Re: [dnsext] Issues in WGLC of dnssec-bis-updates

Mohan Parthasarathy <suruti94@gmail.com> Thu, 09 February 2012 02:41 UTC

Return-Path: <dnsext-bounces@ietf.org>
X-Original-To: namedroppers-archive-gleetwall6@lists.ietf.org
Delivered-To: ietfarch-namedroppers-archive-gleetwall6@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F170321F856D; Wed, 8 Feb 2012 18:41:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1328755272; bh=/1uah4XUpUTMDn8Rrir1++wmzCfabdDUOqT2jFOudoI=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:From:To:Cc: Subject:List-Id:List-Unsubscribe:List-Archive:List-Post:List-Help: List-Subscribe:Content-Type:Content-Transfer-Encoding:Sender; b=OCgmrNFLvxTJ1QzeP35jrd2WMWZbZZ+7ZWF3C/OzxPy50zuRLrXQLt4AjIoJXlNpn uU48BBjGH9lL+/JiegxQhfoXpGqWE7dVkjzJuUZzJ8SsvMRt5HDj4FvAubrGKDP4uJ sHVJuMHSJDw4pCrENpVQTQXqJ6d1UHBgLTaBQFRM=
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A248321F856D for <dnsext@ietfa.amsl.com>; Wed, 8 Feb 2012 18:41:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.19
X-Spam-Level:
X-Spam-Status: No, score=-3.19 tagged_above=-999 required=5 tests=[AWL=-0.191, BAYES_00=-2.599, J_CHICKENPOX_34=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0lT6tIbqVsuL for <dnsext@ietfa.amsl.com>; Wed, 8 Feb 2012 18:41:10 -0800 (PST)
Received: from mail-qy0-f172.google.com (mail-qy0-f172.google.com [209.85.216.172]) by ietfa.amsl.com (Postfix) with ESMTP id 8C40721F8569 for <dnsext@ietf.org>; Wed, 8 Feb 2012 18:41:07 -0800 (PST)
Received: by qcsg13 with SMTP id g13so820060qcs.31 for <dnsext@ietf.org>; Wed, 08 Feb 2012 18:41:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=kADbrV69uj0WFxZ156sMPHcdMqQeMFrr6rAaFysPV2E=; b=PdKkqdiMu6+4v6AEPTd1GWa+ZEpASFv8T0IX8EgiHLgtFUmJeypVdOXA73t4Fzyjeb ROfq0PKYaVvqCqxdgxIU27BPnXl7UErSmZs4K2A8eRBFu7rNnhRKl2gZk/WNZy77PMyl 9dE65eN5AaCRjs0rHke/aJytynDb4O/RZCT9o=
MIME-Version: 1.0
Received: by 10.224.96.9 with SMTP id f9mr293887qan.36.1328755267070; Wed, 08 Feb 2012 18:41:07 -0800 (PST)
Received: by 10.229.136.130 with HTTP; Wed, 8 Feb 2012 18:41:06 -0800 (PST)
In-Reply-To: <20120209022231.975221D072A1@drugs.dv.isc.org>
References: <20120207151820.GE9478@crankycanuck.ca> <4F31449C.9040604@nlnetlabs.nl> <a06240801cb570a945202@192.168.128.143> <CACU5sD=bUC9bC_OW4SeH2h6DPM+d3+-JkZyz=6u=dpmj+7rVjw@mail.gmail.com> <4F3232B6.3060505@nlnetlabs.nl> <CACU5sDk8zGPF-w5BpBG21tNW1s0mpCEUP=YBaoZXhmbHT-+u-A@mail.gmail.com> <20120208230511.2440F1D0601B@drugs.dv.isc.org> <CACU5sDnrz8ivLR6nMGvX0+gFvmU2k6V7HLrb8MYLtvAs2DODgQ@mail.gmail.com> <a06240800cb58cc29d79a@172.17.20.117> <20120209022231.975221D072A1@drugs.dv.isc.org>
Date: Wed, 08 Feb 2012 18:41:06 -0800
Message-ID: <CACU5sD=tObqFJ7Xoi1kS0DDc0j12bQzjxxoiBbZG_uY-RggbRw@mail.gmail.com>
From: Mohan Parthasarathy <suruti94@gmail.com>
To: Mark Andrews <marka@isc.org>
Cc: Edward Lewis <Ed.Lewis@neustar.biz>, dnsext@ietf.org
Subject: Re: [dnsext] Issues in WGLC of dnssec-bis-updates
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Sender: dnsext-bounces@ietf.org
Errors-To: dnsext-bounces@ietf.org

