In message <20140820235118.e952b1d1b...@rock.dv.isc.org>, Mark Andrews writes: > > In message <e4ad7d21-995c-46b1-813e-70ca0919f...@hopcount.ca>, Joe Abley writ > es > : > > > > On 20 Aug 2014, at 17:48, Mark Andrews <ma...@isc.org> wrote: > > > > > You will give answers that validate as bogus in the stub resolver. > > > > This seems to be the crux of our differing world views. > > > > > A validating stub resolver > > > > Validating stub resolvers? > > > > In my own personal taxonomy a stub resolver doesn't validate. Validation > > signalling is available from a validating resolver (e.g. using the AD > > bit, of which I am not a fan), and that resolver (validating or not) is > > where I was suggesting the locally-relevant data would be served. > > > > (Note that I'm not saying that my own personal taxonomy is of any use to > > anybody apart from me; I'm just putting it out there by way of > > explanation of the current forehead wrinkles. I continue to think it > > would be good to have a common understanding of these overloaded terms.)
DNSSEC responses were, from day one, designed to be validated in the application/client/resolver library. For the discussion about 100.64/10 reverse in which of these places is immaterial Getting validation into recursive servers was a first step and it also protected non-DNSSEC aware clients from a class of attacks. It was also one of the easiest piece to update which was why it was promoted first. It was also a required step as you can't reliably validate in the client unless the recursive server has filtered out the spoofed answers. The next step was/is getting validation performed in the clients. There are several validating stub resolver libraries from different vendors. ISC has shipped one as part of BIND for over a decade. Yes, you can link libdns into a application and have it validate answers you receive from a recursive server before handing them to the application. named is the main application that uses this library but it is not the only one. The newer releases have simpler calling points and setup. Validation is starting to move into the application with inititatives like DANE. AD is only useful as a signal that a answer is secure when you can trust the path between the recursive server and the application *and* you can trust the configuration of the recursive server to be setting AD appropriately. See all the caveats about trusting AD in the RFC's where it is mentioned. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop