In message <54fdb221.8020...@nlnetlabs.nl>, Willem Toorop writes: > I'd like to maintain the term exactly as specified in RFC4033 > (understanding DNSSEC but not validating), because it comes in use when > talking about validating stubs. > > Some network operators don't know or care about DNSSEC and do not equip > their network's resolver with a trust anchor. Such a resolver is > obviously not validating, but if it is a modern resolver it is very > likely to be security-aware. > > An application using a validating stub can leverage such a resolver to > get DNSSEC answers from the cache which it can then validate itself. > For example to get an authenticated TLSA and bootstrap an encrypted channel.
Which works most of the time as there are very few attacks and the resolvers do a pretty good job of dealing with the broken authoritative servers and poorly configured firewalls that block legitimate replies. If you want reliable DNSSEC then these resolvers also need to validate. > I have presented measurements on the amount of security-aware resolvers > in RIPE ATLAS in the context of this use case at ICANN50: > > https://london50.icann.org/en/schedule/wed-dnssec/presentation-dnssec-validat > ion-deployment-25jun14-en.pdf > > Though in the research we called those DNSSEC-aware instead of > security-aware. > > -- Willem > > Op 08-03-15 om 23:31 schreef Ralf Weber: > > Moin! > > > > On Sun, Mar 08, 2015 at 12:21:49PM -0700, Paul Hoffman wrote: > >> Greetings again. Paul Wouters noticed an inconsistency in the terminology > >> draft, and upon investigation, I believe it is a problem (hopefully > >> fixable) with the definitions in RFC 4033. RFC 4033 and 4035 use the term > >> "validating resolver" in a few places. However, RFC 4033 never defines > >> that. RFC 4033 *does* define "security-aware resolver": > >> > >> Security-Aware Resolver: An entity acting in the role of a resolver > >> (defined in section 2.4 of [RFC1034]) that understands the DNS > >> security extensions defined in this document set. In particular, > >> a security-aware resolver is an entity that sends DNS queries, > >> receives DNS responses, supports the EDNS0 ([RFC2671]) message > >> size extension and the DO bit ([RFC3225]), and is capable of using > >> the RR types and message header bits defined in this document set > >> to provide DNSSEC services. > >> > >> My personal interpretation is that "validating resolver" is a synonym for > >> "security-aware resolver". Do others agree? If not, how would you > >> differentiate them? > > I was told that the difference is that a security aware resolver does > > not validate, but instead relies on the "Validating Stub Resolver" to > > protect the user. So it would handle all the DNSSEC processing to the > > authoritative and would store the records with signatures in the cache, > > but it wouldn't check if they are valid. > > > > The people who told me that interpreation of the RFC never did deploy DNSSE > C > > and thankfully most of the people who did and deployed DNSSEC used > > validating and security aware resolvers. I don't think it makes sense to > > deploy a caching resolver without validation. So would be ok if we define > > it as you suggest. > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop