On 17 Mar 2017, at 9:31, Wei Chuang wrote:

On Thu, Mar 16, 2017 at 10:25 AM, Paul Hoffman <[email protected]>
wrote:

On 16 Mar 2017, at 10:09, Wei Chuang wrote:

I saw there was significant interest
<http://blog.huque.com/2014/07/dnssec-key-transparency.html> in exploring CT for DNSSEC back in 2014 of which a draft draft-zhang-trans-ct-dnssec <https://tools.ietf.org/html/draft-zhang-trans-ct-dnssec-03> was created. It seems to have quieted down since. I believe the motivation is still there which is to prevent a parent zone from potentially misbehaving and spoofing the child zone. Is there still interest in this? From the list archives, I can't see what the issues were though I'm guessing one of them was respecifying the DS resource record to use a SCT which might have
caused compatibility concerns.  (But please correct me if I'm wrong)
Other
than that, the draft seems pretty reasonable. Were there other concerns?


There were two separate issues that got conflated at the time:

- Seeing evidence that a parent had spoofed DNSSEC keys for a child. A transcript of the DS records in the parent is sufficient as long as the
child doesn't have relying parties create islands of trust (which is
relatively rare these days).

- Seeing evidence that a parent had spoofed any resource records for a
child. A transcript of the NS records in the parents is a good start,
although what is really needed is a transcript of everything that is seen
for the child.


Is this because you're worried about the parent removing evidence of DNSSEC
for the child in the spoofing scenario?

No, this is because the parent can spoof any data for the child. It is unrelated to DNSSEC.

If the parent tries to spoof with
DNSSEC for the child I would assume that seeing the DS SCT's in the log,
that is sufficient to find evidence of spoofing.  That said I think it
could be helpful to log NS as well for forensics.

Transcripts are useful even when the logged data is not cryptographic.

One issue with logging all records seen is if webmail providers publish SMIMEA there will be a potentially overwhelming number of records logged,
and a very large change rate.

Don't log what you can't log due to scale.

Another issue is privacy of such records.

Sure, but there are unpredictable privacy issues with lots of DNS record data. It's not possible for us to predict what will and will not be considered private information now or in the future for anyone other than ourselves.

In both cases, having transcripts from various DNS looking glasses around
the Internet would give greater assurance of the integrity of the
transcript.


I agree that would a good idea.

--Paul Hoffman

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to