> On 14 Sep 2018, at 7:12 pm, Klaus Malorny <klaus.malo...@knipp.de> wrote: > > On 14.09.18 00:55, Mark Andrews wrote: >> I was testing TSIG with a well known key against TLD servers and got the >> following response. Once you get past the bad class field (reported to the >> operator) there were a >> number of other items: >> * the tsig name does not match the request. >> * the algorithm doesn’t match the algorithm in the request. >> * time signed is not set. >> * the fudge value is zero. >> Should these match the request / be set for BADKEY? >> Mark > > > Hi Mark, > > thanks for bringing this to our attention. I have fixed the DNS class, the > key and algorithm name. For the latter two, it makes some sense to return the > values from the request. Regarding the time and fudge, I have currently left > it to zero, as IMHO they have no meaning without having a signature. But I am > open to conviction…
Actually having the clients time and fudge in those fields for BADKEY provides spoofing protection for the unsigned responses. This is especially important with opportunistic TSIG,which is what TSIG with a WKK will be, as there is no longer the presumption that server is configured for the key that there was when TSIG was originally drafted. It’s all about getting answers through acceptance filters. For non opportunistic TSIG the client is still expected to wait for a valid TSIG response even if it sees a BADKEY response. > By the way, the parsing error of DiG seemed to be solely caused by the wrong > class; after changing it to ANY, the RDATA was parsed and displayed correctly. > > Regards, > > Klaus > > -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop