With draft-ietf-dane-ops and draft-ietf-dane-smtp-with-dane both
now in the RFC editor queue, I'd like to bring to your attention
important related considerations for DNS operators.

When opportunistic DANE TLS clients try to determine whether TLSA
records exist for peers whose address records are found in signed
zones, lookup failures (bogus replies, SERVFAIL, timeout, ...) are
indistinguishable from an attack.

Thus nameservers for signed zones that fail to reply to TLSA queries
with either a correctly validated denial of existence (NXDOMAIN or
NOERROR && ancount == 0) or actual TLSA records will cause delays
in email delivery from a presently small, but growing list of
senders.

The most common issues to watch out for are:

    * Outdated versions of PowerDNS, don't handle denial of
      existence correctly, the query domain's immediate parent
      also does not exist.  In particular queries of the form:

        _25._tcp.example.com. IN TLSA ?

      fail to elicit proof that "_tcp" does not exist (which is
      typically the case).  The response is then "bogus", and mail
      is delayed.

      This currently afflicts various Neustar.biz nameservers, in
      some cases appearing as nameservers for various customers.

    * No response to TLSA queries, while A or AAAA queries for
      same owner name yield NXDOMAIN.  Often an Arbor Networks or
      Infoblox server with misguided "security" enabled to filter
      out queries for all but the most common RRtypes.  Largest
      problem domain count is at "isphuset.no".

    * Mishandling of denial of existence in the presence of wildcard
      records (poor handling of empty non-terminals) in djbdns with
      unofficial DNSSEC patches.

    * Outdated secondary servers that only NSEC RRs serving zones
      that employ NSEC3 records (and thus unable to do denial of
      existence correctly).

    * Lastly, mostly as a curiosity, something very strange at
      truman.edu, where TLSA denial of existence returns a bad
      signature for the SOA record, while a query for the SOA record
      itself returns the same SOA RRDATA with a valid signature
      (differing only in the last 32 bits).  No idea how that
      happens, but they seem to like it that way (notifications
      don't lead to remedial action).  Compare:

        _25._tcp.barracuda.truman.edu IN TLSA ?

      truman.edu. SOA ns3.truman.edu. dns-alerts.truman.edu. 2053533256 3600 
900 1209600 3600
      truman.edu. RRSIG SOA 5 2 3600 20150911030001 20150812030001 17523 
truman.edu. 
xkuFFH9J6CZlo8oPGtDoDCXxD1iZdD+KkusLGJvcvqaQNClgEdaHu0VEg9Z/mqCg/wBFa4m4XCzwhNFklBiMtmn9qZQ6EyAPCjeE1UBGaspXeiYO262lWwuyLf35KkjRXxKberuoEI9rTTGy8at3xFdLNWaljsAQxCRkGwAAAlg=

        truman.edu IN SOA ?

      truman.edu. SOA ns3.truman.edu. dns-alerts.truman.edu. 2053533256 3600 
900 1209600 3600
      truman.edu. RRSIG SOA 5 2 3600 20150911030001 20150812030001 17523 
truman.edu. 
xkuFFH9J6CZlo8oPGtDoDCXxD1iZdD+KkusLGJvcvqaQNClgEdaHu0VEg9Z/mqCg/wBFa4m4XCzwhNFklBiMtmn9qZQ6EyAPCjeE1UBGaspXeiYO262lWwuyLf35KkjRXxKberuoEI9rTTGy8at3xFdLNWaljsAQxCRkG/sFIYc=

I don't mean to suggest that the issues are especially prevalent.
Out of ~40,000 domains I've found where TLSA record lookups apply,
~38000 have working denial of existence, ~1800 have actual TLSA
RRs, and only 100 or so have one or more of the above problems.

So the vast majority of domains are fine, and I am trying to reach
out to the various DNS operators who can address the problem, but
I think broader awareness of the issues to avoid and/or remediate
might be beneficial to all.

I'd like to see problems with at most a handful of domains at time,
not ~100.  A year ago there were over 3000 problem domains, but
the largest providers have taken action, and now I'm faced with
herding cats in the long tail of the distribution where the number
of problem domains per provider is relatively low and working the
problem one provider at a time is no longer very effective.

-- 
        Viktor.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to