I'd like to maintain the term exactly as specified in RFC4033
(understanding DNSSEC but not validating), because it comes in use when
talking about validating stubs.

Some network operators don't know or care about DNSSEC and do not equip
their network's resolver with a trust anchor.  Such a resolver is
obviously not validating, but if it is a modern resolver it is very
likely to be security-aware.

An application using a validating stub can leverage such a resolver to
get DNSSEC answers from the cache which it can then validate itself.
For example to get an authenticated TLSA and bootstrap an encrypted channel.

I have presented measurements on the amount of security-aware resolvers
in RIPE ATLAS in the context of this use case at ICANN50:

https://london50.icann.org/en/schedule/wed-dnssec/presentation-dnssec-validation-deployment-25jun14-en.pdf

Though in the research we called those DNSSEC-aware instead of
security-aware.

-- Willem

Op 08-03-15 om 23:31 schreef Ralf Weber:
> Moin!
> 
> On Sun, Mar 08, 2015 at 12:21:49PM -0700, Paul Hoffman wrote:
>> Greetings again. Paul Wouters noticed an inconsistency in the terminology
>> draft, and upon investigation, I believe it is a problem (hopefully
>> fixable) with the definitions in RFC 4033.  RFC 4033 and 4035 use the term
>> "validating resolver" in a few places.  However, RFC 4033 never defines
>> that.  RFC 4033 *does* define "security-aware resolver":
>>
>>    Security-Aware Resolver: An entity acting in the role of a resolver
>>       (defined in section 2.4 of [RFC1034]) that understands the DNS
>>       security extensions defined in this document set.  In particular,
>>       a security-aware resolver is an entity that sends DNS queries,
>>       receives DNS responses, supports the EDNS0 ([RFC2671]) message
>>       size extension and the DO bit ([RFC3225]), and is capable of using
>>       the RR types and message header bits defined in this document set
>>       to provide DNSSEC services.
>>
>> My personal interpretation is that "validating resolver" is a synonym for
>> "security-aware resolver".  Do others agree?  If not, how would you
>> differentiate them?
> I was told that the difference is that a security aware resolver does
> not validate, but instead relies on the "Validating Stub Resolver" to 
> protect the user. So it would handle all the DNSSEC processing to the
> authoritative and would store the records with signatures in the cache,
> but it wouldn't check if they are valid. 
> 
> The people who told me that interpreation of the RFC never did deploy DNSSEC
> and thankfully most of the people who did and deployed DNSSEC used
> validating and security aware resolvers. I don't think it makes sense to
> deploy a caching resolver without validation.  So would be ok if we define
> it as you suggest.


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to