On Wed, Feb 8, 2012 at 6:22 PM, Mark Andrews <marka@isc.org> wrote:
>
> In message <a06240800cb58cc29d79a@[172.17.20.117]>, Edward Lewis writes:
>> At 15:27 -0800 2/8/12, Mohan Parthasarathy wrote:
>> >On Wed, Feb 8, 2012 at 3:05 PM, Mark Andrews <marka@isc.org> wrote:
>>
>> >>
>> >>  Step 1 of validation.
>> >>  Is there a potential covering trust anchor?
>> >>         Yes.  Goto step 2.
>> >>         No.  Mark as insecure.
>> >>
>> >>  Step 2 ....
>> >>
>> >From RFC 4033:
>> >
>> >Insecure: The validating resolver has a trust anchor, a chain of
>> >       trust, and, at some delegation point, signed proof of the
>> >       non-existence of a DS record.  This indicates that subsequent
>> >       branches in the tree are provably insecure.  A validating resolver
>> >       may have a local policy to mark parts of the domain space as
>> >       insecure.
>> >
>> >So, I don't understand what you mean.
>>
>> What Mark wrote is consistent with that paragraph.  Not complete, but
>> consistent.
>>
>> Look at a path through the namespace:
>>
>>      o      = root
>>      |
>>      o      = tld
>>      |
>>      o      = example
>>      |
>>      o      = www
>>
>> Let's say that "tld." is a cut point.
>>
>> Case 1 - if there are no trust anchors at all, then everything is "insecure."
>>
>> Case 2 - if there is a root trust anchor and there is provably no DS
>> record for tld., then all names in the tld. domain (not just the
>> zone) are provably insecure.
>>
>> Case 3 - (as in case 2 up to the BUT) if there is a root trust anchor
>> and there is provably no DS record for tld., BUT there is a trust
>> anchor for example.tld. and www is not a cut point.  In this case you
>> can validate sets owned by www.example.tld.  "Insecure" is never an
>> outcome.  The possible outcomes are "bogus", "valid" (or whatever
>> "good" is called), and a service failure if some record cannot be
>> retrieved.
>>
>> Case 4 - trust anchors at root and tld.root and no cutpoints without
>> a DS, then you'll never see insecure.
>>
>> (I hope I have this right.)
>>
>> And only "Bogus" is bad, no data is returned for Bogus and Service
>> Failure.  Data is returned for Insecure and Valid.
>>
>> --
>> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
>> Edward Lewis
>> NeuStar                    You can leave a voice message at +1-571-434-5468
>>
>> 2012...time to reuse those 1984 calendars!
>
> Insecure is data that validator *knows* is cannot cryptographically verify.
> This may be because:
> * there are no suitable trust anchors to attempt to verify with.
> * there is a insecure delegation (provable no DS record) in the path.
> * there is a secure delegation but no algorithm support in the path.
>
Right, but what I wrote was not Absolutely wrong, if you assume that
there will at least be  a root trust anchor configured,  But it might
be worth clarifying the first and third bullet above for Insecure.

-mohan

> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: marka@isc.org
_______________________________________________
dnsext mailing list
dnsext@ietf.org
https://www.ietf.org/mailman/listinfo/dnsext