> From: Barry Raveendran Greene <bgre...@senki.org>
> To: Paul Wouters <p...@nohats.ca>

> Paul - changes to existing practice is a _new_ document. You take the 
> existing, coded, and deployed specification in as an informational RFC. Then 
> you start a new working group document for the full "IETF version."
>
> We've done this for many other protocols over the last several decades. Why 
> the push back?

indeed.


> > The draft breaks DNSSEC. ...

As stated, that could be seen as inaccurate.  The current de facto
standard RPZ produces modififed DNS responses that are unsigned and
so do not verify, just as if the DNS resolver were an old, pre-DNSSEC
installation.  For better or worse, DNS clients that care about DNSSEC
(i.e. that verify or just check the header bit) are not fooled by RPZ
and so in that sense the DNSSEC protocol is not broken by the draft.

The "break-dnssec" option was not in early RPZ implementations.  I
added it in response to popular demand, and I suspect it is present
in most RPZ installations.  I chose the phrase "break-dnssec" to suggest
that you should think twice before turning it on.


> > I have proposed a method that would not change the RPZ response for a
> > non-DNSSEC client, but would add data for DNSSEC capable clients to be
> > notified the DNSSEC data was modified (and possibly state why) giving
> > DNSSEC capable clients a method to act differently, knowing the data was
> > changed for a reason and is not simply a DNS spoofing attack. It can be
> > added without breaking existing deployments. If the authors aren't willing
> > to do this, why should IETF rubberstamp a DNS protocol that breaks DNSSEC?

To somewhat mitigate rubberstamping, I'd be happy to add a simple
warning or prohibition on implementing or deploying RPZ, provided it
lacks political grandstanding and has working group consensus.

As for "fixing" RPZ+DNSSEC, the current draft specifies behavior only
for DNS recursive resolvers.  Nothing can be done in only the RPZ-using
DNS servers to securely notify clients about RPZ changes.  DNS clients
would need to be modified to look for the new signs of RPZ changes.
Exactly what those RPZ signs would be and what DNS clients should do
when they are present would have to be designed and documented.  The
scope of those client and server protocol changes would be much larger
than the scope of the current QTYPE=ANY proposal, and so more controversial
and time consuming, even if RPZ itself were not more controversial
than changing the de facto definition(s) of QTYPE=ANY.

Distinguishing a DNS spoofing attack pretending to be RPZ changes from
"honest" RPZ changes would require some sort of digital signatures,
but the trust anchor for those signatures could not be standard.  Those
non-DNSSEC-standard signatures might involve a DLV or maybe they could
use a key associated with the domain name in the RPZ SOA.  In cany
case, a complete design would be required.  That they would be
non-DNSSEC_standard implies that they could not be in the usual places,
lest pre-new-RPZ-but-verifying DNS clients see them...and those are
merely some problems that seem obvious for secure RPZ rewriting.

Note that RPZ changes are already signaled by the odd SOA specified
in draft, although it is intended only for human inspectors.  That SOA
is in the additional section, because putting it in the usual place
breaks some cases....which is another way of saying that merely adding
as yet unspecified RRSIGs to the authority section of RPZ modified DNS
responses is not something that should be without extended discussions,
plenty of real world testing, and more time than has been spent on the
QTYPE=ANY protosal.


Vernon Schryver    v...@rhyolite.com

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to