[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: dnssec@cafax.se
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
Date: Thu, 13 May 2004 13:21:50 -0400
In-Reply-To: Message from Edward Lewis <edlewis@arin.net> of "Thu, 13 May 2004 12:19:19 EDT." <a0602040cbcc9499ef96a@[192.136.136.83]>
Sender: owner-dnssec@cafax.se
Subject: a view from an application person

-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "Edward" == Edward Lewis <edlewis@arin.net> writes:
    Edward> applications community.  To keep this short, I'd think about
    Edward> approaching the Apps AD's (Scott Hollenbeck and Ted Hardy)
    Edward> to see if there's something architectural to say about this
    Edward> topic.  I.e., where are the IETF applications efforts going

  It might work. It might be too high level.
  Much work is off in XML land at this point.

    Edward> The question above is not binary.  Under the principle of
    Edward> "don't tell me anything I can't deal with" it's a waste to
    Edward> over inform applications that can't use the information.
    Edward> Under the principle of "I need to know how to react in a
    Edward> crisis" there's a need to reveal as much as possible.  These
    Edward> principles contradict, and applications individually adhere
    Edward> differently to them.

  Those are two arms of a spectrum, not a binary choice.
  
    Edward> An application ought to know strictly whether it got the
    Edward> info from DNS or not.  If an application cares how DNS
    Edward> arrived at the answer, then the application has assumed a
    Edward> debugging role.  I stop thinking of the application as an

  I strongly disagree.

  We complain loudly when applications put up a nice box on user's
screens which say, "FAILED", yet this is what you are advocating.
  This is why IT support costs are so high - the user can't make
intelligent decisions about any of this data, because they aren't given
any information.  

    Edward> This can be done by examining the logs or by some
    Edward> interactive approach, such as performing a "verbose
    Edward> reporting of the validation chain."

  WHAT LOGS? where are they?  Think about it.

  Why do you think I want to have audit information returned on every
request? SO THAT IT CAN GO INTO THE LOGS.

    Edward> I haven't gotten to operations and operators yet.  These
    Edward> groups essentially rely on the debugging information.  Say
    Edward> IT is hit with "why does ssh bank.example.com not work - it
    Edward> says DNS failure".  The answer is for the IT department be
    Edward> able to determine what resolver returned the error and then
    Edward> have access to the resolver to check the logs.
  
  No, IT department says "works for me, reboot your computer".
  The relevant logs for them to look at are:
      a) on the end-user's computer (best case), in the local caching,
	 recursive resover's log file.

      b) on the IT department's recursive resolver (assuming they can
	 figure out which resolv.conf equivalent was used)

      c) on the end-user's ISP's resolver. 

      d) on the Linksys gateway box at the no-name coffee shop's
	 hotspot.


  Let's take the case where the signature appears to have expired. There
are three reasons I can think of for this:
    1) the signature really has expired in the primary
    2) there is some blockage preventing all caches from getting newer
       data that is signed wrong.
    3) the clock on the machine doing the verification is wrong.


  #3 is the MOST likely reason. Particulary when the security aware
local caching name server is on the end-user's laptop. 
  How does IT guy find that out?

  Tell the end-user to run "dig"?  I think not.

  Ask them to click on the "email details to IT" button on the dialogue?
I think so. 

  Ed might answer, "but that is the debugger application" - but I
disagree. It isn't. 
  It is a bunch of information that got captured as a text file and got
emailed. (or printed. Maybe email doesn't work as a result)
  
    Edward> I'd settle for much clear logs out of the BIND validator
    Edward> right now. If the logs were better, I think the problem
    Edward> ahead for applications would be clearer.  'Course, I'm not

  That works for you and I. It doesn't work in general.

    Edward> PS - About SERVAIL.  I've argued that it's overloaded to the
    Edward> detriment of debugging in workshops.  I've found that I can
    Edward> easily separate DNSSEC SERVAILs from DNS SERVFAILs by doing
    Edward> a "dig ... +norec" - i.e., by using a debugging tool already

  I don't care about SERVFAIL vs NOTVAL or whatever. It isn't a question
about 1 bit vs 5. 
  I just want additional information returned in all cases.

- --
]       ON HUMILITY: to err is human. To moo, bovine.           |  firewalls  [
]   Michael Richardson,    Xelerance Corporation, Ottawa, ON    |net architect[
] mcr@xelerance.com      http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBQKOurIqHRg3pndX9AQFlcwQAhlnQGfzOQ/IgdJNrbxL01PxSI7fbJx/T
tn8TyHJq+eV/WrTIRswtZH+P4ShExvE5jGjOE0bxYeJvrXey81FunsPM+7Sjp3Ta
yQt2sCHHKs8VcjyoCerx01p304K8qfyVcOFAeslZ1RPbU8CAYMFuISXy6T/LpVEJ
xeKRId/5IkU=
=jhRf
-----END PGP SIGNATURE-----

Home | Date list | Subject list