On Thu, Mar 26, 2009 at 12:16:41AM -0700, Doug Barton wrote: > Here is where the alarm bells go off in my head. From 4035, Section 3.1.6: > A security-aware name server MUST NOT set the AD bit in a > response unless the name server considers all RRsets in the > Answer and Authority sections of the response to be authentic. > > (Also see 3.2.3, and the rules for validation in Section 5.)
Yes. But 3.1.6 also says […] A security-aware name server's local policy MAY consider data from an authoritative zone to be authentic without further validation. However, the name server MUST NOT do so unless the name server obtained the authoritative zone via secure means (such as a secure zone transfer mechanism) and MUST NOT do so unless this behavior has been configured explicitly. So AD doesn't mean "I validated this", but rather "I know this is valid". The translating validator _can_ know it's valid: it validated the "base" A record, and then performed a translation using the data it also has by secure means (the sysadmin configured it that way, or it obtained the prefix via some secured connection, or something like that). > Furthermore, NAT64/DNS64 already provides a mechanism for the owner of > the v4-only host to set up the translation on _their_ end, which could > of course include proper DNSSEC signatures on the AAAA records for > their NAT64 box. Remember that what we're trying to do is provide a (nasty) connection between two completely different networks: there's the v4 network, and there's the v6 network. The claim is that we need to find a way to make people on the v6-only network reach hosts that are in a v4-only network. If you disagree with the assumption, that's the one you need to attack. (The response, I expect, will probably be something like, "Operators tell us they need this." Also, the discussion certainly doesn't belong on dnsop -- this message itself is, I suspect, already past far enough.) One basic assumption is that you can't force (or convince) the v4 end nodes to do anything. Relying on people to do the right thing has gotten us where we are with v6, and I think what people are hoping for is some way to make it not the case that "just use v6 and no more v4" means "lose all the resources currently on the v4 network". > I disagree with Dave's reading, see above. You also seem to be munging > the plain-english version of the term "answer" with the DNS meaning of > "data in the answer section of the packet" which is dangerous. Yeah, sorry, I was careless. I should have typed "response" there. > > the DNS, and it knows the prefix it is using). In addition, Dave > > reports that there is an implementation that uses the AD bit, in a > > secure-last-hop context, as a boolean security flag such that > > applications can make different decisions based on whether AD was > > set. So he has a use case that he wants supported. […] > That's great if I'm in the 1% of Internet users that actually can > connect directly to anything. If I'm in the other 99% (yeah, I'm > exaggerating) then there is almost certainly some kind of middleware > box between me and the rest of the Internet controlled by (you guessed > it) _local policy_. Given that I already have to trust whoever is > running the network (or built the box) to deal honestly with my > packets as they go from my host, through locally controlled > middleware, out to the Internet, and back; what harm does a "local > policy" of setting the AD bit for synthesized DNS64 answers cause? Well, sure, if someone can rewrite you're packets you're in big trouble. On the other hand, there's only so much damage such a case can do without being detected. And a simple thing that I can imagine applications doing without AD set is changing the URL-bar colour to indicate "not a secured response". Probably the effects of someone messing with packets belongs on another list, however. BEHAVE would love some more reviewers for the nat64 part of this work! > Furthermore, if the person controlling the network is a bad actor, > they are just going to do it anyway, regardless of what the protocol > says. Also, if they're a network operators. The idea here is to solve the same problems NAT-PT does. And despite its status, NAT-PT is (I am assured) deployed today. Thanks for the feedback. A -- Andrew Sullivan a...@shinkuro.com Shinkuro, Inc. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop