On Wed, Apr 29, 2020 at 7:30 PM Ted Lemon <mel...@fugue.com> wrote:

> The question is, if the stub resolver can validate, and has been asked to
> validate, in that case what do we do if the CNAME is not in a secure zone?
> Your response makes it sound like you know the answer, but I don’t think
> it’s specified anywhere. So I’m asking (a) if anybody knows that is
> specified somewhere, and if so where, and (b) if it is not specified, what
> do we all think the correct answer is.
>

If there is an unsigned CNAME (or DNAME) in the path the answer, then I'm
100% sure that the answer cannot be deemed authenticated. You may be right
that this case is not clearly explained in the spec (I can't recall really,
maybe some else can quote specific text if they know). But conceptually,
DNSSEC requires you to prove an unbroken chain of authenticated signatures
from the queried name back to the trust anchor (including paths redirected
via aliases). Otherwise attackers have a trivial points (the unsigned
aliases) at which to spoof answers.

The answer obtained is still viable, just insecure. Downstream clients of
the stub that need confirmed authenticated answers (e.g. DANE) could
determine this by inspecting the AD bit in the response from the stub.

Your answer actually brings up a second, also interesting, question: if a
> stub resolver sets the DO bit, and the CNAME is not in a secure zone, but
> the answer is in a secure zone, do we set the AD bit? It looks like
> according to RFC4035, section 3.2.3, we do not. So in that case, is the
> resolver obliged to validate the answer it gets by following the CNAME? It
> can’t set the AD bit in this case, right?
>

It definitely can't set the AD bit. So, I suppose your argument is why
bother authenticating the target. That's a defensible question. It might be
reasonable behavior if the stub has no cache. But I'd expect validating
stubs to have some sort of cache to amortize the cost of extra queries and
computation. If it's caching, then the unvalidated target cannot reasonably
be returned if a subsequent query comes directly for the target, so why
would it not bother to validate it earlier.

Shumon.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to