On 4/29/2020 5:50 PM, Ted Lemon wrote:
Is there an RFC or draft that talks about what the right thing is to do when an 
unsigned CNAME points to a record in a signed zone?

That is, suppose we are doing validation. The CNAME doesn’t validate, because 
it’s not signed. When we look up the record the CNAME points to, do we set the 
DO bit? Do we validate the answer? Or do we assume that because the CNAME isn’t 
signed, we don’t need to validate what it points to?

I think the answer is that we validate, but I’m curious to know what others 
think of this.

_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop


See this chain https://mailarchive.ietf.org/arch/msg/dnsext/_kxMmGeBUI8OW03tWlcgcCW9QlU/ (Yup - 12 years ago).

I don't think I ever managed to convince anyone this was a problem.

If you've got a validated CNAME, that points into an unsecured zone, then your state is probably Unsecure (if you treat it similar to a secure delegation to an unsigned zone) or Unknown.

If you've got an securely insecure (e.g. delegation was to an insecure zone at some point) CNAME that points into a secure zone, I would say your result is probably Bogus  or Unsecure as you haven't any way to evaluate trust.  I don't think you can bootstrap security this way.

Mike


_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to