On Fri, Oct 31, 2014 at 8:17 PM, Brian Dickson
<brian.peter.dick...@gmail.com> wrote:
> I think it is good to minimize disruption caused by broken DNSSEC domains,
> for all the reasons listed in the document.
>
> However, I also believe there is a second-order negative effect of
> implementing NTAs as described.
>
> Validating stub resolvers and validating forwarding resolvers, will still
> break.
>

Yup. This is a feature, not a bug.

NTA only makes the local / "ISP resolver" not perform validation for
the domain. Anyone "downstream" who is doing validation will still
perform the validation, and this will fail -- this is, IMO, the right
thing to have happen.
Downstream validators are presumably a: more security conscious and b:
more able to troubleshoot DNS issues than my auntie.

There is a big difference between handing back an answer as though you
are not a validator (the NTA), and signing someone else's answer.

W

> I do have a suggestion, which I hope is worth exploring and considering.
>
> For anyone using an open, well-known resolver (either provided by their ISP,
> or operated as a "public service"), include instructions on use of a
> provider-specific DLV and provider-specific "alternative trust anchor
> (DNSKEY)".
>
> Whenever it is necessary to over-ride broken DNSSEC zones, most likely on
> the Secure Entry Point, do the following:
> (1) Add a KSK to the apex DNSKEY RRset. For convenience use the same KSK for
> all such instances, and publish the public DNSKEY used.
> (2) Sign the apex DNSKEY RRset with this new KSK
> (3) Add this KSK into the DLV operated by the resolver operator at the
> appropriate location. For example, if example.com is broken, put the KSK at
> example.com.dlv.example.net, if the operator of the public resolver is
> example.net.
> (4) Observe successful validation of example.com by anyone configured to use
> dlv.example.net as their DLV.
>
> I haven't tried this, and there might be some specific modifications to what
> I described needed to make the configuration correct/functional. I don't
> believe it introduces new insecurities to anyone who already has placed
> trust in the resolver at example.net.
> (Is it the case that things that use DLV validate the chain of trust to the
> DLV itself, from the root, if there is not a separate trust anchor for the
> DLV zone? That would be optimal, security-wise, I believe.)
>
> Thoughts?
>
> Brian Dickson



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to