With draft-ietf-dane-ops and draft-ietf-dane-smtp-with-dane both now in the RFC editor queue, I'd like to bring to your attention important related considerations for DNS operators.
When opportunistic DANE TLS clients try to determine whether TLSA records exist for peers whose address records are found in signed zones, lookup failures (bogus replies, SERVFAIL, timeout, ...) are indistinguishable from an attack. Thus nameservers for signed zones that fail to reply to TLSA queries with either a correctly validated denial of existence (NXDOMAIN or NOERROR && ancount == 0) or actual TLSA records will cause delays in email delivery from a presently small, but growing list of senders. The most common issues to watch out for are: * Outdated versions of PowerDNS, don't handle denial of existence correctly, the query domain's immediate parent also does not exist. In particular queries of the form: _25._tcp.example.com. IN TLSA ? fail to elicit proof that "_tcp" does not exist (which is typically the case). The response is then "bogus", and mail is delayed. This currently afflicts various Neustar.biz nameservers, in some cases appearing as nameservers for various customers. * No response to TLSA queries, while A or AAAA queries for same owner name yield NXDOMAIN. Often an Arbor Networks or Infoblox server with misguided "security" enabled to filter out queries for all but the most common RRtypes. Largest problem domain count is at "isphuset.no". * Mishandling of denial of existence in the presence of wildcard records (poor handling of empty non-terminals) in djbdns with unofficial DNSSEC patches. * Outdated secondary servers that only NSEC RRs serving zones that employ NSEC3 records (and thus unable to do denial of existence correctly). * Lastly, mostly as a curiosity, something very strange at truman.edu, where TLSA denial of existence returns a bad signature for the SOA record, while a query for the SOA record itself returns the same SOA RRDATA with a valid signature (differing only in the last 32 bits). No idea how that happens, but they seem to like it that way (notifications don't lead to remedial action). Compare: _25._tcp.barracuda.truman.edu IN TLSA ? truman.edu. SOA ns3.truman.edu. dns-alerts.truman.edu. 2053533256 3600 900 1209600 3600 truman.edu. RRSIG SOA 5 2 3600 20150911030001 20150812030001 17523 truman.edu. xkuFFH9J6CZlo8oPGtDoDCXxD1iZdD+KkusLGJvcvqaQNClgEdaHu0VEg9Z/mqCg/wBFa4m4XCzwhNFklBiMtmn9qZQ6EyAPCjeE1UBGaspXeiYO262lWwuyLf35KkjRXxKberuoEI9rTTGy8at3xFdLNWaljsAQxCRkGwAAAlg= truman.edu IN SOA ? truman.edu. SOA ns3.truman.edu. dns-alerts.truman.edu. 2053533256 3600 900 1209600 3600 truman.edu. RRSIG SOA 5 2 3600 20150911030001 20150812030001 17523 truman.edu. xkuFFH9J6CZlo8oPGtDoDCXxD1iZdD+KkusLGJvcvqaQNClgEdaHu0VEg9Z/mqCg/wBFa4m4XCzwhNFklBiMtmn9qZQ6EyAPCjeE1UBGaspXeiYO262lWwuyLf35KkjRXxKberuoEI9rTTGy8at3xFdLNWaljsAQxCRkG/sFIYc= I don't mean to suggest that the issues are especially prevalent. Out of ~40,000 domains I've found where TLSA record lookups apply, ~38000 have working denial of existence, ~1800 have actual TLSA RRs, and only 100 or so have one or more of the above problems. So the vast majority of domains are fine, and I am trying to reach out to the various DNS operators who can address the problem, but I think broader awareness of the issues to avoid and/or remediate might be beneficial to all. I'd like to see problems with at most a handful of domains at time, not ~100. A year ago there were over 3000 problem domains, but the largest providers have taken action, and now I'm faced with herding cats in the long tail of the distribution where the number of problem domains per provider is relatively low and working the problem one provider at a time is no longer very effective. -- Viktor. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop