[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Miek Gieben <miekg@atoom.net>
Cc: dnssec@cafax.se
From: Russ Mundy <mundy@tislabs.com>
Date: Mon, 10 May 2004 11:54:33 -0400
In-Reply-To: <20040510132357.GA28493@atoom.net>
Sender: owner-dnssec@cafax.se
Subject: Re: dnssec: resolver - application communication

Hi,

It's my belief that we simply don't know enough yet about how signed zones
will be used to determine whether or not 'applications' (for some
definition of 'applications') will care about getting a response other than
SERVFAIL.  I do believe that there will be _some_ applications that want to
get more useful information than SERVFAIL especially since it is already so
overloaded that one could argue that it's not a useful response - all you
know is the _something_ didn't work right but you have no useful
information about _what_ didn't work right.

As a minimum, I believe that we will need some applications for use in
getting signed zones fielded that can provide additional information about
'what's not working' in a newly signed zone (or one that has been signed
and functioning for a while and for some reason stops working).  Some
people might call these 'tools' or 'diagnostics' for signed zone operation
and I would not disagree but I would assert that they are also applications
that need more useful responses than SERVFAIL - your example of using dig++
to find out more is a very good illustration of one such application - I
believe that we need several more applications of this type.

On a broader basis, as more zones begin to be operated as signed zones, it
is not possible for the designers, engineers and implementers (i.e., us) to
figure out in advance how people will _actually_ use this thing that we're
about to give them.  I strongly believe that we need to explore some of the
possibilities for where and how validation of responses from signed zones
can and/or should be done.  I also believe that it's much too early to
standardizing interfaces and such but we do need to keep track of what we
learn in the exploration.  (this will be especially true if we find that it
is, in fact, a bad idea for applications to do validation - if designers
believe that something's a bad idea and they don't tell (those pesky) users
the what & why that it is a bad idea, there's a much higher likelihood that
users will just do it and not understand that it's a bad idea.)

Russ

At 3:23 PM +0200 5/10/04, Miek Gieben wrote:
>Hello,
>
>[I'm using this list to start the discussion about it, rathen than
>starting a new list (i'm on too many ML already :) )]
>
>
>At the last RIPE meeting I've given a presentation on wether an application
>needs to know the security status of answers the resolver got from a secured
>DNS.  link: http://www.nlnetlabs.nl/prespub/RIPE-48/html-miek/index.html
>This is related to:
>http://www.nlnetlabs.nl/dnssec/draft-gieben-resolver.txt
>
>This essentially leads to the case whereby every application will do it's own
>validation. When you are validating DNSSEC data, it is very handy to directly
>talk to the authoritative server. Thus this, in turn, will lead to increased
>pounding on the authoritative servers on the Internet. Most notably the secure
>entry points, which will be root in some future. In short: this will most
>probably break the DNS.
>
>The other solution is to do what we do now: SERVFAIL when data is bogus, but
>then the app. doesn't know the security status. Our new thinking at labs
>is now that
>this is not that bad. DNSSEC is created to _detect_ attacks, when giving back
>SERVFAIL we indicate an attack - I don't care what kind of attack. I only need
>to know there is one going on right now. Then I can fire up my dig++ and look
>what is really happening.
>
>So basically it comes down to answering the question:
>
>      * Must applications know the security status of DNS answers? *
>
>(last week we thought: yes, now we (labs) think no)
>
>grtz,
>--Miek
>
>--
>today's fortune:
>I'll show you MY telex number if you show me YOURS ...


Home | Date list | Subject list