I have repeatedly asked for RPZ draft publication so we can extend to a new 
version of RPZ that moves the censored dnssec answer to the additional section. 
This has the advantage that:

1) dnssec validation can still be done by clients that support this on the 
withheld answer RR
2) censorship is forced to be opt-in (the real answer can still be digged out 
of censored replies)
3) rogue censoring is still flagged as rogue censorship

Paul

Sent using a virtual keyboard on a phone

> On Nov 25, 2021, at 08:37, Vladimír Čunát <vladimir.cunat+i...@nic.cz> wrote:
> 
> Hello,
> I realize this is tangential, but I believe it's important over the long term.
> 
> Any modification of DNS will break *later* DNSSEC validation.  As filtering 
> seems almost always done by DNS modification (e.g. NXDOMAIN), and I see 
> significant trends in doing filtering as a service, there's a problem that 
> DNSSEC gets crippled from the filterer onwards.
> 
> I can't realistically see moving *all* filtering use cases into end clients, 
> but I'd really hate for DNSSEC to meet the same fate and I don't think it's 
> necessary at all.  In other words, we need a model where upstream DNS service 
> is trusted with filtering but not with DNSSEC.  Now perhaps if validation was 
> done directly in a browser, it might choose that only "positive" answers get 
> validated and the rest is trusted (encrypted link etc), but generally I 
> wouldn't do that, as it would surely create some holes in DANE or elsewhere.
> 
> What we already have is SERVFAIL.  That's what validators MUST return instead 
> of the forged answer (since the beginning of DNSSEC).  And actually it does 
> the filtering job, as the SERVFAILed services won't be accessible.
> 
> With EDE (RFC 8914) indicating a few kinds of filtering, servers and clients 
> now could make some behavior better suited for these cases, around fallback 
> to other servers, maybe caching, etc. (Say, only if it came over a trusted 
> channel, based on local policy.)  I suspect there's currently still lots of 
> room for improvement on implementation side here.  And orthogonally, 
> structured-error-page or other mechanism could extend the available 
> information in these *SERVFAIL* answers and perhaps get utilized in web 
> browsers.
> 
> I do realize that SERVFAIL isn't ideal approach to blocking, but I can't 
> really see anything better (or similar) that could reconcile DNSSEC with some 
> of the common filtering use cases.
> 
> --Vladimir | knot-resolver.cz
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to