Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> On Mar 9, 2015, at 3:45 AM, Tony Finch <d...@dotat.at> wrote:
> >
> > Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> >>
> >> My personal interpretation is that "validating resolver" is a synonym
> >> for "security-aware resolver". Do others agree? If not, how would you
> >> differentiate them?
> >
> > No, "security-aware" means that the doftware understands the special
> > semantics of RRSIG, NSEC, DS, etc. but does not necessarily validate.
>
> What does "understand" mean in that sentence?

The software has to implement the parts of DNSSEC which are incompatible
with security-oblivious DNS.

RRSIG records are part of the RRset they sign, not a separate RRset of
their own.

Proof of nonexistence requires returning NSEC(3) records in responses.

DS records have to be queried at the parent not the zone apex.

etc.

> > It is clear from RFC 4033 that validation is separate from security
> > awareness because of "Non-Validating Security-Aware Stub Resolver".
>
> Maybe. Note that this is the only defined term with "non-validating" in
> it. Was this possibly an artifact of the world-view that Ralf mentioned?

Maybe. I agree with most of what Ralf said. However while we may not think
it makes sense to deploy a non-validating resolver, a large proportion of
the resolvers out there are non-validating and security-aware.

> > For instance, by default, BIND is a security-aware validating resolver.
> > (Except it can't validate anything until you configure a trust anchor.)
> > You can turn off validation with "dnssec-validation no" and switch it into
> > security-oblivious mode with "dnssec-enable no".
>
> If you turn off validation with "dnssec-validation no", in what way is
> it security-aware any more?

It matters wrt the protocol support that is provided to downstream
clients.

All upstream servers of a validator have to be security-aware or the
validator will not work. So if I turn off validation on my recursive
server and flush its cache, I can still use a validating stub. The stub
will make DO=1 queries so the server will return the RRSIG and NSEC
records that the stub needs to be able to validate. If I turn off DNSSEC
support in my recursive server, my stub can no longer validate the
responses because the necessary information is not returned.

Obviously a non-validating recursive server isn't a good setup from the
DNSSEC point of view, but there is an important distinction between
working (security-aware but vulnerable to cache poisoning) and completely
broken (because security-oblivious).

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
Tyne, Dogger, Fisher, German Bight, Humber: South veering west 5 to 7,
occasionally gale 8, except in Humber. Moderate or rough, becoming very rough
in Fisher. Rain for a time. Moderate or good.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to