On Sat, 1 Dec 2018, Scott Morizot wrote:
I guess I'll speak up as someone who has been managing the DNS/DNSSEC design and implementation of a large organization with a complex set of DNS requirements
Thanks for the write up! It is always good to hear actual enterprise deployments.
We employed manual trust anchors at different phases of our implementation, but now have very few in place. One is to establish trust for an internal zone for which we do not control the administration of the parent zone.
So the interesting question here is, how is this one zone securely resolved when you are connected to the network via a VPN? Or is this zone not available for VPN users? And if this draft could make it available, would you? Or, do your VPN users not use split-tunnel, and connect to an inside DNS server once connected?
This scheme seems to require both inside and outside zones are signed with the same key, or as Mark pointed out, both internal and external zones need to share their DS records and keep these in sync. As these are usually different organisations/groups/vendors/services, that is an actual management problem. Or you can do what we did and place DS records for both the internal and external KSKs (using public placeholder versions of the internal child zones just to establish the delegation point) in the parent zone. That establishes chain of trust whichever version of the zone is resolved. That works whether the public version is just a placeholder with nothing else of significance in it or if it is a zone where both the external and internal records matter and are used by the appropriate source for the query, but differ.
That is a good solution as well. Although I would be a little worried that a compromise of the public view could trick people into establishing the "internal" zones in the external view to trick people into logging on and giving out their password. But that is surely far down the list of easy attacks to run.
I don't really have any thoughts on the draft itself
That is too bad, because I'd be very curious how you handle DNSSEC with your VPN clients. Not many large organizations run DNSSEC on both internal and external views. So I am curious how you handle DNSSEC for your (split?) VPN clients. But I understand if you cannot share more data about that in a public forum.
, but wanted to add my own real world experience with managing DNSSEC trust. On the validation side, we also don't allow any device in the enterprise network, including internal nameservers, to send or receive DNS queries to the Internet. Period. Only our perimeter recursive, DNS caches can do that and those will only accept queries from authorized enterprise recursive, caching nameservers. And we have protections, including different DNS blacklists, at each layer. So we have a lot of control over what devices connected to our network can and cannot do and they do not have unrestricted ability to query Internet DNS even through our multiple layers. We also use the cli version of dnsviz a lot to ensure we understand what different points on the recursive side of our enterprise DNS infrastructure are seeing.
So I guess the interesting thing here is the device that is in split-tunnel mode. It would not receive the protection of your DNS infrastructure for external lookups, so if you allow BYOD to connect to your network, it would be bypassing those DNS security checks for non-organisation DNS queries, which would put the BYOD under greater risk. Perhaps you do not allow split-tunnel or BYOD for those reasons :) Thanks for your input, Paul _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop