[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: dnssec@cafax.se
cc: malin@sunet.se, adrian@sunet.se, jocke@sunet.se
From: Måns Nilsson <mansaxel@sunet.se>
Date: Fri, 11 Jan 2002 13:21:27 +0100
Content-Disposition: inline
Sender: owner-dnssec@cafax.se
Subject: Zone transfers in DNSSEC.

Hi,

I have a question wrt secure zone transfers. The usual word -- as I recall
-- on securing them seems to be that one should use TSIG to protect them,
because DNSSEC in itself does not help with this specific situation; no
validation is done. 

And this concurs with my tests of BIND 9.2.0[0].

But, on reading RFC 2535 I notice this passage:

5.6 Zone Transfers

   The subsections below describe how full and incremental zone
   transfers are secured.

   SIG RRs secure all authoritative RRs transferred for both full and
   incremental [RFC 1995] zone transfers.  NXT RRs are an essential
   element in secure zone transfers and assure that every authoritative
   name and type will be present; however, if there are multiple SIGs
   with the same name and type covered, a subset of the SIGs could be
   sent as long as at least one is present and, in the case of unsigned
   delegation point NS or glue A or AAAA RRs a subset of these RRs or
   simply a modified set could be sent as long as at least one of each
   type is included.

and a bit further down:

5.6.1 Full Zone Transfers

   To provide server authentication that a complete transfer has
   occurred, transaction authentication SHOULD be used on full zone
   transfers.  This provides strong server based protection for the
   entire zone in transit.


So, what is the word? 
-- 
Måns Nilsson            Systems Specialist
+46 70 681 7204         KTHNOC
                        MN1334-RIPE

[0] This is how I tested:

* Set up zone on master, create keys, (self-)sign. 

* Transfer zone key to slave OOB, include as trusted in named.conf, 
  set up slave zone directive, reload. 

* modify the signed zone on the master, ie tamper with it, and reload. 

(Now the SIGs shouldn't validate, right?)

* Stop the slave, remove the backup file, and start again.

* Watch a zone transfer being made from the master to the slave. 

* Query the slave for a known tampered-with record, and get an AA 
  response back. AXFRen also work. 

In my little head;) this looks like the slave skips checking on AXFRen? 

Home | Date list | Subject list