Re: Interpreting DNSSEC was Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME

Michael StJohns <mstjohns@comcast.net> Fri, 24 October 2008 21:58 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 38FF63A69C4; Fri, 24 Oct 2008 14:58:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.032
X-Spam-Level:
X-Spam-Status: No, score=-1.032 tagged_above=-999 required=5 tests=[AWL=-0.595, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H5wCZQXT6LyC; Fri, 24 Oct 2008 14:58:52 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id DE2F83A6806; Fri, 24 Oct 2008 14:58:51 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KtUcM-0009ZA-Jo for namedroppers-data@psg.com; Fri, 24 Oct 2008 21:54:50 +0000
Received: from [76.96.30.48] (helo=QMTA05.emeryville.ca.mail.comcast.net) by psg.com with esmtp (Exim 4.69 (FreeBSD)) (envelope-from <mstjohns@comcast.net>) id 1KtUcE-0009Xx-Dq for namedroppers@ops.ietf.org; Fri, 24 Oct 2008 21:54:45 +0000
Received: from OMTA07.emeryville.ca.mail.comcast.net ([76.96.30.59]) by QMTA05.emeryville.ca.mail.comcast.net with comcast id Wjil1a00u1GXsucA5luiod; Fri, 24 Oct 2008 21:54:42 +0000
Received: from MIKES-LAPTOM.comcast.net ([68.48.0.197]) by OMTA07.emeryville.ca.mail.comcast.net with comcast id Wlug1a0094F1VyU8TlugY2; Fri, 24 Oct 2008 21:54:41 +0000
X-Authority-Analysis: v=1.0 c=1 a=gjHhN06smIIA:10 a=liyGigqBEMQA:10 a=48vgC7mUAAAA:8 a=I3GvcKrlCDZcWeMPIyYA:9 a=xefR4WxFvj0GbfJ5Dm4A:7 a=rTK_Y30xzfOF6P7gioB5lHwLUiQA:4 a=4rq7TwIXcRUA:10 a=PKgchsl1YdkA:10 a=iw4bf7yTzGQA:10 a=h9s5Ru71U4oA:10
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 24 Oct 2008 17:54:40 -0400
To: Mark Andrews <Mark_Andrews@isc.org>
From: Michael StJohns <mstjohns@comcast.net>
Subject: Re: Interpreting DNSSEC was Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME
Cc: Ben Laurie <ben@links.org>, namedroppers@ops.ietf.org
In-Reply-To: <200810232224.m9NMOR2A068911@drugs.dv.isc.org>
References: <Your message of "Thu, 23 Oct 2008 12:25:06 EDT." <E1Kt301-000LBZ-QW@psg.com> <200810232224.m9NMOR2A068911@drugs.dv.isc.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
Message-Id: <E1KtUcM-0009ZA-Jo@psg.com>

At 06:24 PM 10/23/2008, Mark Andrews wrote:

>In message <E1Kt301-000LBZ-QW@psg.com>, Michael StJohns writes:
>> At 06:59 AM 10/23/2008, Ben Laurie wrote:
>> >Michael StJohns wrote:
>> >
>> >I don't understand the rationale behind all this complication.
>> >
>> >If I chose to point a DNAME at an unsecured domain, then that was my
>> >choice, and I should live with it. If I don't want the domain to be
>> >unsecured, then I should either not delegate to it, or ensure it is
>> >secured by non-protocol means (e.g. by owning the domain myself, by
>> >contract, by sufficient purchase of beer for the domain owner, etc.)
>> 
>> Hi Ben -
>> 
>> One of the problem we get with DNS is that there are two views of the data (a
>> t least) - the publisher's, and the resolver's views. DNSSEC makes this more 
>> complicated by the presence or absence of certain trust anchors.
>> 
>> As publisher, I have a signed domain, and as publisher, I publish a DNAME als
>> o pointing at a signed domain.  I've done my due diligence as you suggest - I
>> even own the target zone.
>
>        Signing the zones and publishing DS / DLV records is due
>        diligence.  At that point you need to trust that the resolver
>        operator will do due diligence and configure all known trust
>        anchors or use a DLV service.

I haven't a clue how you would expect to administer this.  When was the last time you heard of someone running a zone who changed it out for a DNAME announcing this to the world? 

5011 provides a mechanism to track changes in trust anchors without having to have an out of band path to those changes.  Are you proposing that we create some sort of DNAME announcement protocol?  Or are you suggesting something else?

Let's work this further.  Say .COM is signed, but .EDU isn't.  Say I'm in a secure zone under .com - example.com.  Say the DNAME is from subzone.example.com to  otherzone.edu.  Say otherzone.edu is signed.  Say the resolver has a trust anchor for .COM.     How the heck do I as the owner of subzone.example.com figure out which resolvers to tell about the change??  

 In many (most?) organizations, the guys who run the authoritative servers and update the data in the zones are not the guys who run the local resolvers, so even in the same organization the administrators may not realize they need to do something special.  Certainly the DNAME documentation doesn't describe any operational considerations related to DNSSEC.



>        Yes there will be configurations that will not return SECURE
>        when there is theoretically enough information to return
>        SECURE.
>
>        And the simple answer is to just ensure that there is a
>        chain of trust from the root to both zones.  If you are
>        unhappy about the lack of trust chains lobby your politicians
>        and registry operators to get the root and infrastructure
>        zones signed.

That may be the simple answer, but even simple answers are difficult. See above.

And the fact that all nodes chain to a trust anchor is not sufficient to say that there is an unbroken chain of trust from the first trust anchor to the last answer.


>        This is not something we need to "fix" using technology.
>        What we have today is complicated enough to manage without
>        having to track cross zone pseudo delegations

*sigh*  There's complicated and there's correct.  If its complicated and wrong, its still wrong.


>        Mark
>-- 
>Mark Andrews, ISC
>1 Seymour St., Dundas Valley, NSW 2117, Australia
>PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews@isc.org
>
>--
>to unsubscribe send a message to namedroppers-request@ops.ietf.org with
>the word 'unsubscribe' in a single line as the message text body.
>archive: <http://ops.ietf.org/lists/namedroppers/>



--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>