On Jan 29, 2018, at 10:53 AM, dnsop-requ...@ietf.org wrote:

> To add more to this, Unbound by default returns 127.0.0.1, and so does
> Knot Resolver, because both decided to respect
> https://tools.ietf.org/html/rfc6761#section-6.3
>
> This is a security hole, and again, purpose of NXDOMAIN is to make it
> fail safe instead of keeping insecure stub implementations doing what
> they did up until now.

By short-circuiting the lookup as early as possible these resovers
avoid sending the query upstream.  Thus eliminating part of the
security exposure further upstream away from the user's device.

Serving local data for "localhost" is NOT the security hole, it is
an incomplete fix, and a secure one when the resolver is responding
to loopback clients.  The hole is in the platform's libraries, and
that is the proper primary focus of the draft, not recursive
resolvers, nor even stub resolvers (the DNS portion of the platform
name resolution libraries).

If you want to remove the band-aid, that is properly a SHOULD, not
a MUST.  It is not required for interoperability, nor does it
address the security issue, [e.g. the next resolver in the forwarding
chain may still return 127.0.0.1,  or as likely or more the user
will just stop using "localhost", and hard-code IPv4: 127.0.0.1].

-- 
        Viktor.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to