On Friday, April 7, 2017 12:51:40 AM GMT David Conrad wrote: > Paul, > > On Apr 6, 2017, 2:24 PM -1000, Paul Vixie <p...@redbarn.org>, wrote: > > the proviso is, RFC 7706 is also completely unsuitable for non-hardcore or > > non-experienced or non-protocol-geeks; > ... This strikes me as a bit more complicated than 7706. YMMV.
yes, it does. > > and both approaches are appropriate only for closed internal networks > > where the configuration is controlled by a single administration. > If I set up an open resolver using 7706, what negative repercussions do you > see? you'll need some name server features that aren't otherwise standardized, and maybe a patch or two. in my preferred approach, you just load a zone, because all of the special logic is outside of the name server and its configuration. > > the misstatement is, dnssec's purpose is not defeated, because iana's > > signatures are checked before the zone is accepted, and new signatures > > are added using local keys before publication. > Meaningless given you are explicitly editing the zone as published from and > signed by the authority. i hear you say meaningless, but i know that you know the difference between a name space and a zone that implements that namespace, and i know you've read my explainations about the importance of that distinction. it's not meaningless. > You claim you aren't modifying the namespace > content (well, except for the root NSes), ... what is namespace content? i know namespaces, and i know zone content. > but the point of DNSSEC and the > rather Byzantine structures we've built around establishing trust is that > we don't have to believe you: you can see _everything_ having to do with > creating the trust anchor and everything down to the leaf. that point is not lost. dig +trace +dnssec works as expected. transitive trust is a real thing: if i trust where i got the data, because i verified the signatures, and i trust my own keys and signatures, then trading one set of trust anchors and signatures for another lost me no root-to-leaf trust, in the eyes of my target audience, who is in the case of my laptop, me. > The only advantage(?) I see in your approach is that is allows (forces) you > to play around with the namespace and re-sign. it plays around with the zone content. not the namespace. > Might be useful for neo maxi > zoom DNSSEC nerd experimentation, however as mentioned previously, that > doesn't strike me as something one might recommend lightheartedly. note that since many enterprise networks do augment the iana namespace for internal use (creating problems like .home and .corp collisions), there is often a loss of dnssec integrity. my approach is one way to retain dnssec integrity in that situation, and has not been recommended lightheartedly. > > for my many-vm's laptop environment, running on a loopback isn't a > > solution. > I strongly suspect you could come up with a solution that didn't use > loopback but which also didn't require modifying the root zone, resigning > it, and getting all relying devices to use both your NS hints and trust > anchor. Like, perhaps running on a non-loopback address within your flock > of laptop VMs? i do run on a non-loopback address within my vm-local network. but unless i pirate the addresses of all the real root name servers (which i won't do), or re-sign the iana content with a local NS RRset and trust anchoe (which i am doing), then cache priming is going to cause my hints to be ignored by the other rdns servers local to me. note that very few people will ever run multiple rdns servers inside a laptop. i am not suggesting that my use case is or will ever be common. but it works. at a slightly broader scale, for instance my home network, it would also work. however, i'm using the yeti system here, so i can't experiment separately. at enterprise scale, or metro or region or national scale, it would also work. as you know i've suggested for some time now that iana build and sign a second root zone, having the same name space (which is regulated by icann and ietf) but having a different apex NS RRset (which i think can be regulated differently.) iana is in a perfect position to sign its zone using NS RR's and associated AAAA RR's that lead to addresses i *would* be willing to pirate. this is also called "the AS112 unowned anycast approach". if i could slave an iana-signed zone on my laptop that already had pirateable IP addresses reached by hints and the apex NS RRset, i would not need Perl to do what i'm doing. and i would be using the iana trust anchor. and it would be a configuration that i would recommend for all internet users. sadly, a lot of people saying that "the namespace and the zone are the same thing" has kept that door pretty well closed. so, here i am with Perl instead. > > http://www.circleid.com/posts/20160330_let_me_make_yeti_dns_perfectly_clear/ > Saw that a year ago and still think it post-hoc rationalization and > specious, but I'm sure that's just me. i am also sure that it's just you, because those principles were documented by the yeti project before it served its first request. vixie
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop