> On Apr 5, 2018, at 9:33 AM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> However, that doesn't mean that hijacking isn't a problem (though I agree a 
> less
> serious one). If I have no provisions for DNSSEC at all and the attacker does
> pin hijacking I could be offline for hours to days while I figure out how to 
> get
> and serve them.

Perhaps you did not see my explanation of why the pin imposes no obligation 
beyond
supporting the extension in the server software.  A server for an unsigned 
domain
can just serve denial of existence of the domain's (or a parent's) DS record.

So you don't need to "get and serve them", you just need to forward whatever is
the true data in DNS about the server's domain.  Only the capability to present
the actual DNS chain is required.

        * If server's zone is not DNSSEC-signed, forward NSEC records showing
          existence of NS and non-existence of DS at or above the requested:

                 _443._tcp.server-fqdn.example

          domain and the requisite signatures up to the root.

        * If server's zone is DNSSEC-signed, but no TLSA records are present, 
serve
          NSEC records proving non-existence (or NODATA) of the requested

                _443._tcp.server-fqdn.example IN TLSA ?

          records and the requisite signatures up to the root.

        * If the server's zone is DNSSEC-signed, and TLSA records are present, 
serve
          the requested TLSA records along with the requisite signatures up to 
the root.

All three of these would be obtained and cached (up to most of the advertised 
TTL) in
the same way from a suitable resolver that supports chain queries, it is up to 
that
resolver to return the appropriate response each of the above cases, the server 
can
treat the data as opaque, modulo determining the time for which it may cache the
response so that the chain need not be re-fetched for each client connection.

If one is worried about hijack by someone who can cause the domain to be signed
with TLSA records published (so as to set a non-zero pin), then one might be
motivated to have server software that is capable of returning the extension.
Just as with STS one might need software that supports TLS if the hijacker
deployed STS.  I don't think that such hijacking is a major risk, but if that
risks drives adoption of the extension (without any other changes in tbe
domain's practices wrt. DNSSEC or DANE adoption) all the better. :-)
The domain might need the extension some day for more than just hijack recovery,
and it will already be available.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to