--- Begin Message ---
On Fri, Apr 12, 2024 at 3:10 PM David Zych <d...@illinois.edu> wrote:
>
> On 4/12/24 05:13, Petr Špaček wrote:
>
> On 11. 04. 24 6:15, Stephane Bortzmeyer wrote:
>
> On Tue, Apr 09, 2024 at 01:09:20PM -0500,
> David Zych <d...@illinois.edu> wrote:
>
> The problem: when queried for a record underneath ag.gov. which does
> not exist, these nameservers do not return a proper NXDOMAIN
> response; instead, they don't answer at all.
>
>
> Funny enough, it depends on the QTYPE.
>
>
> Answering QTYPE=NS queries may be a new development; thanks to Victor's
> suggestion I was able to reach someone using the SOA RNAME address, and their
> first reply on Apr 10 was "The reported issue of the domain
> "www.[.]tucson[.]ars[.]ag[.]gov" (formatted to avoid url protection) not
> resolving has been corrected." It might be that this is the thing they
> changed; I'm not sure.
>
> Our continued back-and-forth discussion about the importance of NXDOMAIN
> responses in general is ongoing.
>
> It's also funny to me that the exact same nameservers do answer `dig +norec
> @ns1.usda.gov thissubdomaindoesnotexist.usda.gov a` (for usda.gov instead of
> ag.gov)
>
> The practical trouble this causes has to do with an increasingly popular DNS
> privacy feature called QNAME Minimization, which depends upon authoritative
> DNS servers like yours responding in a standards-compliant way to queries like
>
> _.ag.gov IN A
> _.ars.ag.gov IN A
> _.tucson.ars.ag.gov IN A
>
>
> More fun: the previous version of QNAME minimisation used QTYPE=NS. It
> then changed to QTYPE=A precisely to work around broken
> middleboxes. (And also to avoid sticking out.)
>
>
> This is not only in violation of
> https://datatracker.ietf.org/doc/html/rfc8906 but it is an outright security
> issue because it allows attackers to mess up load balancing in resolvers. See
> https://indico.dns-oarc.net/event/47/contributions/1018/attachments/959/1802/pre-silence-not-golden-dns-orac.pdf
> I predict you have much better chance getting this fixed if you go through
> respective CERT team and point them to this presentation.
>
>
> Thanks, that's a great link and I will be sure to include it in my next reply
> to the authoritative nameserver operator. (It does appear that someone
> considers the status quo posture a "security protocol", so hopefully they
> will see this as a compelling argument.)
>
> Answering before some asks: No, we are not going to workaround this in BIND
> resolver. It has to be fixed on the auth side. This is not a security bug in
> BIND. See
> https://bind9.readthedocs.io/en/latest/chapter7.html#dns-resolvers
>
>
> I certainly would never suggest that it was a bug in BIND, but FWIW: I would
> see some value in being able to configure `qname-minimization` within a
> `server` block.
>
> Suppose I as the recursive nameserver operator hypothetically found myself
> under pressure from non-technical people to "just make it work so we can get
> to the website, this is embarrassing" (fortunately not the case right now,
> but it's not hard to imagine in a higher profile scenario). I could
> accomplish that right now using either `qname-minimization disabled;` or in
> this case also (ironically) `qname-minimization strict;`. However, a global
> setting of strict might cause problems resolving other domains, so
> realistically my best unilateral recourse would be to disable minimization
> completely, even though that feels like a step backward. Given the choice,
> I'd much rather disable it just for two known misbehaving servers and leave
> it on for everything else (while in parallel still reaching out to the
> authoritative server operator to address the root cause).
>
> It seems to me that such a feature would likely also be helpful when strict
> eventually does become the default, if a few authoritative nameservers in the
> wild still aren't ready (preferable at that point for recursive server
> operators to set relaxed or disabled just for problem cases vs globally).
Per nameserver IP settings are convenient and can provide tactical
fixes to a resolution problem.
However they suffer from a big maintenance problem as nameserver IPs
for zones change over time. Also when making a per nameserver config,
did the operator configure it for all the relevant IPs?
>
> Thanks,
> David
>
> --
> David Zych (he/him)
> Lead Network Service Engineer
> University of Illinois Urbana-Champaign
> Office of the Chief Information Officer
> Technology Services
>
> Under the Illinois Freedom of Information Act any written communication to or
> from university employees regarding university business is a public record
> and may be subject to public disclosure.
>
> _______________________________________________
> dns-operations mailing list
> dns-operations@lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
--- End Message ---
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations