Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?

Joe Abley <jabley@ca.afilias.info> Thu, 24 July 2008 14:57 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A167A3A685A; Thu, 24 Jul 2008 07:57:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.555
X-Spam-Level:
X-Spam-Status: No, score=-1.555 tagged_above=-999 required=5 tests=[AWL=-0.507, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qZORCTzB6G+T; Thu, 24 Jul 2008 07:57:23 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 9CA833A6A38; Thu, 24 Jul 2008 07:57:23 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KM2BF-000Bcx-6M for namedroppers-data@psg.com; Thu, 24 Jul 2008 14:52:33 +0000
Received: from [199.212.90.4] (helo=monster.hopcount.ca) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <jabley@ca.afilias.info>) id 1KM2B6-000BcA-Rx for namedroppers@ops.ietf.org; Thu, 24 Jul 2008 14:52:27 +0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=monster; d=ca.afilias.info; h=Received:Cc:Message-Id:From:To:In-Reply-To:Content-Type:Content-Transfer-Encoding:Mime-Version:Subject:Date:References:X-Mailer; b=OxrD+F/M5B9DkBB5E7smGZz2XsEoEkH3t4GgoJsG4Rnyoqkfz5K9eC7xNkgKl9Fl0TNCb3Oaqsjj6d5M7clCgkxuizcikZCd6XYJErnPE0SAKqtV3H4ClL1a2lTVZTqh;
Received: from [199.212.90.13] (helo=calamari.hopcount.ca) by monster.hopcount.ca with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.69 (FreeBSD)) (envelope-from <jabley@ca.afilias.info>) id 1KM29n-000ISF-M9; Thu, 24 Jul 2008 14:51:04 +0000
Cc: bert hubert <bert.hubert@netherlabs.nl>, David Conrad <drc@virtualized.org>, DNSEXT WG <namedroppers@ops.ietf.org>
Message-Id: <63C0FFE7-17E6-4ECE-9A12-0537FE2E3F4B@ca.afilias.info>
From: Joe Abley <jabley@ca.afilias.info>
To: Brian Dickson <briand@ca.afilias.info>
In-Reply-To: <48886C4D.4020500@ca.afilias.info>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v928.1)
Subject: Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?
Date: Thu, 24 Jul 2008 10:51:03 -0400
References: <48875934.8080101@links.org> <F113C53F-D189-45A0-8DC3-14725395D1BD@virtualized.org> <20080723183227.GA11957@outpost.ds9a.nl> <2FFE6519-7E9C-4DE8-AF69-697A4D875011@nominum.com> <20080723191636.GB32507@outpost.ds9a.nl> <8A91CF57-0CBD-4CF2-BF59-C7D59CB4B7B9@virtualized.org> <20080724060743.GA7420@outpost.ds9a.nl> <48886C4D.4020500@ca.afilias.info>
X-Mailer: Apple Mail (2.928.1)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

On 24 Jul 2008, at 07:49, Brian Dickson wrote:

> His resolver does its thing, but before it gets very far, the DNS  
> queries it makes get intercepted, and bad
> answers from the hacked box get sent back, instead sending him to https://phishing-site.tld 
> .
>
> DNSSEC makes this impossible.

Surely, DNSSEC making that impossible relies on the validator on Joe's  
laptop insisting that the TLD and MYBANK.TLD zones are signed, and  
that a trust anchor exists to verify the signatures.

If the validator on Joe's laptop has an empty cache, and no  
configuration which will make it insist particularly that those zones  
are signed, surely the middleware which is replying to queries could  
just return as if the root, TLD and MYBANK.TLD zones are unsigned. At  
that point there will be no signatures to verify, and it will be as if  
DNSSEC was never deployed.

[If the validator has cached security information from the results of  
previous queries, then it might be able to know that a lack of  
signatures received whilst in the hotel is a problem. But things  
expire from caches, laptops run out of power and get restarted,  
operating system patches require reboots, etc, so it doesn't seem  
reasonable to assume this will always be the case. "impossible" above  
is fairly absolute.]

I keep seeing people insist that query-intercepting middleware will be  
defeated with DNSSEC, but I can't see why. Perhaps I'm missing  
something.


Joe


--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>