On Fri, Nov 06, 2015 at 10:54:02AM +1100, Mark Andrews wrote:

>       I keep getting told the IETF can't tell people what to do
>       but that is *exactly* what we do do when we issue a BCP.
>       We tell people what best current practice is and ask them
>       to follow it.
> 
>       Today we have TLDs that do perform all sorts of checks on
>       servers they delegate zones to and some do inform the
>       operators of those zones that they have errors.  Those
>       checks cover in part tests described in
>       draft-andrews-dns-no-response-issue.
> 
>       So do we adopt this or do we continue to lie to ourselves
>       about what BCP actually do?

If this is about:

    https://datatracker.ietf.org/doc/draft-andrews-dns-no-response-issue/

then I for one strongly support its adoption.  I've been doing DANE
SMTP adoption surveys for over a year now, and have run into quite
a few nameserver operators with a number of DNSSEC issues.  I've
found especially the SIDN (.nl) registry very helpful in interfacing
with DNS hosting providers to address the reported issues, but have
also had some help from .cz, .se and .gov.  Today I reached out to
norid.no, they'll likely be helpful too.

It would be great if I did not have to nag each operator or hosting
provider I happened to find, and instead registries would make
periodic efforts to validate the correctness of all delegations.
Recommending this as a best practice seems quite reasonable.

As to what makes a delegation valid, it is not too difficult to
construct a sensible list of tests.  The dnsviz.net site seems to
have no trouble testing for a reasonably comphensive set of warnings
and errors.

In addition to all the obvious tests of the consistency of delegation
records with data at the zone apex, no lame delegations, DS records
having matching DNSKEY records, ... Based in part on:

    https://datatracker.ietf.org/doc/draft-andrews-dns-no-response-issue/

I'd also check for:

    * Not dropping queries for unexpected RRtypes (which are
      misguidedly droppped as a "security feature" by some systems).
      Especially TLSA RRs, which are starting to get used with SMTP.

    * Correct processing of denial of existence in signed zones:

        ; Check for valid NXDOMAIN or NODATA (if wildcard applies)
        ;
        made-up-label2.made-up-label1.<zone-apex>. IN A ?
        made-up-label2.made-up-label1.<zone-apex>. IN AAAA ?
        made-up-label2.made-up-label1.<zone-apex>. IN TLSA ?

        ; Check for valid NXDOMAIN or NODATA (if wildcard applies)
        ; if in bailiwick known names exist below the zone apex.
        ; Names of MX hosts are often a good source of such names.
        ;
        made-up-label2.made-up-label1.known-name.<zone-apex>. IN A ?
        made-up-label2.made-up-label1.known-name.<zone-apex>. IN AAAA ?
        made-up-label2.made-up-label1.known-name.<zone-apex>. IN TLSA ?

For example, papaki.gr returns NSEC RRsets with no RRSIG for multiple
domains:

    @dns1.papaki.gr
    ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24618
    ;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1
    ;_25._tcp.mail.3814.eu. IN TLSA
    3814.eu.                SOA     dns1.papaki.gr. hostmaster.papaki.gr. 
2015101800 10800 3600 1209600 3600
    3814.eu.                RRSIG   SOA 5 2 86400 20160218062849 20151018062849 
12273 3814.eu.
    mail.3814.eu.           NSEC    webmail.3814.eu. A RRSIG NSEC
    3814.eu.                NSEC    mail.3814.eu. A NS SOA MX RRSIG NSEC DNSKEY

I notified them, whether action will be take is not yet clear.

-- 
        Viktor.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to