Re: [DNSOP] Stupid thought: why not an additional DNSKEY record flag: NSEC* only...

Mukund Sivaraman <muks@isc.org> Wed, 04 January 2017 18:45 UTC

Return-Path: <muks@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57260129A19 for <dnsop@ietfa.amsl.com>; Wed, 4 Jan 2017 10:45:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Level:
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aM5SFjcpmbMU for <dnsop@ietfa.amsl.com>; Wed, 4 Jan 2017 10:45:57 -0800 (PST)
Received: from mail.banu.com (mail.banu.com [IPv6:2a01:4f8:140:644b::225]) by ietfa.amsl.com (Postfix) with ESMTP id 8B7EB1296A5 for <dnsop@ietf.org>; Wed, 4 Jan 2017 10:45:57 -0800 (PST)
Received: from jurassic (unknown [115.118.146.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.banu.com (Postfix) with ESMTPSA id 730212FA00D5; Wed, 4 Jan 2017 18:45:55 +0000 (GMT)
Date: Thu, 05 Jan 2017 00:15:52 +0530
From: Mukund Sivaraman <muks@isc.org>
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
Message-ID: <20170104184552.GA31138@jurassic>
References: <FEDF56ED-D27D-44A7-8989-C8920BC6C1CE@icsi.berkeley.edu> <20170104182415.GA29444@jurassic> <ED164FC2-21B2-411B-B828-9D9617D82F30@icsi.berkeley.edu>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="45Z9DzgjV8m4Oswq"
Content-Disposition: inline
In-Reply-To: <ED164FC2-21B2-411B-B828-9D9617D82F30@icsi.berkeley.edu>
User-Agent: Mutt/1.7.1 (2016-10-04)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/tDf4lyZMoCiKSZ1bSNTuTHHodB8>
Cc: dnsop <dnsop@ietf.org>
Subject: Re: [DNSOP] Stupid thought: why not an additional DNSKEY record flag: NSEC* only...
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2017 18:45:58 -0000

On Wed, Jan 04, 2017 at 10:28:11AM -0800, Nicholas Weaver wrote:
> An attacker in that position can just put in garbage, and you get
> SERVFAIL instead of NXDOMAIN, regardless of whether the attacker has
> compromised the key or not.

A SERVFAIL is an erroneous condtion. An NXDOMAIN is not - it is business
as usual. SERVFAILs are sometimes cached very temporarily to reduce load
on upstream servers, but they are not answers. NXDOMAINs are cached as
*answers* from the remote auth server.

On-path disruption is impossible to defeat. An on-path attacker who
wants to poison answers without raising suspicions (logged validation
failures) will want validation to succeed.

		Mukund