On Feb 17, 2013, at 9:57 AM, "Livingood, Jason" 
<jason_living...@cable.comcast.com>
 wrote:
> A Negative Trust Anchor should IMO be locally configured and not rely upon
> any external validation or sourcing for the Negative Trust Anchor(s).

What's local?   How does the local authority know to set a negative trust 
anchor?   This seems very labor-intensive and failure-prone.   Generally 
speaking, from what I've heard, when bad DNSSEC configurations happen, there's 
a back-and-forth with the administrator of the broken zone.   But this is all 
third-hand, at best--if your experience has been different I would like to hear 
about it.

> It basically tells the recursive resolver to not perform (skip) DNSSEC
> validation on a specific domain name for which a Negative Trust Anchor has
> been locally configured. Since it would be locally configured it should
> not rely on the CA infrastructure at all, and all of the inherent issues
> of that - or need to rely on certificate revocations and whatnot.

So this is assuming that validation is occurring on a caching resolver run by 
the provider, and that negative trust anchors simply won't have any effect for 
hosts that do their own validation?

> Also, if a domain has already messed up their DNSSEC signing operations,
> it is unlikely they'd figure out a way to properly sign a Negative Trust
> Anchor or anything else for that matter.

I think this is wrong: the incidents I've heard of were mistakes, which 
resulted in teaching moments for the people who made them, which resulted in 
them learning how to do it right.   It's not like you're going to get a broken 
zone signature if you are completely ignorant, because if you are completely 
ignorant you're not going to try to sign the zone.

> I hope that helps, assuming of course that I understood the question
> relating RFC5280 to this I-D. :-)

It does help--thanks!

On to your response to Joe:

> 5. The DNSOP WG should discuss how to assess when critical DNSSEC
> deployment mass has been achieved so that this is no longer a common
> practice.

Who cares?   If you publish this, you have to assume that whatever you 
recommend here is going to continue to be used well beyond its intended 
lifetime.   Of course, e.g. Comcast will do the right thing, but this won't 
just be used by Comcast.

I think that if you acknowledge that host-resident validating resolvers are not 
going to support negative trust anchors, this is a non-problem, since the rise 
of host-resident validating resolvers, which I think is inevitable in the long 
run, will automatically obsolete this work.

However, if you do decide to rely on this, it's probably worth talking about 
what that obsolescence path will look like, since an NTA in the provider 
caching resolver may produce different results on the host-resident validating 
resolver, as you mention in point 6.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to