Paul Vixie wrote:
> 
> Viktor Dukhovni wrote:
>> ...
>>
>> What's attractive here, is that real resolvers (local to the same
>> device) already have the requisite feature-set, and there's no need
>> to augment stub resolvers with features already handled by local
>> recursive resolvers.  If a device is too dumb to run a separate
>> resolver process, I don't expect it'll have a trustworthy DNSSEC
>> implementation in its stub resolver.
> 
> trusting a dns response's AD bit to tell you that the responder has done
> careful signature checking all the way back to a trust anchor you have
> confidence in, doesn't fit the hotel or coffee shop scenario -- you do
> not want your hotel or coffee shop in the role of making a secure
> introduction between you and your bank, for example.

since the hotel is unlikely to transmit on an interface that's local to
the same device, let me amend this as follows:

trusting the AD bit just because the packet appears to have been
generated locally is a dangerous model. if the specification requires
that the stub have explicit and non-default cause for confidence in the
sender's identity and fidelity, then there's no way to test for this,
and since there's no way to test for it, it won't be widely implemented.
time to market is the primary driver for a product or service's lifetime
revenue envelope, and any requirement that won't face acceptance and/or
interoperability testing, WILL be left out.

the thing you CAN test for is whether the signatures are valid. which is
why first dan kaminsky and later paul wouters wanted to send the full
signature chain. perhaps that can be merged in here: if the stub
resolver can see the full signature chain and do its own validation,
then it ought to believe that the data is authentic. this would put the
burden on system vendors to put signature chain gathering/expansion into
their on-device RDNS or DNS Proxy, so that local stubs saw same.

-- 
P Vixie

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to