On Fri, Aug 26, 2022 at 4:29 AM Ben Schwartz <bemasc=
40google....@dmarc.ietf.org> wrote:

>
>
> On Thu, Aug 25, 2022 at 7:19 PM Viktor Dukhovni <ietf-d...@dukhovni.org>
> wrote:
>
>> On Thu, Aug 25, 2022 at 04:35:39PM -0400, Ben Schwartz wrote:
>>
> Indeed it is a possible position to say that the Internet is not yet
>> ready for semantically distinct services seen by SVCB-aware and legacy
>> clients.
>
>
> In addition to the deployment concerns I've mentioned earlier, a
> deployment of this kind would be intrinsically insecure: a hostile
> intermediary could override the choice of which semantically distinct
> service is seen by the client.  That's another reason why this
> configuration is not permitted.
>

I don't think it is the case that it is not permitted.

Note that many/most of the cases in 3.1 do not account for one specific
permutation:

   - An apex AliasMode HTTPS record, with no prior or subsequent CNAMEs,
   and no subsequent AliasMode records, in a DNSSEC signed zone, which also
   has apex A/AAAA records. All the records in the zone are signed.
   - It is literally impossible for a hostile intermediary to selectively
   block service, without the client having the ability to detect this (if the
   client is doing DNSSEC validation itself, or if the client is asking the
   upstream DNS resolver to do DNSSEC validation and return data with the AD
   bit set).
   - If the client detects any failure (including SERVFAIL), and the Chain
   length is 1, and the DNS lookups are cryptographically protected, the
   client MUST hard-fail (per the current spec).

This particular case appears to me (and I'd argue is also proveably)
intrinsically secure.

NB: When GoDaddy begins publishing HTTPS records in customer-managed DNS
zones, it will do so only with DNSSEC signed zones, using AliasMode records
with Chain length of 1, with or without apex A/AAAA records (mostly likely
with).
(The intent of making DNSSEC widely available has previously been
discussed, so this isn't really news per se, except in the context of HTTPS
and section 3.1)

Brian
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to