Re: restart: Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.txt
Brian Wellington <Brian.Wellington@nominum.com> Mon, 30 July 2001 07:41 UTC
Received: from psg.com (exim@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA05359 for <dnsext-archive@lists.ietf.org>; Mon, 30 Jul 2001 03:41:41 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.31 #1) id 15R5HF-000FCZ-00 for namedroppers-data@psg.com; Sun, 29 Jul 2001 22:07:37 -0700
Received: from rip.psg.com ([147.28.0.39] ident=exim) by psg.com with esmtp (Exim 3.31 #1) id 15R5HE-000FCQ-00 for namedroppers@ops.ietf.org; Sun, 29 Jul 2001 22:07:36 -0700
Received: from randy by rip.psg.com with local (Exim 3.31 #1) id 15R5HE-000AtC-00 for namedroppers@ops.ietf.org; Sun, 29 Jul 2001 22:07:36 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: Brian Wellington <Brian.Wellington@nominum.com>
To: Jakob Schlyter <jakob@crt.se>
Cc: Edward Lewis <lewis@tislabs.com>, ogud@ogud.com, DNSEXT <namedroppers@ops.ietf.org>
Subject: Re: restart: Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.txt
In-Reply-To: <Pine.BSO.4.33.0107290057230.27119-100000@fonbella.crt.se>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E15R5HF-000FCZ-00@psg.com>
Date: Sun, 29 Jul 2001 22:07:37 -0700
Content-Transfer-Encoding: 7bit
On Sun, 29 Jul 2001, Jakob Schlyter wrote: > On Sat, 28 Jul 2001, Edward Lewis wrote: > > > IMHO an AA bit outranks an AD bit. Data with AA=1,AD=0 is reputedly > > coming from *the* source (TSIG, et.al.) Data with AA=0,AD=1 is > > reputedly data that some intermediary has verified as coming from the > > source. I would assign higher credibility to AA=1,AD=0 than > > AA=0,AD=1. > > an application could put trust in a dns reply by several reasons: > > reply source (i.e. who did I query) > reply transport (i.e. tsig, tkey or nothing) > status of some bits in the header (AA, AD, ...) > > I have to configure who and how I send my query, so this is a very basic > administrative problem (except for the policy part, but let's leave that > out for the moment). the AD-bit however is harder and needs to be well > defined as applications will interpret it without knowing the verification > policy. I agree so far. > the reason I like the nameserver to use the AD-bit, and only the AD-bit, > to signal that the data is authenticated cryptographically is simplicity. > I do not care about whether my nameserver is authorative or not - I only > care if it has validated the data or not. it could be authorative, yet the > zonefile could be invalid (e.g. the nameserver is secondary and doesn't > fully trust source). This is the problem. The stub resolver should not care whether the server has validated the data or not. If the resolver trusts the server, the server trusts the data, and the communication is secure, the resolver should trust the data. Let me give an example. I have a server that's authoritative for foo.com, which is signed. It also does recursion for my network. Assume that my resolver communicate securely with this server, and I trust it. If I query for bar.com, which is also signed, the server recursively fetches data data, does the validation, and returns a response with AD set. The resolver sees the AD bit, so it trusts the data. No one's arguing about this. If I query for foo.com, I would like to be able to trust the answer without having cryptographic validation done. I trust the server, and the communication, so I can trust the data. I'm arguing that it's ok to allow the server to set the AD bit on locally configured secure data. Ed said that the server shouldn't set the AD bit, but the resolver could trust data with the AA bit. You're saying that the resolver shouldn't trust this data at all unless cryptographic verification is done. This only comes up when querying a server for authoritative data. The only time stub resolvers query authoritative servers is for locally managed data. The resolver should be allowed to trust locally managed data. This is not about protecting the resolver from arbitrary broken servers; it's about allowing resolvers to trust local servers without forcing them to explicitly verify data. > let us, for the people using this - not the implementators, keep this > simple. finding something to trust and communicate securely with that > entity is hard enough. The above is from the point of view of a user. I'd like to be able to sign my zone at home and use DNSSEC capable applications (like a modified SSH), without forcing my server to needlessly verify data that it either loads from disk or obtains through a secure zone transfer. Brian to unsubscribe send a message to namedroppers-request@ops.ietf.org with the word 'unsubscribe' in a single line as the message text body.
- Re: restart: Re: I-D ACTION:draft-ietf-dnsext-ad-… Brian Wellington
- Re: restart: Re: I-D ACTION:draft-ietf-dnsext-ad-… Jakob Schlyter
- Re: restart: Re: I-D ACTION:draft-ietf-dnsext-ad-… Miek Gieben