To:
David Blacka <davidb@verisignlabs.com>
cc:
dnssec@cafax.se
From:
Michael Richardson <mcr@sandelman.ottawa.on.ca>
Date:
Tue, 11 May 2004 09:57:25 -0400
In-Reply-To:
Message from David Blacka <davidb@verisignlabs.com> of "Mon, 10 May 2004 18:40:52 EDT." <200405101840.52864.davidb@verisignlabs.com>
Sender:
owner-dnssec@cafax.se
Subject:
Re: dnssec: resolver - application communication
-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "David" == David Blacka <davidb@verisignlabs.com> writes:
>> If CD=1 will force the security-aware-cachine-resolver to ignore
>> that it has already failed to get b.example. NS, then great. But,
>> I haven't experienced this kind of thing in the field.
David> Failed to get? In your example, I assume that the resolver
David> *got* b.example NS, but failed to validate it. CD=1 is
David> supposed to force the security aware resolver to return what
David> it has, regardless of security status, so if your cache did
David> not return it, then your cache is broken. CD=1 means, IIRC,
David> that the resolver should go fetch it again if it didn't cache
David> the bogus data (which it probably didn't).
If I ask:
c.b.example. CD=1
and my resolver fails to validate b.example, does it continue?
Consider the question again from the point of view of a broken NS
(vs a broken DS).
The reason I don't want to use CD=1 on all queries is because I don't
actually want the application (containing the stub resolver) the have to
have any crypto or anchors in it at all. I don't want every application
to have a SASR - I want a central (system) resource to do the work.
- --
] ON HUMILITY: to err is human. To moo, bovine. | firewalls [
] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[
] mcr@xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys
iQCVAwUBQKDbwoqHRg3pndX9AQHINAQA212PscmunaiYI7fAjJ/pN7lk+9m+Aqm3
/HJzLqwH2g+gob2P1zT8/Yoy4f0pXHBNu+hj4Z6g0KkJ9dx0zEU24i8j+DqkBw16
WMOBG1yB1SwMUq48UyO78EEvChJySTvuI0Tua9avr504a0OYGvYT0YZlaZzpzXbz
Fz8qd1Rdtk8=
=BC8b
-----END PGP SIGNATURE-----