Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

Olafur Gudmundsson <ogud@ogud.com> Sat, 23 January 2010 17:25 UTC

Return-Path: <ogud@ogud.com>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D0493A6961 for <dnsop@core3.amsl.com>; Sat, 23 Jan 2010 09:25:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.381
X-Spam-Level:
X-Spam-Status: No, score=-2.381 tagged_above=-999 required=5 tests=[AWL=-0.382, BAYES_00=-2.599, J_CHICKENPOX_47=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JR1O6BLHeJeO for <dnsop@core3.amsl.com>; Sat, 23 Jan 2010 09:25:23 -0800 (PST)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by core3.amsl.com (Postfix) with ESMTP id A429D3A6956 for <dnsop@ietf.org>; Sat, 23 Jan 2010 09:25:23 -0800 (PST)
Received: from valholl.ogud.com (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.3/8.14.3) with ESMTP id o0NHP5sV053866; Sat, 23 Jan 2010 12:25:05 -0500 (EST) (envelope-from ogud@ogud.com)
Message-Id: <201001231725.o0NHP5sV053866@stora.ogud.com>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Sat, 23 Jan 2010 12:25:00 -0500
To: Alex Bligh <alex@alex.org.uk>, Edward Lewis <Ed.Lewis@neustar.biz>
From: Olafur Gudmundsson <ogud@ogud.com>
In-Reply-To: <13EEA44D7ADF3D8C09360D49@nimrod.local>
References: <200904282021.n3SKL3sg051528@givry.fdupont.fr> <59A58419-FDBD-4810-B2FA-0D293FFA00A5@NLnetLabs.nl> <alpine.LFD.1.10.1001211245180.12114@newtla.xelerance.com> <1AEAE091-2EB3-41DC-A51B-8DD49C10FAD5@NLnetLabs.nl> <24C8A8E2A81760E31D4CDE4A@Ximines.local> <alpine.LFD.1.10.1001221446090.24208@newtla.xelerance.com> <D6C3D7B5FE44C580F05A1673@nimrod.local> <a06240800c77fbd63ac6b@[10.31.200.180]> <13EEA44D7ADF3D8C09360D49@nimrod.local>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Scanned-By: MIMEDefang 2.67 on 10.20.30.4
Cc: dnsop WG <dnsop@ietf.org>, Alex Bligh <alex@alex.org.uk>
Subject: Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Jan 2010 17:25:24 -0000

At 15:54 22/01/2010, Alex Bligh wrote:


>--On 22 January 2010 15:45:54 -0500 Edward Lewis <Ed.Lewis@neustar.biz> wrote:
>
>>>contents) in example.org. So, whilst opt-out should be avoided
>>>across intervals containing secure delegations, I see no reason
>>>to avoid it across intervals that don't contain secure delegations.
>>
>>Opt-out is restricted to "intervals" that contain only unsecured
>>delegations.
>
>Doh! Yes indeed. In which case I stand by my original argument: I can't
>see how opt-out really increase spoofability. It can't affect
>a secure delegation, and the contents of an insecure delegation
>or denial thereof (if not the delegation itself) are spoofable
>with or without opt-out. Paul's example of a secure delegation
>with opt-out across it can't exist.

Lets say example is signed, bank.example is signed using NSEC3 with opt-out
in one span to hide one division.
Lets say secure.bank.example by co-incidence falls into the opt-ed-out gap.
Now a phisher can attempt to insert an insecure delegation called 
secure.bank.example
into caches and send mails telling people to visit this site to claim 
their price

Opt-out was designed for large delegation-only/mostly zones, in almost all
other cases it should not be used.

The use of NSEC vs NSEC3 in zone is a different discussion.

A zone that contains guess-able names gains almost nothing from using NSEC3.
A zone operator may still feel better using NSEC3 :-)
If you really want to hide the content of your zone only epsilon 
signing will work
RFC4470+RFC4471.

         Olafur