A couple of remarks below:

On Nov 4, 2014, at 18:07, Brian Dickson <brian.peter.dick...@gmail.com> wrote:

> The good news is, for most cases, setting up a DLV-based "fix" can be done, 
> with only the DNSKEY(KSK).
> I.e. modifying responses is not required AT ALL, and no new DNSKEYs or 
> signatures are needed.

Recall that DLV is a registry and thus has all the inherent risks of any 
registry.

> (Please ignore my previous responses.)

That will cost you plenty, you’ve posted a lot through the years.

;)

> Long version:
> 
> In order to assist validating forwarders, broken DNSSEC zones can be 
> "repaired" using DLV, and ONLY DLV.

Assuming that the problem lay in the keys available to build the trust chain.

> Take the result of "dnssec-dsfromkey" for the apex KSK, append the DLV domain 
> name to the owner names.
> Insert into the DLV zone, sign, bazinga. Use of this DLV, with the modified 
> suite of bind tools, securely resolves.
> 
> As currently implemented in BIND-9.10.1, a modification is needed to 
> lib/dns/validator.c.
> The good news is, it is a one-line change.

In BIND (only), no?  (Well, yes, just an annoying way to say that there are 
other implementations.)

> Basically, it changes the logic, if no DS->DNSKEY validated match can be 
> made, to fall through to use DLV.

This harks back to something I looked up just today - section 2.7 of RFC 3008 - 
which restricted the signer ID in the SIG RR to be the name of the zone apex.  
Here you are not changing the signer ID but the authoriative source of the zone 
apex key set.  In the spirit of “any trusted chain in a storm” you have to make 
sure you can trust the “alternate source.”  Hence my remark above that DLV is a 
registry with the inherent risks of a registry.

> (In the current logic, DLV is only queried if no DS exists above a secure 
> zone, from a secure zone. The change extends the logic to make this "no VALID 
> DS" instead of "no DS".)
> 
> No changes to the answers served by a resolver (who is the target of 
> forwarders) are required.
> 
> There is not even a requirement that the NTA resolver operator be the 
> operator of the "fix-up" DLV.
> 
> Given the relative rarity of DNSSEC failures which do not get fixed quickly 
> enough relative to their perceived value

I have an experience that says “perceived value” is in the eye of the beholder. 
 For a while “$we” turned on DNSSEC validation.  When one, tiny, 
low-query-volume, corner-of-the-internet, zone “broke” we got a trouble ticket. 
 That ended the validation experiment (the front-line didn’t know the code base 
in use had NTA).  Didn’t matter that it wasn’t a marque zone, just one that 
someone who’d bother to complain wanted to get to.

The point is, if the front-liners knew how to uss the NTA, they’d still be 
using DNSSEC.  Because they wouldn’t have feared the trouble ticket and, while 
running, would have gained experience and confidence.  That’s been lost.

> , it may be worth asking for volunteers to run one (or more) centralized 
> fix-up DLV instances.

I become scared of you when you start talking about “(or more) …DLV instances.” 
 In the same sense that more X.509 certificate authorities degraded the trust 
in X.509 chain building, more sources of data to build trust chains hasn’t had 
a good track record.

> So, other than the operational implications to downstream validators of 
> NTA-implementing resolvers, it may be sufficient to add the observation 
> regarding DLV as a possible way of fixing broken DS->DNSKEY (on a third-party 
> basis) as a sub-paragraph.

IMHO, under the banner of “local policy” (as evidenced in 2.7 or RFC 3008 and 
elsewhere), a local determination to press the NTA button in an implementation 
is well within what an operator should want.  Adding in untold other sources to 
an implementation is not within the spirit of “local policy” (beyond deciding 
to use or not the implementation) - on par with some recent OS release 
apparently deciding to store private documents on it’s cloud service “for safe 
keeping.” ;)

Dropped the rest of the mail thread here…

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to