On Wed, Feb 8, 2017 at 11:42 AM, Mark Andrews <ma...@isc.org> wrote:

>
> In message <e0a42577-0984-4add-8658-91413cbe7...@fugue.com>, Ted Lemon
> writes:
> >
> > On Feb 8, 2017, at 1:02 AM, Mark Andrews <ma...@isc.org> wrote:
> > > Which assumes agggressive negative caching.   I'm going to make a
> > > realistic assumption that it will take 10+ years for there to be
> > > meaningful (>50%) deployment of aggressive negative caching.
> >
> > First of all, this probably isn't true, since most of the caches we care
> > about are run by network operators, who tend to update more frequently
> > for obvious reasons.   But the solution you propose, which causes a
> > SERVFAIL, involves a specially-prepared resolver.   So if you get to
> > _create_ the problem with a specially-prepared resolver, I get to solve
> > it with a differently specially-prepared resolver.   If you want queries
> > to .alt not to leak, you have to preload your cache with a proof of
> > nonexistence for .alt, and you have to keep it up to date.   This is not
> > terribly difficult to arrange.
> >
> > >> Leaking a query to .alt is harmless.
> > >
> > > Is it?  What reports are we going to see over the next 20 year of
> > > DITL data on *.alt.
> >
> > How is that relevant?   Suppose we don't create .alt, and instead people
> > just pick random top-level domains for their experiments, as they do now.
> >   Will the number of bogus queries to the root be greater, or fewer?
> > Furthermore, queries for .alt are legitimate, in just the same way that
> > queries for .com are.   They just have a different answer.
>
> Me, I'm trying to prevent the SERVFAIL issues the IETF has created for
> .onion.  In particular this from RFC7686
>
>    4.  Caching DNS Servers: Caching servers, where not explicitly
>        adapted to interoperate with Tor, SHOULD NOT attempt to look up
>        records for .onion names.  They MUST generate NXDOMAIN for all
>        such queries.
>
> Without .onion being a insecurely delegation this results in SERVFAIL
> or BOGUS being returned for .onion named when validation is performed
> by any validating software that is not RFC7686 aware.
>
>
So, while technically the instruction (SHOULD NOT) applies to full .onion
names,
it is a SHOULD NOT, not a MUST NOT.

Again, technically, the bit of code to do the following, IMHO, nears the
level of "trivial":
- upon startup, do a query for "onion" (the non-existent TLD), with DO=1.
- cache the response, and as appropriate, re-query periodically.
- If a query for <anything>.onion is received, reply with the authenticated
denial of existence from the root (cached in step 2)

I believe this should prevent any SERVFAIL or BOGUS.

(I think this turns on the pedantic reading of "generate".)



> Nameserver vendors have a choice.  Follow RFC7686 and have their
> clients get a answer that they know cannot be validated or ignore
> this clause and pretend that RFC7686 has never been written so that
> their client get a validatable answer.  Should the IETF have put
> Nameserver vendors in this position?
>
> At this stage we have not yet implemented this clause in BIND.  We
> are aware of RFC7686 and at some point someone will complain that
> we don't implement this.  At that point we will point out to them
> that this results in SERVFAIL or bogus being returned.
>
> Note all through the debate about .onion I raise this issue.  Go
> look at the archives.
>
> Now draft-ietf-dnsop-alt-tld-07 has almost identical wording
>
>    4.  Caching DNS servers SHOULD recognize these names as special and
>        SHOULD NOT, by default, attempt to look up NS records for them,
>        or otherwise query authoritative DNS servers in an attempt to
>        resolve these names.  Instead, caching DNS servers SHOULD
>        generate immediate negative responses for all such queries.
>
> This clause results in BOGUS or SERVFAIL being returned to the DNS
> application if there is a validator in the return DNS path between
> the caching DNS server and the application.
>

See above; maybe the text of alt-tld should be less prescriptive, and
instead use aggressive-negative compatible language (including use of
legitimate, signed denial of existence RRsets).

Brian



>
> Mark
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to