Re: [dnsext] draft-mohan-dns-query-xml-00.txt

Mohan Parthasarathy <suruti94@gmail.com> Tue, 04 October 2011 19:47 UTC

Return-Path: <suruti94@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 177AE21F8D94 for <dnsext@ietfa.amsl.com>; Tue, 4 Oct 2011 12:47:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.566
X-Spam-Level:
X-Spam-Status: No, score=-3.566 tagged_above=-999 required=5 tests=[AWL=0.033, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t7sJqs6TZxt4 for <dnsext@ietfa.amsl.com>; Tue, 4 Oct 2011 12:47:16 -0700 (PDT)
Received: from mail-pz0-f50.google.com (mail-pz0-f50.google.com [209.85.210.50]) by ietfa.amsl.com (Postfix) with ESMTP id C31F121F8D84 for <dnsext@ietf.org>; Tue, 4 Oct 2011 12:46:58 -0700 (PDT)
Received: by pzk37 with SMTP id 37so2249729pzk.9 for <dnsext@ietf.org>; Tue, 04 Oct 2011 12:50:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=M9r30ronDIY2ZqvhEaU8O4dEMz/ImN5HyJI+Q1fH9WI=; b=GKoyCI24QTg8nKxI36KykSB32KDPeuIiRFh4H6W6FiRiOnY5ur6jaO5DgHWAw5NI6d 46eXQhwJi0CuLEQaShJVKVkQX/2jM8ETBGY+bxfCX2H44lyLgkQQxZHN31HTxGxGfy9g I7WI079jRu6Oxs2UMdiWy90XpbdCvBvKkvilU=
MIME-Version: 1.0
Received: by 10.68.23.163 with SMTP id n3mr11805582pbf.89.1317757804591; Tue, 04 Oct 2011 12:50:04 -0700 (PDT)
Received: by 10.68.46.200 with HTTP; Tue, 4 Oct 2011 12:50:04 -0700 (PDT)
In-Reply-To: <20111004052409.D92451492DC2@drugs.dv.isc.org>
References: <CACU5sDnBx5AijEgFXKNPjtcVdtBnBJamsn-f_ye0Jm3TQq0mvw@mail.gmail.com> <201110010458.26859.vixie@isc.org> <8F26AB69-C5BD-47BD-B3F4-6D840E419A23@verisign.com> <201110031713.20103.vixie@isc.org> <54E677EE-0720-4220-9FB8-17EDE978E904@vpnc.org> <CA+9kkMDT+=eBd_xMmZN_ceNdHKDxoCDH8rbyNtGs+OoN8=d25Q@mail.gmail.com> <CACU5sDmurSriLgrD9Pn_xAarfBxrjY0x9sRdJPrdkvJiJ6FJZQ@mail.gmail.com> <20111004001547.7ED7C149063F@drugs.dv.isc.org> <CACU5sD=2HSCi4VKT235APU7aS7bqk_Czzf_CmdN9fXpEF61s0A@mail.gmail.com> <20111004025502.504DD14924EC@drugs.dv.isc.org> <F168B690-446E-4BFD-82F9-5031FF12BE27@gmail.com> <20111004040259.324041492901@drugs.dv.isc.org> <CACU5sDnCB62cbBYW_E26fcmGuKU0+V_-BSeF=pjyvB2dyGw_Qw@mail.gmail.com> <20111004052409.D92451492DC2@drugs.dv.isc.org>
Date: Tue, 04 Oct 2011 12:50:04 -0700
Message-ID: <CACU5sDkQ44DJV7T+zQRSz3fW+22q8_=TfhXcUZhiOeF0F47OKw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Paul Hoffman <paul.hoffman@vpnc.org>, DNSEXT Working Group <dnsext@ietf.org>
Subject: Re: [dnsext] draft-mohan-dns-query-xml-00.txt
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2011 19:47:17 -0000

<snip>
>
>> > asks for www.example.com/DO=1/CD=1.  The validating recurive server
>> > get a answer from P (without DNSSEC records) and passes it on.
>> > Validation fails.  The stub resolver asks for www.example.com/DO=1/CD=
>> =1
>> > again and it gets the same answer (from thout DNSSEC records) the
>> > CD=1 cache and again fails.  Rince, lather, repeat.
>> >
>> > Now if the stub asks for www.example.com/DO=1/CD=0 the validating
>> > resolver will reject any answers from P and only pass on answers
>> > from D (with DNSSEC record) which should then validate.
>>
>> So, this is a validating resolver, sets CD=0 (ignoring what is said in
>> RFC 4035), gets the "proper" responses, ignores the AD bit,
>> validates the responses. Is this discussed in any document ?
>
> No, its not ignoring what is said in RFC 4035, CD=1 is a SHOULD
> (4.9.2).  In this case I'm recommending that defaulting to CD=0 as
> the default is what should be done and falling back to CD=1 in
> SERVFAIL is what should be done.  AD should be ignored by a validating
> stub resolver.  It's for stubs that trust the resolver, not stubs
> that validate.
>
> As for whether this is documented anywhere, apart from the archive
> of this list and dns/dnssec lists I doubt it.  I've definitely
> mentioned this before.  Mike St John's discussion of CD/DO setting
> is similar in nature if I'm remembering it correctly.
>
> Remember when RFC 4035 was written there was very little experience
> with validating stub resolvers.  There still isn't much but defaulting
> to CD=1 is clearly wrong.  Making stub validating resolvers work
> well may still require more work or what we have may be "good
> enough".
>
Why can't the recursive server fetch the "proper" response when it
sees DOK=1/CD=1 ? It knows that a validating resolver is asking for
DNSSEC records to validate itself. If it does not get from the first
server, it can ask the next server and get it. Why should the behavior
be different for CD=0/1 ? As long as DOK=1, it should do it.

>> > Now if the recursive server doesn't validate or it validates as
>> > insecure you are left with first senario hoping that you are getting
>> > answers from the DNSSEC aware authoritative server.
>> >
>> > What would help would be a EDNS option to send to the recursive
>> > server the closest trust anchor(s) and current time so that it can
>> > validate responses in a consistant manner to the stub resolver.
>>
>> This seems complex to me. Perhaps, the operational document should say
>> that a dnssec signed zone should be served only by dnssec aware
>> authoritative servers. If there is still an operational error, the
>> validating resolver should just give up. For example, if i set
>> DO=1/CD=1 and there are no RRSIGS, then abort and declare insecure.
>
> Except you can't do that most of the time because there could be a
> zone cut that makes that name insecure.
>
You should get a NSEC/NSEC3 in that case, right ?

-mohan

> Mark
>
>> -mohan
>>
>> > Mark
>> >
>> >> If there was spoofing or other problems, it can find out itself.
>> >> It is much easier to set CD=1 always.
>> >>
>> >> -mohan
>> > --
>> > Mark Andrews, ISC
>> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
>> > PHONE: +61 2 9871 4742   =A0 =A0 =A0 =A0 =A0 =A0 =A0 INTERNET: marka@is=
>> c.org
>> >
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org
>