Nikos Mavrogiannopoulos wrote:
> On Wed, 2015-03-25 at 14:00 -0400, Robert Edmonds wrote:
> 
> > >  The D-BUS interface is not really necessary because DNS provides
> > > already this functionality. What we need is a convention for
> > > applications in the system to discover the local trusted (for dnssec)
> > > nameservers. 
> > What do you mean by "local"?  A nameserver listening on localhost, or
> > only a nameserver on the local network?
> 
> It depends how the network is organized. It can be a server on the
> localhost, a server on a different VM, or container.

How does a server on a different VM count as local, even if running on
the same chassis?  (Also, you do exclude across a physical LAN/WLAN/etc.
from your definition of local, right?  Just making sure.)

> That is system policy applications cannot and should not enforce.

I disagree.  What's the use case for easily allowing, as a configurable
policy, delegating an application's cryptographic validation to a server
that may be off-host?

> > If I understand this pull request correctly, it only checks that the AD
> > bit is set in responses; in the language of RFC 4033, that makes this a
> > "Non-Validating Security-Aware Stub Resolver".
> > libunbound, OTOH, is a "Validating Stub Resolver" (it can also do full
> > recursion if no forwarders are configured).  A tool that uses libunbound
> > can guarantee that the result is cryptographically authentic, to the
> > limits of the integrity of the local system.
> 
> That's the same guarantee of you connect to unbound via localhost. It is
> no different than connecting via unix sockets or using the API of
> libunbound.

I agree that non-validating stub resolution via localhost or AF_LOCAL to
a validating server running on the same host is the same guarantee as
calling libunbound -- validation takes place on-host, if not in the same
process, then by a privileged process running on the same host.

But your c-ares pull requests (#20, #21, #22) don't guarantee that
validation takes place on-host (i.e., via localhost/loopback).

> > So, I disagree with you if you are saying that trusting the AD bit
> > without validating from a nameserver on the local network (even if it
> > has been marked as "trusted" by local policy) has the same effect as
> > validating on the endpoint (whether it be by a trusted process or by a
> > nameserver bound to a privileged port, etc.).
> > Maybe better than a D-BUS service would be DNS transport over an
> > AF_LOCAL / SOCK_DGRAM socket; that can also guarantee that validation
> > happens on the local system by a trusted process.
> 
> I don't see any difference of AF_LOCAL with the loopback interface.

Nor do I, but there is no guarantee that servers listed in resolv.conf
(or resolv-sec.conf) are on the loopback interface.

-- 
Robert Edmonds
edmo...@debian.org


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to