 Jul 2008 11:44:46 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KMSAk-000212-Gd for namedroppers-data@psg.com; Fri, 25 Jul 2008 18:37:46 +0000
Received: from [69.46.124.26] (helo=outbound.afilias.info) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <briand@ca.afilias.info>) id 1KMSAg-00020R-PS for namedroppers@ops.ietf.org; Fri, 25 Jul 2008 18:37:44 +0000
Received: from bmp-336-ms505.wa.yyz2.afilias-ops.info ([10.50.129.111] helo=smtp.afilias.info) by outbound.afilias.info with esmtp (Exim 4.69) (envelope-from <briand@ca.afilias.info>) id 1KMREO-0008RW-4B; Fri, 25 Jul 2008 17:37:28 +0000
Message-ID: <488A0F4F.9050704@ca.afilias.info>
Date: Fri, 25 Jul 2008 13:37:19 -0400
From: Brian Dickson <briand@ca.afilias.info>
User-Agent: Thunderbird 2.0.0.14 (Windows/20080421)
MIME-Version: 1.0
To: Joe Abley <jabley@ca.afilias.info>
CC: Jelte Jansen <jelte@NLnetLabs.nl>, DNSEXT WG <namedroppers@ops.ietf.org>
Subject: Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?
References: <48875934.8080101@links.org> <F113C53F-D189-45A0-8DC3-14725395D1BD@virtualized.org> <20080723183227.GA11957@outpost.ds9a.nl> <2FFE6519-7E9C-4DE8-AF69-697A4D875011@nominum.com> <20080723191636.GB32507@outpost.ds9a.nl> <8A91CF57-0CBD-4CF2-BF59-C7D59CB4B7B9@virtualized.org> <20080724060743.GA7420@outpost.ds9a.nl> <48886C4D.4020500@ca.afilias.info> <63C0FFE7-17E6-4ECE-9A12-0537FE2E3F4B@ca.afilias.info> <4888FED2.6060204@NLnetLabs.nl> <E7388E94-D031-4059-91F9-1596A254E21C@ca.afilias.info>
In-Reply-To: <E7388E94-D031-4059-91F9-1596A254E21C@ca.afilias.info>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Authenticated: True
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

Joe Abley wrote:
>
> On 24 Jul 2008, at 18:14, Jelte Jansen wrote:
>
>> how would you verify anything without a trust anchor?
>
> Surely that's a mechanical detail.
>
>> I don't think anyone here implies that DNSSEC works when you do not
>> actually turn it on on the resolver you are using.
>
> The implication I was replying to seemed to state fairly clearly that 
> DNSSEC would make it impossible for middleboxes to meddle with DNS 
> queries and replies and provide answers that were not those that would 
> be received from the authority-only servers concerned.
>
> I think that's wrong. I think that once someone is in the position of 
> being able to meddle with the query/response stream, all bets are off 
> and DNSSEC is no cure.
>
> What is required to circumvent such sabotage is not the ability to 
> verify the integrity of the data in-band, but either the ability to 
> signal that signatures should be present out-of-band, or a means of 
> verifying transport integrity to a resolver which is trusted, or 
> something. DNSSEC on its own isn't enough.

Would this be something analogous to the NSEC3 thing which gives the 
ability to "authenticate" NXDOMAIN responses by giving information about 
adjacent actual domains, modulo hashing to prevent zone enumeration?

I.e. something which would return authoritative "no DS record present" 
in a similar sense, with extra information to allow the receiver to 
trust the response (about no DS being present, that is)?

This would enable in-band resolvers to validate both the data, and the 
presence or absence of zone signatures, on delegation chains, and 
prevent downgrade attacks even by man-in-the-middle interference.

Well, not so much prevent, as much as make it obvious that it is 
happening, and to allow the resolver to reject suspect data when the 
signature has been stripped...

Brian

--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>