Op 18-03-2025 om 05:46 schreef Peter Thomassen:
Hi Willem,

On 3/17/25 23:16, Willem Toorop wrote:
- For signed delegations, NS revalidation protects the privacy of the actual query.

And in addition to that prevents all unsigned parts of the hijacked zone to be rewritten. For example if com is hijacked, unsigned zones like google.com can be redirected.

First, .com is signed, so I'm not sure how you'd hijack it as a whole.

With an NS revalidating resolvers this is impossible, because the authoritative parent side .com NS RRset is signed.

A resolver that does not do NS revalidation uses the unsigned .com NS RRset from the root zone, and can as such be redirected to the kind of proxy you describe below.

Second, let's say I run a proxy between the .com server and your resolver, and I manipulate unsigned delegations, but forward everything else (so that things expected to DNSSEC-validate do actually validate). For my fake unsigned delegations, I make sure that my nameservers serve the same fake NS RRsets on the child apex. -- If your resolve now does NS re-validation, how does that prevent me from rewriting those unsigned delegations?

It does not. And the proxy can also rewrite the delegations of signed zones, by rewriting the unsigned parent side NS RRsets and glue (leaving the signed DS as is).

But with the latter, a DNSSEC validating NS revalidating resolver will ultimately reject the rewritten referral of DNSSEC signed zones, because it requires the authoritative and DNSSEC signed child side of the cut NS RRset.

-- Willem


NS revalidation of signed delegations is the only mitigation that protects against on-path or partly on-path attacks.

Given the above, I just don't understand that. I hope I'll see the light! :-)

Cheers,
Peter

Attachment: OpenPGP_0xE5F8F8212F77A498_and_old_rev.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to