Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.txt
Roy Arends <Roy.Arends@nominum.com> Fri, 20 July 2001 14:42 UTC
Received: from psg.com (exim@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA22731 for <dnsext-archive@lists.ietf.org>; Fri, 20 Jul 2001 10:42:19 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.31 #1) id 15Nasd-00094F-00 for namedroppers-data@psg.com; Fri, 20 Jul 2001 07:03:47 -0700
Received: from h-135-207-10-122.research.att.com ([135.207.10.122] helo=roam.psg.com) by psg.com with esmtp (Exim 3.31 #1) id 15Nasd-000948-00 for namedroppers@ops.ietf.org; Fri, 20 Jul 2001 07:03:47 -0700
Received: from randy by roam.psg.com with local (Exim 3.30 #1) id 15NasL-0000gK-00 for namedroppers@ops.ietf.org; Fri, 20 Jul 2001 10:03:29 -0400
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: Roy Arends <Roy.Arends@nominum.com>
To: namedroppers@ops.ietf.org
Cc: Brian.Wellington@nominum.com, ogud@ogud.com
Subject: Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.txt
In-Reply-To: <E15NZjR-0006el-00@psg.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E15Nasd-00094F-00@psg.com>
Date: Fri, 20 Jul 2001 07:03:47 -0700
Content-Transfer-Encoding: 7bit
Hello, I would like to see some clarifications on the ***** marked
sections.
Thanks,
Roy
------------------------------------------------------------------------
INTERNET-DRAFT AD bit set on secure answers July 2001
2 - Setting of AD bit
Section 6.1 of RFC2535 says:
"The AD bit MUST NOT be set on a response unless all of the RRs in
the answer and authority sections of the response are either
Authenticated or Insecure."
The changes are to delete the words "either" and "or Insecure" from
the sentence.
The replacement text reads:
"The AD bit MUST NOT be set on a response unless all of the RRsets in
the answer and authority sections of the response are Authenticated."
"The AD bit SHOULD be set if and only if all RRs in the answer
section and any relevant negative response RRs in that authority
section are Authenticated."
AD should be set if and only if all RRs in the answer section, and
any relevant negative response RRs in the authority section are
Authenticated.
The AD bit MUST NOT be set on a response unless all of the RRsets in
the answer and authority sections are Authenticated.
A resolver MUST NOT blindly trust the AD bit unless it communicates
with the server over secure transport mechanism or using message
authentication such as TSIG[RFC2845] or SIG(0)[RFC2931], and the
resolver policy is that it can trust the server.
Any DNS server supporting the OK bit MUST support this definition of
the AD bit.
*****
OK bit as in DNSSEC OK bit, specified in draft-ietf-dnsext-dnssec-okbit-02.txt
? If this is the case, please refer to it as DO (DNSSEC OK) bit.
*****
A DNS server following this modified specification will
only set the AD bit when it has cryptographically verified the data
in the answer. In the case of a primary server for a secure zone,
the data MAY be considered Authenticated, depending on local policy.
*****
I don't know how to read this.
In the case of a primary server for a secure zone, the data MAY be
considered Authenticated, depending on local policy, when what ?
When the AD bit is set ? May it set the AD bit if it is the primary server
for a secure zone, though the zone is actually not authenticated by the
server ? The last sentence of the above section is a bit confusing.
*****
Secondary servers SHOULD NOT consider data Authenticated unless the
zone was transfered securely or the data was verified.
*****
or ? So if the zone was transferred securely, the secondary can consider
the data Authenticated (and thus, set the AD bit) when it actually did not
verify the contents of the zone ? I don't like it.
*****
3 - Interpretation of the AD bit
A response containing data marked Insecure in the answer or authority
section will never have the AD bit set. In this case, the resolver
SHOULD treat the data as Insecure whether or not SIG records are
present.
4 - Security Considerations:
This document redefines a bit in the DNS header. If a resolver
trusts the value of the AD bit, it must be sure that the server is
using the updated definition, which is any server supporting the OK
bit.
*****
What are the implictions for the AD bit when the CD bit is set in a query.
MAY/SHOULD[NOT]/MUST[NOT] a response have the AD bit set when CD (and
optionally DO) bit is set ? The resolver is probably not interested in AD
bit when CD bit is set, but a clarification would be good.
*****
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
- I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.txt Internet-Drafts
- Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.… Brian Wellington
- Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.… Brian Wellington
- Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.… Jakob Schlyter
- Re: I-D ACTION:draft-ietf-dnsext-ad-is-secure-03.… Roy Arends