[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: David Blacka <davidb@verisignlabs.com>
cc: dnssec@cafax.se
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
Date: Tue, 11 May 2004 09:57:25 -0400
In-Reply-To: Message from David Blacka <davidb@verisignlabs.com> of "Mon, 10 May 2004 18:40:52 EDT." <200405101840.52864.davidb@verisignlabs.com>
Sender: owner-dnssec@cafax.se
Subject: Re: dnssec: resolver - application communication

-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "David" == David Blacka <davidb@verisignlabs.com> writes:
    >> If CD=1 will force the security-aware-cachine-resolver to ignore
    >> that it has already failed to get b.example. NS, then great. But,
    >> I haven't experienced this kind of thing in the field.

    David> Failed to get? In your example, I assume that the resolver
    David> *got* b.example NS, but failed to validate it. CD=1 is
    David> supposed to force the security aware resolver to return what
    David> it has, regardless of security status, so if your cache did
    David> not return it, then your cache is broken.  CD=1 means, IIRC,
    David> that the resolver should go fetch it again if it didn't cache
    David> the bogus data (which it probably didn't).

  If I ask:
	c.b.example.	CD=1

  and my resolver fails to validate b.example, does it continue?

  Consider the question again from the point of view of a broken NS
(vs a broken DS).

  The reason I don't want to use CD=1 on all queries is because I don't
actually want the application (containing the stub resolver) the have to
have any crypto or anchors in it at all.  I don't want every application
to have a SASR - I want a central (system) resource to do the work.

- --
]       ON HUMILITY: to err is human. To moo, bovine.           |  firewalls  [
]   Michael Richardson,    Xelerance Corporation, Ottawa, ON    |net architect[
] mcr@xelerance.com      http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBQKDbwoqHRg3pndX9AQHINAQA212PscmunaiYI7fAjJ/pN7lk+9m+Aqm3
/HJzLqwH2g+gob2P1zT8/Yoy4f0pXHBNu+hj4Z6g0KkJ9dx0zEU24i8j+DqkBw16
WMOBG1yB1SwMUq48UyO78EEvChJySTvuI0Tua9avr504a0OYGvYT0YZlaZzpzXbz
Fz8qd1Rdtk8=
=BC8b
-----END PGP SIGNATURE-----

Home | Date list | Subject list