On Thu, Oct 5, 2023 at 6:16 PM Paul Hoffman <paul.hoff...@icann.org> wrote:
> On Sep 14, 2023, at 18:46, Tim Wicinski <tjw.i...@gmail.com> wrote: > > > We chairs heard back from the authors and we're pulling this working > group last call. > > We have turned in a -01 that addresses the initial comments in the WG Last > Call that the document had obvious labeled holes in it. One of those holes > had an old label on it, but the others needed filling, and we have done > that now. Whenever the chairs have another slot to start a WG Last Call, we > think this is now ready for it. > > --Paul Hoffman > https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-rfc8109bis-01 3.3. DNSSEC with Priming Queries The second paragraph confused me: "A machine-in-the-middle attack on the priming query could direct a resolver to a rogue root name server. Note, however, that a validating resolver will not accept responses from rogue root servers if they are different from the real responses because the resolver has a trust anchor for the root and the answers from the root are signed. Thus, if there is a machine-in-the-middle attack on the priming query, the results for a validating resolver could be a denial of service, or the attacker seeing queries while returning good answers, but not the resolver's accepting the bad responses." I took me a while to understand, but something like this is what I think it means, a little more clearly to me: A rogue server could return the proper NS RRset and signature, but fake A and AAAA records, since they are not signed, which would effectively block access to the root zone. But when a request is made for other records in the root zone (like delegation NS records for a TLD, its normal role in DNS resolution), those records are DNSSEC signed and can be validated, so a rogue server can only block service, not give wrong answers that pass validation. Could something like that be included? -- Bob Harold
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop