On 8.4.2014 15:20, Edward Lewis wrote:
From the linked message:
Let me quote very first part of the message to put it into context:
People start to disagree when it comes to questions like "Is it feasible to
rely on a local validating resolver in the near future? How can applications
detect that a validating resolver is not configured and that DNS responses
can't be trusted?"
Aim of the proposal below is to enable applications to stay safe on systems
>>>>>>>> without a validating resolver.
In other words, we are looking for a way how to augment current APIs to move
DNSSEC-related knobs from applications to system-wide level (so you don't need
to tweak OpenSSH config and Postfix config separately, for instance).
1) DNS-Architecturally speaking, this statement is incorrect:
*Local validating resolver is strongly recommended.*
What is needed is:
*Local validator is strongly recommended.*
Well, this is better:
*Local validator is required.*
Or "local validation is required in order to assess the level of trust in what
is received”. If the goal is being able to trust what is received, you have to have
validation, it’s not just a good idea.
Sure, I think that nobody opposes that. The problem is more about "How can an
application detect that validating resolver is in place?"
Note that this proposal is about declaring that answer is untrusted, never the
other way around. Declaring answer as trusted is *always* done by validator.
2) /etc/sresolv.conf.
- System-wide configuration format (e.g. modify resolv.conf vs. add a new file)
In 1998 I used “/etc/sresolv.conf” in the first prototype validator. It had
configuration lines for trust anchors and all the rest of /etc/resolv.conf.
There’s no reason you can’t reuse the existing file or soft link (/etc/resolv.conf
-> ../var/run/resolv.conf)
3) As far as AD bit stripping….
The question to ask is whether you trust the stub resolver’s (set of) sources
or not. If you trust the sources for all things other than DANE, why not trust
them for DANE too? Conversely, if you don’t trust them for DANE, why trust the
sources for anything?
One can view DNSSEC as a standalone application. The “server” is the dnssec
signer, the “client” is the validator. Those two act like IPSEC tunnel
endpoints.
Sure. The question is "How can an application detect that the IPSEC tunnel is
in place?"
I hope this clarifies purpose of the proposal.
Have a nice day!
Petr Spacek @ Red Hat
> What goes in one comes out the other unmolested. The fact that “below” the
DNSSEC plane is plain old DNS is irrelevant. I could take the results of the
signer and FTP them to the validator, rsync them, etc. DNSSEC only allows the
validator to determine if what it got was produced by an authorized(-by-the
DNS-zone-administrator) signer, operated in an authorized manner.
It is (or was) possible to tweak the DNSSEC to have the signer be in the hands
of whomever is responsible for DANE but not the DNS. That would be by
attaching RRSIGs generated by keys that are identified as DANE-not-DNS. (This
is in the concept, don’t know if it is in the software anymore.)
On Apr 8, 2014, at 7:38, Petr Spacek <[email protected]> wrote:
On 4.4.2014 00:42, Paul Hoffman wrote:
On Apr 3, 2014, at 2:50 PM, Andrew Sullivan<[email protected]> wrote:
On Thu, Apr 03, 2014 at 05:39:58PM -0400, Suzanne Woolf wrote:
operated on Internet networks. This will include root zone
name servers, TLD name servers, name servers for other DNS
zones, iterative DNS resolvers, and recursive DNS resolvers.
Is there a reason to call out these particular functions, or not to
include something like, "or any other resolver or server functioning
as part of the global DNS"? I'm just worried, for instance, that
stubs don't appear there, even though there might be advice I can
imagine the WG providing.
+1 to at least calling out stub resolvers, but Andrew's non-list formulation is
better.
I agree that including stub-resolvers and other DNS-related software sounds
like a good idea.
There were long threads about DNSSEC handling in stub-resolvers on dane-list
[0] but dnsop seems like a better place to discuss this matter.
Note that this discussion is not over so we can move it to dnsop if dnsop
agrees.
[0] http://www.ietf.org/mail-archive/web/dane/current/msg06658.html
--
Petr Spacek @ Red Hat
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop