-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Andrew,
Also following the dns64 discussion, I thought the real issue was if we had a security-aware validating stub that does not understand translation. The stub resolver sets the CD bit but has no clue of how to do the translation. Regarding the situation below, I would say the AD bit would not break anything protocol wise. RFC 4035 says that such a stub MAY check the AD bit in order to see if the validator performed verification, but it SHOULD NOT attach any value to it if it does. By the way, does the AD bit actually says something about RRSIGs need to be present in the response? If so, point me out 'cuz I couldn't find it. Kind regards, Matthijs Mekking Andrew Sullivan schreef: > Dear colleagues, > > Despite the speed with which I went through the dns64 issue, there is > in fact something in this that could really do with some attention. > Again, this isn't a WG document and really needs to be discussed in > behave, but I'll make a more detailed plea here now that you all heard > me talking really fast saying something. > > Suppose that we have a security-aware, non-validating stub behind a > translator. On query it sets DO and does not set CD. > > The translator is a validating, recursive resolver that also performs > the translation function (a "translating validator", for short). > > The general principle is that we MUST validate before translation. > So, the translating validator queries for the AAAA record, doesn't get > one, queries for the A record, and gets one with all the DNSSEC data > necessary for validation. The translating validator successfully > validates the A record. Now, it translates. > > To perform the translation, it moves the A record to the additional > section, strips off all the RRSIG and other DNSSEC-relevant data, > synthesizes the AAAA record to match the A record, and sets the AD > bit. It then ships the resulting response to the stub. > > The question is whether that's broken in such a way that it will break > any clients. In particular, are there clients that will get heartburn > if AD is set on a response when there's otherwise apparently no > security data in the response? > > For background, the extant -02 draft doesn't do it as outlined above. > It said instead that the translating validator MUST NOT set the AD > bit, because the answer being returned isn't actually validatable. > The counter-argument, raised by Dave Thaler, is that RFC 4035 allows > the validator to set AD if it knows it can trust the answer (and of > course, the validator can know that: it validated the response from > the DNS, and it knows the prefix it is using). In addition, Dave > reports that there is an implementation that uses the AD bit, in a > secure-last-hop context, as a boolean security flag such that > applications can make different decisions based on whether AD was > set. So he has a use case that he wants supported. > > Any feedback welcome. As I said at the mic, discussion is really > going on in behave; I'll happily take direct feedback as well. > > Thanks for your time today. > > A > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQEVAwUBScpzCA8yVCPsQCW5AQJHigf/VZ3c0bfvJJN6Fuuqeuob33RHIBVKNB0m R2hU1dYknV4ral9LFLCh4cMb7bSKwvXoP3Kn9FUj4khJXylURxVn7w8ys7pu8NXJ wYoxuIWsjBPB/11xaXVFsxRdBrjfESlOXvTURluJEBR14J++SlajFMbE2UlSyTfs yVvlGRdxqZ1WXytkn5dXvrjOc9jKOKqBhqX0udSZOsiySNdiskzrF9cDWz3UaKe0 /FEoGvex3I4jY+h8zBvDjkKzGGZWqMK5oCLScAxs3EY++pKjUQE/U7iIWjPRHXL8 NrcPIuDtZF8DxUOzj1fidZ/ENspw4mU2pRF8tS/Lfy7QovKTnrjshA== =opYL -----END PGP SIGNATURE----- _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop