On Fri, Oct 6, 2023 at 8:54 AM Shumon Huque <shu...@gmail.com> wrote:
> On Fri, Oct 6, 2023 at 8:20 AM Bob Harold <rharo...@umich.edu> wrote: > >> >> On Thu, Oct 5, 2023 at 6:16 PM Paul Hoffman <paul.hoff...@icann.org> >> wrote: >> >>> On Sep 14, 2023, at 18:46, Tim Wicinski <tjw.i...@gmail.com> wrote: >>> >>> > We chairs heard back from the authors and we're pulling this working >>> group last call. >>> >>> We have turned in a -01 that addresses the initial comments in the WG >>> Last Call that the document had obvious labeled holes in it. One of those >>> holes had an old label on it, but the others needed filling, and we have >>> done that now. Whenever the chairs have another slot to start a WG Last >>> Call, we think this is now ready for it. >>> >>> --Paul Hoffman >>> >> >> >> https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-rfc8109bis-01 >> >> 3.3. DNSSEC with Priming Queries >> >> The second paragraph confused me: >> >> "A machine-in-the-middle attack on the priming query could direct a >> resolver to a rogue root name server. Note, however, that a validating >> resolver will not accept responses from rogue root servers if they are >> different from the real responses because the resolver has a trust anchor >> for the root and the answers from the root are signed. Thus, if there is a >> machine-in-the-middle attack on the priming query, the results for a >> validating resolver could be a denial of service, or the attacker seeing >> queries while returning good answers, but not the resolver's accepting the >> bad responses." >> >> I took me a while to understand, but something like this is what I think >> it means, a little more clearly to me: >> >> A rogue server could return the proper NS RRset and signature, but fake A >> and AAAA records, since they are not signed, which would effectively block >> access to the root zone. But when a request is made for other records in >> the root zone (like delegation NS records for a TLD, its normal role in DNS >> resolution), those records are DNSSEC signed and can be validated, so a >> rogue server can only block service, not give wrong answers that pass >> validation. >> >> Could something like that be included? >> > > I don't think that's correct. > > A priming query is for the NS RRset at the root zone. Root servers will > authoritatively answer that and return a signed root NS RRset, which can be > authenticated by resolvers. The glue records however are unsigned and could > be faked, so resolvers could still be directed to communicate with rogue > servers. But they could detect that attack after the fact, by examining the > subsequent responses from the rogue servers, and see if the parts in those > responses that should be signed are actually signed correctly. > > Note that delegation NS records in a referral response are NOT signed > (they are not authoritative data). What is signed is either a DS record > (set) proving secure delegation to a signed TLD, or an NSEC record that > proves insecure delegation to an unsigned TLD. > > I agree that the wording could be improved. I had trouble understanding > that paragraph too. > > Shumon. > > Thanks for explaining that. -- Bob Harold
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop