On Thu, Jul 27, 2023 at 2:49 PM Brian Dickson <brian.peter.dick...@gmail.com>
wrote:

>
>
> On Tue, Jul 25, 2023 at 10:59 PM Viktor Dukhovni <ietf-d...@dukhovni.org>
> wrote:
>
>> On Tue, Jul 25, 2023 at 08:19:21PM -0700, Brian Dickson wrote:
>>
>> > At the name that does not exist, generate and sign (on the fly) a CNAME
>> > record with RDATA of something like "nxname.empty.as112.arpa" (or
>> something
>> > functionally equivalent).
>>
>> Sadly, this reports that the CNAME *target* does not exist, but the name
>> in question certainly does (it holds a CNAME).  This also does not
>> exclude the existence of subdomains of the name (which NXDOMAIN does,
>> when one isn't bending over backwards to interoperate with servers that
>> return NXDOMAIN for ENTs!).
>>
>> Also, with the target zone unsigned, the response is subject to forgery,
>> returning real data for the target.
>>
>> > Only one signature is required, since there is an answer, rather than
>> just
>> > an NSEC(3) with bitmap.
>>
>> Does it mollify the folks who want an NXDOMAIN signal?  I guess it is
>> not obviosly worse than an apparent NODATA, and the target could even
>> be a fixed non-existent name in a suitable zone under control of the
>> signer, which would have a real (signed) NXDOMAIN proof, avoiding
>> an unsigned target in as112.  But I remain sceptical about the wisdom
>> of such a design.
>>
>> > ENTs are distinguishable (they would get the current ENT response of
>> > NSEC/RRSIG bit map)
>>
>> Well current, by the book, ENT response is NOT NSEC/RRSIG (unless you
>> mean current compact denial rule-bending behaviour).
>>
>> Rather for a standard ENT, we have:
>>
>>     enszzz.example. IN aaa.ent.example. IN NSEC NSEC RRSIG A ...
>>
>> The ENT is just an ancestor of the "next" name in a covering NSEC
>> record.
>>
>> > Am I incorrect in the asserted behavior of such a synthesized CNAME
>> > (and that it would match the requirements)?
>>
>> It would be a stretch.  Mind you, with a target in globally shared zone,
>> caching of its non-existence saves followup queries for all zone using
>> the scheme.  If the target is signed and has a long negative TTL,
>> efficiency is retained, but it we don't get "nothing below" semantics,
>> and with some auths mixing CNAME and other data, don't even necessarily
>> conclude there's no other data at the name.
>>
>
>
Never mind, I was wrong. Please ignore.

(non-apex BNAME might have been a good thing, combining CNAME+DNAME).

Brian



> Hmmm... I think I have a solution (which is an even uglier hack), which
> does all of the above PLUS the nothing-below semantics (I think).
> The added bonus is it lowers the bar for auth implementers (I think?).
> It goes against the letter of rfc4592, but because the target is intended
> to be an empty zone, the coherence problem becomes moot.
>
> The idea is to add to each zone served by the CDoE provider, the following
> record (relative to the owner name of the zone):
> * DNAME signed_providers_own_empty_zone.example
>

> This still has the single signature benefit.
> It's cacheable.
> The cost of also returning the empty zone SOA denying all children (plus
> signatures) gets to be amortized over all the responses from each resolver
> (modulo TTL obviously).
> Since the DNAME targets always result in NXDOMAIN, the signal is preserved
> (or resurrected).
> Since the results are ALWAYS going to be NXDOMAIN no matter how resolvers
> do the rewriting, the incoherence is moot.
> It has the side effect of generating CNAMEs too, I think, so fully
> backward compatible to anything really ancient.
> Yes, it is incredibly ugly and hacky.
> And yes, I managed to drag DNAME into one of my wonky solutions. :-)
>
> But seriously, I think it might be workable, if the CDoE implementers can
> live with it (or can generate those on-the-fly).
> The add-to-zone method avoids needing to write any software, and reduces
> the signatures needed in answers, so possibly even of use to the non-CDoE
> situations.
>
> Brian
>
>
>>
>> So I am disinclined to go there, barring lots of evidence that it
>> actually satisfies the various motivating use-cases and has broad
>> support.
>>
>> --
>>     Viktor.
>>
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to