On Apr 29, 2020, at 6:56 PM, Shumon Huque <shu...@gmail.com> wrote:
> I believe a validating resolver always sets the DO-bit in outbound queries. 
> The answer in your example can't be authenticated (i.e. no AD bit can be set) 
> because not all the answers (namely the CNAME) in the response have been 
> authenticated (per RFC 4035, Section 3.2.3).
> 
> But a resolver would still authenticate the RR type at the signed target of 
> the CNAME (assuming the target has an unbroken chain to the trust anchor), 
> and record that RRset as authenticated. Otherwise, if it later received a 
> query directly for the target name/type, it could not return the answer that 
> it incorrectly didn't bother to authenticate.

Maybe the embedded assumption I’m making here wasn’t clear. I’m talking about a 
stub resolver implementation. I think that all stub resolvers should be able to 
be asked to do validation, and should do validation if asked. You could argue 
that they should be required to do it, but I don’t think we’re there yet, and 
I’m probably a bit in the rough on requiring resolvers to do validation if 
asked.

The question is, if the stub resolver can validate, and has been asked to 
validate, in that case what do we do if the CNAME is not in a secure zone?  
Your response makes it sound like you know the answer, but I don’t think it’s 
specified anywhere. So I’m asking (a) if anybody knows that is specified 
somewhere, and if so where, and (b) if it is not specified, what do we all 
think the correct answer is.

Your answer actually brings up a second, also interesting, question: if a stub 
resolver sets the DO bit, and the CNAME is not in a secure zone, but the answer 
is in a secure zone, do we set the AD bit? It looks like according to RFC4035, 
section 3.2.3, we do not. So in that case, is the resolver obliged to validate 
the answer it gets by following the CNAME? It can’t set the AD bit in this 
case, right?

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to