On 3/18/25 10:21, Philip Homburg wrote:
I offered **two** alternatives to ns-revalidation draft:

A. I-D.fujiwara-dnsop-resolver-update

- attacks listed in ns-revalidation draft section 8.3 are not
applicable - zero additional cost in term of queries - easier to
operate/debug because parent-child NS mismatch suddenly does not
influence resolution algorithm - unilateral code-change in resolvers,
i.e. doable in the same time-frame as ns-revalidation

Maybe you can explain this a bit more?

I-D.fujiwara-dnsop-resolver-update has the following:
- Separate the cache into "authoritative data cache" and "delegation cache".

   This suggests to me that a serious mismatch between parent and child will
   also cause problems. May I missed something.

The child NS version will be ignored by recursive resolution algorithm so any mismatch will not affect the result.

Can you describe the problem you have in mind?


- "Step 4.b." is changed as if the response contains a better delegation to
   other servers, cache the delegation information into delegation cache,"

   This seems to rely on auth. servers including delegation information in
   answers to queries. When happens if replies are minimized?

I think there is some confusion. Here's
git diff --word-diff rfc1034 I-D.fujiwara-dnsop-resolver-update
on these two paragraphs between RFC 1034 section 5.3.3 and this I-D:
---------
b. if the response contains a better delegation to other servers, cache the delegation [-information,-]{+information into delegation cache,+} and go to step 2
---------

Are you suggesting that RFC 1034 section 5.3.3 does not work with minimized answers? Probably not.

This behavior is implemented and deployed at scale by Akamai & Google Public resolver, so I guess if there was a massive fallout we would have heard by now.

But the big one seesm to be, this does not use DNSSEC protection for name
servers. The draft says:

"The update does not effect to DNSSEC [RFC4033] [RFC4034] [RFC4035] because
DNSSEC validates authoritative data and does not validate referrals."

The whole point is that the child-side NS RRset can be validated with DNSSEC
as well as any A/AAAA RRsets for the name servers.

I agree this is technical weak point.

Having said that, it does not affect integrity protection provided by DNSSEC for authoritative data. In other words, an attacker is not able to spoof authoritative answers from a signed domain. The best an attacker can do is to spy by redirecting traffic, but well, if we are after a real confidentiality DELEG is needed. Revalidation would provide us with a complex band-aid, not a real solution.

I think we disagree in value judgement about this. I'm saying that I-D.fujiwara-dnsop-resolver-update is so much simpler and with much better behavior overall, compared to re-validation, so I'm willing to accept this weak point.


In addition I-D.fujiwara-dnsop-resolver-update seems vulnerable to ghost-domain
attacks.

GHOST attack depends on child-side NS manipulation, and child-side is not used at all for resolution by resolvers implementing this I-D. I can't see how it could possibly be affected. On the contrary, this change prevents GHOST from working!

Can you describe the mechanism you have in mind?

--
Petr Špaček
Internet Systems Consortium

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to