Re: [DNSOP] Privacy and DNSSEC

2020-04-29 Thread Shumon Huque
On Wed, Apr 29, 2020 at 12:49 AM Paul Vixie wrote: > On Wednesday, 29 April 2020 01:17:04 UTC Shumon Huque wrote: > > ... > > > > Paul - I guess I'm missing some background here. In what sense did > > getting DS working throw validating stubs overboard? Do you mean it > > took the focus away from

Re: [DNSOP] Call for Adoption: draft-pwouters-powerbind

2020-04-29 Thread Daniel Migault
My understanding of the draft is that it attempts to prevent a key to sign a RRset it is not necessarily authoritative for. I think the WG should work on this, and support adoption of the draft. I am happy to review further version of the draft. Yours, Daniel On Tue, Apr 28, 2020 at 4:27 PM Wes Ha

Re: [DNSOP] Privacy and DNSSEC

2020-04-29 Thread Paul Wouters
On Wed, 29 Apr 2020, Paul Vixie wrote: no. i mean that the decision to require a "clear path" for DNSSEC meant that no DNSSEC-dependent application has ever received investment. for example, DANE is interesting in the SMTP market because that's small and geeky, but will never be adopted by the W

Re: [DNSOP] Privacy and DNSSEC

2020-04-29 Thread Shumon Huque
On Wed, Apr 29, 2020 at 11:34 AM Paul Wouters wrote: > On Wed, 29 Apr 2020, Paul Vixie wrote: > > > no. i mean that the decision to require a "clear path" for DNSSEC meant > that > > no DNSSEC-dependent application has ever received investment. for > example, > > DANE is interesting in the SMTP m

Re: [DNSOP] Privacy and DNSSEC

2020-04-29 Thread Shumon Huque
to the list, after Paul Wouters replied to me privately. I realize now this was Paul W responding to Paul V. I thought in my response below I was replying again to Paul V! My apologies .. Shumon. On Wed, Apr 29, 2020 at 11:45 AM Shumon Huque wrote: > On Wed, Apr 29, 2020 at 11:34 AM Paul Wout

Re: [DNSOP] New draft on delegation revalidation

2020-04-29 Thread Daniel Migault
Hi, I discovered this draft during the interim meeting. We had similar thoughts in our "Recommendations for DNSSEC Resolvers Operators". Our motivation for supporting this work are that it 1) improves the reliability of the resolution as well as 2) removes the temptation to (inadvertently) break

Re: [DNSOP] Call for Adoption: draft-pwouters-powerbind

2020-04-29 Thread Tim Wicinski
Following up on Petr's suggestion that the "DNSEC Transparency" mechanism is documented and somewhat tested. I totally agree on this idea and can assure the WG that if this draft is adopted, this will be one of the conditions on progressing forward. tim On Thu, Apr 23, 2020 at 1:46 AM Petr Špač

Re: [DNSOP] Call for Adoption: draft-pwouters-powerbind

2020-04-29 Thread Linus Nordberg
Tim Wicinski wrote Mon, 20 Apr 2020 14:03:03 -0400: > This starts a Call for Adoption for draft-pwouters-powerbind I am interested in the idea of a DNSSEC transparency system, i.e. externally verifiable append-only logs of observed DNSSEC data, and do support adoption of draft-pwouters-powerbind

[DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Ted Lemon
Is there an RFC or draft that talks about what the right thing is to do when an unsigned CNAME points to a record in a signed zone? That is, suppose we are doing validation. The CNAME doesn’t validate, because it’s not signed. When we look up the record the CNAME points to, do we set the DO bit

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Shumon Huque
On Wed, Apr 29, 2020 at 5:50 PM Ted Lemon wrote: > Is there an RFC or draft that talks about what the right thing is to do > when an unsigned CNAME points to a record in a signed zone? That is, suppose we are doing validation. The CNAME doesn’t validate, > because it’s not signed. When we look u

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Mark Andrews
> On 30 Apr 2020, at 07:50, Ted Lemon wrote: > > Is there an RFC or draft that talks about what the right thing is to do when > an unsigned CNAME points to a record in a signed zone? > > That is, suppose we are doing validation. The CNAME doesn’t validate, because > it’s not signed. When we

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Ted Lemon
On Apr 29, 2020, at 6:56 PM, Shumon Huque wrote: > I believe a validating resolver always sets the DO-bit in outbound queries. > The answer in your example can't be authenticated (i.e. no AD bit can be set) > because not all the answers (namely the CNAME) in the response have been > authenticat

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Ted Lemon
On Apr 29, 2020, at 7:27 PM, Mark Andrews wrote: > provably insecure: proved no DS records at a delegation at or above the > name, proved that there are only > unsupported algorithms in the DS RRset at a delegation at or above the > name, not under a trust-anchor. When I’m talking about

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Michael StJohns
On 4/29/2020 5:50 PM, Ted Lemon wrote: Is there an RFC or draft that talks about what the right thing is to do when an unsigned CNAME points to a record in a signed zone? That is, suppose we are doing validation. The CNAME doesn’t validate, because it’s not signed. When we look up the record t

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Shumon Huque
On Wed, Apr 29, 2020 at 7:30 PM Ted Lemon wrote: > The question is, if the stub resolver can validate, and has been asked to > validate, in that case what do we do if the CNAME is not in a secure zone? > Your response makes it sound like you know the answer, but I don’t think > it’s specified any

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Shumon Huque
On Wed, Apr 29, 2020 at 8:02 PM Michael StJohns wrote: > See this chain > https://mailarchive.ietf.org/arch/msg/dnsext/_kxMmGeBUI8OW03tWlcgcCW9QlU/ > (Yup - 12 years ago). > > I don't think I ever managed to convince anyone this was a problem. > Mike, perhaps there was some confusion on this poi

Re: [DNSOP] Call for Adoption: draft-pwouters-powerbind

2020-04-29 Thread John Levine
In article you write: > >My understanding of the draft is that it attempts to prevent a key to sign >a RRset it is not necessarily authoritative for. If that's what it means, that's what it should say. As I read it, the flag it defines says that the zone will only sign NS and DS and perhaps th

Re: [DNSOP] Fun with draft-pwouters-powerbind

2020-04-29 Thread Viktor Dukhovni
On Tue, Apr 28, 2020 at 06:26:54PM -0400, John Levine wrote: > I think we will find that the assumption that TLD zone files are > delegation-only does not hold up very well in practice, so I am > wondering how useful a hack to technically enforce it would really be. There are indeed some TLDs whi

Re: [DNSOP] Validating responses when following unsigned CNAME chains...

2020-04-29 Thread Brian Somers
On Apr 29, 2020, at 7:12 PM, Shumon Huque wrote: > Mike, perhaps there was some confusion on this point 12 years ago, but > deployed validator code all agree on what the state is. I encourage > implementers to confirm (or correct me if I misstate something). Absolutely. You only get the AD bit

Re: [DNSOP] Fun with draft-pwouters-powerbind

2020-04-29 Thread Paul Wouters
> On Apr 29, 2020, at 23:39, Viktor Dukhovni wrote: > >  > For example, the spec could exclude domain > names that start with "_" or "_sentinel". And the sentinel names could > then all live there. It already does, because the _prefix really belongs to the domain and is never a delegation.

Re: [DNSOP] Fun with draft-pwouters-powerbind

2020-04-29 Thread Viktor Dukhovni
> On Apr 29, 2020, at 11:46 PM, Paul Wouters wrote: > >> For example, the spec could exclude domain >> names that start with "_" or "_sentinel". And the sentinel names could >> then all live there. > > It already does, because the _prefix really belongs to the domain and is > never a delegatio