Re: AS IF: draft-ietf-dnsext-ad-is-secure-03.txt

Brian Wellington <Brian.Wellington@nominum.com> Mon, 30 July 2001 07:59 UTC

Received: from psg.com (exim@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA06235 for <dnsext-archive@lists.ietf.org>; Mon, 30 Jul 2001 03:59:42 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.31 #1) id 15R5Hq-000FDL-00 for namedroppers-data@psg.com; Sun, 29 Jul 2001 22:08:14 -0700
Received: from rip.psg.com ([147.28.0.39] ident=exim) by psg.com with esmtp (Exim 3.31 #1) id 15R5Hp-000FDF-00 for namedroppers@ops.ietf.org; Sun, 29 Jul 2001 22:08:13 -0700
Received: from randy by rip.psg.com with local (Exim 3.31 #1) id 15R5Hp-000Av6-00 for namedroppers@ops.ietf.org; Sun, 29 Jul 2001 22:08:13 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: Brian Wellington <Brian.Wellington@nominum.com>
To: Greg Hudson <ghudson@MIT.EDU>
Cc: John Gilmore <gnu@toad.com>, DNSEXT <namedroppers@ops.ietf.org>
Subject: Re: AS IF: draft-ietf-dnsext-ad-is-secure-03.txt
In-Reply-To: <E15QaCz-000JXZ-00@psg.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E15R5Hq-000FDL-00@psg.com>
Date: Sun, 29 Jul 2001 22:08:14 -0700
Content-Transfer-Encoding: 7bit

On Sat, 28 Jul 2001, Greg Hudson wrote:

> I have yet to understand why anyone wants to set the AD bit on
> unchecked data.  Sure, an authoritative server shouldn't have to do
> cryptography, but it also shouldn't ever need to set the AD bit unless
> it's also acting as a recursive resolver for clients.  In which case
> it had better be prepared to do cryptography if it wants to set AD
> bits.

Scenario 1: A server reads secure data from a zone file, trusting the
disk.  It then can set the AD bit on responses from that file.

Scenario 2: A server reads secure data from a zone file, and the key from
a configuration file.  Before setting the AD bit, it verifies the
necessary signatures.

Which sounds more secure?  2, obviously.  Until you notice that the key is
read from disk also.  If someone can corrupt your zone files so that you
give out bad data, they can surely corrupt the key so that the bad data
properly verifies.  Or, if they don't want to do that, they can just
hijack your server and insert bad keys into the running process.

The point is that if you trust a server enough to believe that it has
verified data, you should trust it enough to read signed data from disk.
Conversely, if you don't trust it enough to read signed data from disk,
you shouldn't trust it enough that you believe it when it claims to have
verified data.

That's why I believe that setting the AD bit on locally configured data is
acceptable.  It's no more or less secure than having the server verify it.

Brian



to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.