To:
dnssec@cafax.se
From:
Michael Richardson <mcr@sandelman.ottawa.on.ca>
Date:
Thu, 13 May 2004 13:21:50 -0400
In-Reply-To:
Message from Edward Lewis <edlewis@arin.net> of "Thu, 13 May 2004 12:19:19 EDT." <a0602040cbcc9499ef96a@[192.136.136.83]>
Sender:
owner-dnssec@cafax.se
Subject:
a view from an application person
-----BEGIN PGP SIGNED MESSAGE----- >>>>> "Edward" == Edward Lewis <edlewis@arin.net> writes: Edward> applications community. To keep this short, I'd think about Edward> approaching the Apps AD's (Scott Hollenbeck and Ted Hardy) Edward> to see if there's something architectural to say about this Edward> topic. I.e., where are the IETF applications efforts going It might work. It might be too high level. Much work is off in XML land at this point. Edward> The question above is not binary. Under the principle of Edward> "don't tell me anything I can't deal with" it's a waste to Edward> over inform applications that can't use the information. Edward> Under the principle of "I need to know how to react in a Edward> crisis" there's a need to reveal as much as possible. These Edward> principles contradict, and applications individually adhere Edward> differently to them. Those are two arms of a spectrum, not a binary choice. Edward> An application ought to know strictly whether it got the Edward> info from DNS or not. If an application cares how DNS Edward> arrived at the answer, then the application has assumed a Edward> debugging role. I stop thinking of the application as an I strongly disagree. We complain loudly when applications put up a nice box on user's screens which say, "FAILED", yet this is what you are advocating. This is why IT support costs are so high - the user can't make intelligent decisions about any of this data, because they aren't given any information. Edward> This can be done by examining the logs or by some Edward> interactive approach, such as performing a "verbose Edward> reporting of the validation chain." WHAT LOGS? where are they? Think about it. Why do you think I want to have audit information returned on every request? SO THAT IT CAN GO INTO THE LOGS. Edward> I haven't gotten to operations and operators yet. These Edward> groups essentially rely on the debugging information. Say Edward> IT is hit with "why does ssh bank.example.com not work - it Edward> says DNS failure". The answer is for the IT department be Edward> able to determine what resolver returned the error and then Edward> have access to the resolver to check the logs. No, IT department says "works for me, reboot your computer". The relevant logs for them to look at are: a) on the end-user's computer (best case), in the local caching, recursive resover's log file. b) on the IT department's recursive resolver (assuming they can figure out which resolv.conf equivalent was used) c) on the end-user's ISP's resolver. d) on the Linksys gateway box at the no-name coffee shop's hotspot. Let's take the case where the signature appears to have expired. There are three reasons I can think of for this: 1) the signature really has expired in the primary 2) there is some blockage preventing all caches from getting newer data that is signed wrong. 3) the clock on the machine doing the verification is wrong. #3 is the MOST likely reason. Particulary when the security aware local caching name server is on the end-user's laptop. How does IT guy find that out? Tell the end-user to run "dig"? I think not. Ask them to click on the "email details to IT" button on the dialogue? I think so. Ed might answer, "but that is the debugger application" - but I disagree. It isn't. It is a bunch of information that got captured as a text file and got emailed. (or printed. Maybe email doesn't work as a result) Edward> I'd settle for much clear logs out of the BIND validator Edward> right now. If the logs were better, I think the problem Edward> ahead for applications would be clearer. 'Course, I'm not That works for you and I. It doesn't work in general. Edward> PS - About SERVAIL. I've argued that it's overloaded to the Edward> detriment of debugging in workshops. I've found that I can Edward> easily separate DNSSEC SERVAILs from DNS SERVFAILs by doing Edward> a "dig ... +norec" - i.e., by using a debugging tool already I don't care about SERVFAIL vs NOTVAL or whatever. It isn't a question about 1 bit vs 5. I just want additional information returned in all cases. - -- ] ON HUMILITY: to err is human. To moo, bovine. | firewalls [ ] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[ ] mcr@xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[ ] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) Comment: Finger me for keys iQCVAwUBQKOurIqHRg3pndX9AQFlcwQAhlnQGfzOQ/IgdJNrbxL01PxSI7fbJx/T tn8TyHJq+eV/WrTIRswtZH+P4ShExvE5jGjOE0bxYeJvrXey81FunsPM+7Sjp3Ta yQt2sCHHKs8VcjyoCerx01p304K8qfyVcOFAeslZ1RPbU8CAYMFuISXy6T/LpVEJ xeKRId/5IkU= =jhRf -----END PGP SIGNATURE-----