Moin!

> On 10 Nov 2014, at 20:11, Brian Dickson <brian.peter.dick...@gmail.com> wrote:
>> With DNSSEC any modification (malicious or not) can be detected so the 
>> actual packet origin doesn't matter. The data origin/authenticity is what we 
>> care about.
>> 
> This is true ONLY for DNSSEC-protected data, and then only to the degree that 
> confidentiality is not an issue.
> 
> For example, by substituting the address glue for the root servers, an 
> attacker could then MitM all subsequent DNS traffic, by providing delegation 
> glue for nameservers that point at (other) attacker-controlled machines. At a 
> minimum, the attacker would see all the DNS queries and answers. And, for any 
> names not DNSSEC-protected, the attacker could then trivially supply forged 
> answers.
So you would have to be man in the middle on the priming query as otherwise 
these addresses are ignored. Pretty hard if you are running on 127.0.0.1 or 
nearby the resolver. Now if you stub without priming which is what Warrens 
draft suggest this attack is impossible as you are hard coding the IP you ask 
the first iterative query and only look and follow the referral, which at some 
points includes validating the signature over the DS record that points to the 
DNSKEY of the TLD.

> Given the relatively low penetration rate in sizeable portions of the 
> namespace, this is indeed something worth worrying about.
But if that is a problem worth worrying it already exist today as your path to 
the root server is longer now. It is not made worse by this or Warrens proposal.

So long
-Ralf

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to