[dnsext] flip-flopping secure and unsecure DNAME/CNAME

Edward Lewis <Ed.Lewis@neustar.biz> Wed, 24 September 2008 10:28 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E689A3A6D5A; Wed, 24 Sep 2008 03:28:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.495
X-Spam-Level:
X-Spam-Status: No, score=-0.495 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HH1Q7pTAlLCY; Wed, 24 Sep 2008 03:28:39 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 6127928C0F7; Wed, 24 Sep 2008 03:28:39 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KiRVL-000CwK-Rs for namedroppers-data@psg.com; Wed, 24 Sep 2008 10:21:55 +0000
Received: from [66.92.146.20] (helo=stora.ogud.com) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <Ed.Lewis@neustar.biz>) id 1KiRVE-000CvX-4w for namedroppers@ops.ietf.org; Wed, 24 Sep 2008 10:21:54 +0000
Received: from [10.122.105.108] (gatt.md.ogud.com [10.20.30.6]) by stora.ogud.com (8.14.2/8.14.2) with ESMTP id m8OALiGH080253; Wed, 24 Sep 2008 06:21:45 -0400 (EDT) (envelope-from Ed.Lewis@neustar.biz)
Mime-Version: 1.0
Message-Id: <a06240804c4ffc42abc16@[10.122.105.108]>
In-Reply-To: <E1Khwdp-000J3V-QJ@psg.com>
References: <Your message of "Mon, 22 Sep 2008 15:12:44 -0400." <E1KhqqB-000CE1-QD@psg.com> <200809230016.m8N0GS9E069236@drugs.dv.isc.org> <E1Khwdp-000J3V-QJ@psg.com>
Date: Wed, 24 Sep 2008 12:21:27 +0200
To: namedroppers@ops.ietf.org
From: Edward Lewis <Ed.Lewis@neustar.biz>
Subject: [dnsext] flip-flopping secure and unsecure DNAME/CNAME
Cc: ed.lewis@neustar.biz
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Scanned-By: MIMEDefang 2.64 on 10.20.30.4
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

At 21:24 -0400 9/22/08, Michael StJohns wrote:

>Original query is:  "www.somewhere.example.com A" and we have a 
>trust anchor for somewhere.example.com
>At somewhere.example.com is a DNAME into unsecure.com which is not 
>signed or for which we have no trust anchor.
>At www.unsecure.com is a CNAME pointing at www.otherexample.com
>We have a trust anchor for otherexample.com and the zone contents will verify.
>At www.otherexample.com is a A record - the answer to our original query.
>
>It turns out the original data at www.unsecure.com was an A 
>record... a hacker got in and changed it.
>
>Does the result parse out as verified?  Should it?

This isn't a problem for the DNS, it's a problem for the application.

DNSSEC will allow the querier to know that it got some records and 
they are verified, it will also know that it got other records for 
which there is no ancillary protection information.  DNSSEC will not 
permit "protected" records to be spoofed (within the bounds of what 
it can do).

So far as whether the "final answer" is right, that's an issue for 
applications.  The application would have to make the judgement 
whether it would accept the "chain" of DNAMEs and CNAMEs - or judge 
what the semantics of the proofs are.

Perhaps a discussion of this belongs in the Security Considerations 
of DNSSEC bis.
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                +1-571-434-5468
NeuStar

Never confuse activity with progress.  Activity pays more.

--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>