Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME

Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> Mon, 13 October 2008 15:13 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 203C53A68AC; Mon, 13 Oct 2008 08:13:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.611
X-Spam-Level:
X-Spam-Status: No, score=-4.611 tagged_above=-999 required=5 tests=[AWL=0.437, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uT3+NsyhHJO5; Mon, 13 Oct 2008 08:13:10 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 21B513A6358; Mon, 13 Oct 2008 08:13:10 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KpP2j-000FPH-7a for namedroppers-data@psg.com; Mon, 13 Oct 2008 15:09:09 +0000
Received: from [192.150.186.11] (helo=fruitcake.ICSI.Berkeley.EDU) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <nweaver@ICSI.Berkeley.EDU>) id 1KpP2V-000FML-Tu for namedroppers@ops.ietf.org; Mon, 13 Oct 2008 15:09:01 +0000
Received: from [IPv6:::1] (fruitcake [192.150.186.11]) by fruitcake.ICSI.Berkeley.EDU (8.12.11.20060614/8.12.11) with ESMTP id m9DF8Yae013312; Mon, 13 Oct 2008 08:08:39 -0700 (PDT)
Cc: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>, Ben Laurie <ben@links.org>, Edward Lewis <Ed.Lewis@neustar.biz>, namedroppers@ops.ietf.org
Message-Id: <966FC948-2490-4CD9-8EC2-03998A3BA2CC@icsi.berkeley.edu>
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
To: Michael StJohns <mstjohns@comcast.net>
In-Reply-To: <E1KpLkt-000HQ3-Is@psg.com>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v929.2)
Subject: Re: [dnsext] flip-flopping secure and unsecure DNAME/CNAME
Date: Mon, 13 Oct 2008 08:08:38 -0700
References: <Your message of "Mon, 22 Sep 2008 15:12:44 -0400." <E1KhqqB-000CE1-QD@psg.com> <200809230016.m8N0GS9E069236@drugs.dv.isc.org> <E1Khwdp-000J3V-QJ@psg.com> <a06240804c4ffc42abc16@[10.122.105.108]> <E1KicTm-000ANO-PO@psg.com> <a06240800c50fd3decd5b@[192.168.1.101]> <48F2DE42.1060209@links.org> <E1KpLkt-000HQ3-Is@psg.com>
X-Mailer: Apple Mail (2.929.2)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

On Oct 13, 2008, at 4:38 AM, Michael StJohns wrote:
>
> I don't think its this simple... really.
>
> Basic DNS has the 3 answers in your first group - although I'd  
> categorize the last one as "I can't make any determination about  
> whether or not the answer exists for any of a number of reasons" -  
> what Marc describes as "indeterminate".
>
> DNSSEC  add 4 (actually maybe even 5) security states that are  
> somewhat orthogonal to the DNS states:

Possibly:

6:  Leap-of-faith.  Its "unknown" but its the same trust anchor that I  
have previously seen for this domain at some long time previously.

7:  Leap-of-faith failure.  Its "unknown" and different from the first  
time I've seen the trust anchor for this domain.

> I'm not trying to be difficult here - but considering each of these  
> intersections and figuring out what to do for each application seems  
> to be a reasonable approach.

The problem with relying on end-application validation of the states  
is that there is really only three possible answers, and none of them  
really rely on the detailed answers that the resolver gives:

1: The network is not trusted by the application, thus you need to  
verify end-to-end the other side.

Once the application makes this decision, DNS for purposes of name- 
 >address mapping is irrelevant for security purposes, although DNSSEC  
does matter if you care about a name->public_key mapping because you  
are using DNSSEC as a CA instead of any other CA or leap-of-faith key- 
exchange mechanisms.


2: The Network is trusted by the application.

Once the application makes this decision, it might as well accept  
everything as long as the resolver implements the defenses against OUT- 
of-path attacks, which is orthoginal to what you do in several of the  
key-failure corner-cases.


3:  The Network is trusted by the application, but the recursive  
resolver belonging to the ?ISP? isn't.  (The Rogue resolution- 
authority problem)

IF the application makes this decision, it should simply use its own  
non-DNSSEC recursive resolver to make queries and bypass the external  
recursive resolver altogether, because such a recursive resolver can  
always just say "uhh, no DNSSEC here".


--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>