>Yes, I don't think it's even possible to completely solve on resolver >side. But the parent-only approach would be more predictable. Every >(conforming) resolver would see the same NS set, modulo TTL expiration. > >Because it wouldn't depend on whether it has fetched a child NS *and* >from a "correct" child auth. (Say, if you forgot a wrong server in the >parent, I assume that server may very well serve you a wrong NS rrset.)
The problem I see is the following: Suppose we have a parent-centric resolver that will never consider the child NS RRset. We assume that an attacker has somehow managed to subvert the priming query for the root zone and take over queries that go to the root zone. Now a parent-centric resolver will be at the mercy of the attacker. Obviously the attacker cannot forge DNSSEC-signed data. But all unsigned zones can be controlled by the attacker. Suppose we have another resolver that for DNSSEC-signed zones will query (and validate) the child NS RRset and use that RRset instead. Then the attacker would have to subvert queries to those nameservers as well. Just subverting the root priming query would not be enough. This is a question of attack model. If we say that this attack model is unrealistic, then we should document that somewhere. And explcitly say that those types of attacks will not be considered by the wg.
_______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org