Moin!

On 18 Mar 2025, at 12:39, Willem Toorop wrote:

>> First, .com is signed, so I'm not sure how you'd hijack it as a whole.
>
> With an NS revalidating resolvers this is impossible, because the 
> authoritative parent side .com NS RRset is signed.
>
> A resolver that does not do NS revalidation uses the unsigned .com NS RRset 
> from the root zone, and can as such be redirected to the kind of proxy you 
> describe below.

Every resolver that does validation even without that can totally validate any 
answer from com, so you don’t need re validation for protecting against a 
signed TLD takeover as the DS from the root authenticates it. It really doesn’t 
matter who sends you this information.  That is what DNSSEC was designed for.


>> Second, let's say I run a proxy between the .com server and your resolver, 
>> and I manipulate unsigned delegations, but forward everything else (so that 
>> things expected to DNSSEC-validate do actually validate). For my fake 
>> unsigned delegations, I make sure that my nameservers serve the same fake NS 
>> RRsets on the child apex. -- If your resolve now does NS re-validation, how 
>> does that prevent me from rewriting those unsigned delegations?
>
> It does not. And the proxy can also rewrite the delegations of signed zones, 
> by rewriting the unsigned parent side NS RRsets and glue (leaving the signed 
> DS as is).
>
> But with the latter, a DNSSEC validating NS revalidating resolver will 
> ultimately reject the rewritten referral of DNSSEC signed zones, because it 
> requires the authoritative and DNSSEC signed child side of the cut NS RRset.

Until the time the signed NS RRset points to servers that are unresponsive, and 
this is something I have seen more then once in real life. Also if the zone is 
signed it really doesn’t matter where the answer comes from and the only use 
case you may protect against is the case where
- The name servers for an unsigned zone are in another signed zone in the same 
TLD
- The attacker is on path between the resolver and the TLD, but not on the path 
between the resolver and the zones name server
This IMHO is a too small gain for the complexity re validation adds to the 
resolver.

There is nothing in the world other than DNSSEC that will protect you against 
any attacker that has full path access behind the resolver.

So long
-Ralf
———
Ralf Weber

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to