On Tue, Nov 21, 2017 at 3:54 PM, Viktor Dukhovni <ietf-d...@dukhovni.org> wrote: > On Mon, Nov 20, 2017 at 01:10:43PM +0000, Tony Finch wrote: > >> Viktor's message has lots of sound advice, though I have one correction: >> >> > This language really should have been much more clear. In particular, >> > the last item warrants clarification. It is critical that the CA >> > determine the lack of a validation chain in a robust manner. The >> > simplest approach: >> > >> > * Request the SOA record of the domain. If this lookup fails, >> > (ServFail, Timeout, ...) stop, the domain's DNSSEC status is >> > unknown. >> >> No, you need to lookup the domain's DS records to determine its DNSSEC >> status. > > Actually, I chose my recommendation of SOA lookup after some thought > and with care. A domain may have no DS records, and yet be signed > because it is not a (delegated) zone apex domain. Furthermore, an > SOA query elicts data from the domain itself, not the parent, and > thus ensures that any published DS records up the tree yield working > signatures for records in the zone containing the domain. > > If the SOA lookup fails, then the domain is severely broken beyond > just "stoopid" blocking of CAA and other "novel" RRtypes, and so > there is no reason for the CA to be "forgiving" of such errors. > (Not that I have much sympathy for domains where CAA lookups fail > but other lookups do not, they really should feel some pain to fix > their DNS). > > So I stand by the advice to issue "SOA" queries, they are far > simpler to implement correctly (without having to chase DS records > up the tree, cross check them against NS records, ...) and they > yield more useful information, namely whether: > > * A domain has working "insecure" DNS > * A domain has working "secure" DNS > * A domains is broken, and needs attention before CAA status > can be determined or ignored.
If the domain is broken, validation is going to fail as well. Which may prove a useful cut. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop